代码搜索:objdump
找到约 4,575 项符合「objdump」的源代码
代码结果 4,575
www.eeworm.com/read/340665/3267790
d sym-1.d
#objdump: -dt
.*: file format elf64-mmix
SYMBOL TABLE:
0+ l d .text 0+
0+ l d .data 0+
0+ l d .bss 0+
0+10 l .text 0+ scl1
0+14 l .text 0+ :scl2
0+20 l .text 0+
www.eeworm.com/read/340665/3267886
d basep-9.d
#objdump: -srt
.*: file format elf64-mmix
SYMBOL TABLE:
0+ l d \.text 0+
0+ l d \.data 0+
0+ l d \.bss 0+
0+ l \.bss 0+4 comm_symbol3
0+4 l \.bss 0+4 comm_symbol4
0+ l
www.eeworm.com/read/340665/3267925
d greg1.d
# objdump: -rst
.*: file format elf64-mmix
SYMBOL TABLE:
0+ l d \.text 0+
0+ l d \.data 0+
0+ l d \.bss 0+
0+ l \.text 0+ D4
0+4 l \.text 0+ E6
0+ l \.MMIX\.reg_
www.eeworm.com/read/340665/3267927
d locall1.d
# objdump: -t
.*: file format elf64-mmix
SYMBOL TABLE:
0+ l d \.text 0+
0+ l d \.data 0+
0+ l d \.bss 0+
0+14 l \.text 0+ L9
0+18 l \.text 0+ L12
0+1c l \.text 0
www.eeworm.com/read/340665/3267942
d greg2.d
# objdump: -rst
.*: file format elf64-mmix
SYMBOL TABLE:
0+ l d \.text 0+
0+ l d \.data 0+
0+ l d \.bss 0+
0+ l \.text 0+ D4
0+4 l \.text 0+ E6
0+ l \.MMIX\.reg_
www.eeworm.com/read/340665/3268196
d diffexp-ovwr.d
#objdump: -sr
#name: diffexp-ovwr
.*: file format .*-cris
Contents of section \.text:
0000 2f000000 2dab4f8e 2a005f8e 2900a532 .*
0010 48656c6c 6f2c2077 6f726c64 0a000000 .*
0020 00000000 0
www.eeworm.com/read/340665/3268323
d high-1.d
#as:
#objdump: -dr
#name: high-1
.*: +file format .*
Disassembly of section .text:
0* :
*0: d4 c0 00 01 seth r4,[#]*0x1
[ ]*0: R_M32R_HI16_ULO .text
*4: 84 e4 00 00 or3 r4,r4,[#]*0x0
[ ]
www.eeworm.com/read/278867/4141127
d addend.d
#objdump: -r
# name : addends
.*: +file format a.out-sunos-big
RELOCATION RECORDS FOR \[.text\]:
OFFSET TYPE +VALUE
0+08 WDISP22 +foo1\+0xf+fc
0+0c WDISP22 +foo1\+0xf+f8
0+10 WDISP22 +foo1\+0xf+f0
www.eeworm.com/read/447738/1695059
d pushjs2b.d
#source: start4.s
#source: nop123.s
#source: a.s
#source: pad2p18m32.s
#source: pad16.s
#source: pad4.s
#source: pad4.s
#source: pad4.s
#source: pushja.s
#source: start.s
#ld: -m elf64mmix
#objdump: -
www.eeworm.com/read/447738/1695444
d link-hcs12.d
#source: link-hcs12.s -m68hcs12
#source: link-hc12.s -m68hc12
#as: -mshort
#ld: -m m68hc12elf
#objdump: -p -d --prefix-addresses -r
#target: m6811-*-* m6812-*-*
.*: file format elf32\-m68hc12
Pr