代码搜索:objdump

找到约 4,575 项符合「objdump」的源代码

代码结果 4,575
www.eeworm.com/read/340665/3267790

d sym-1.d

#objdump: -dt .*: file format elf64-mmix SYMBOL TABLE: 0+ l d .text 0+ 0+ l d .data 0+ 0+ l d .bss 0+ 0+10 l .text 0+ scl1 0+14 l .text 0+ :scl2 0+20 l .text 0+
www.eeworm.com/read/340665/3267886

d basep-9.d

#objdump: -srt .*: file format elf64-mmix SYMBOL TABLE: 0+ l d \.text 0+ 0+ l d \.data 0+ 0+ l d \.bss 0+ 0+ l \.bss 0+4 comm_symbol3 0+4 l \.bss 0+4 comm_symbol4 0+ l
www.eeworm.com/read/340665/3267925

d greg1.d

# objdump: -rst .*: file format elf64-mmix SYMBOL TABLE: 0+ l d \.text 0+ 0+ l d \.data 0+ 0+ l d \.bss 0+ 0+ l \.text 0+ D4 0+4 l \.text 0+ E6 0+ l \.MMIX\.reg_
www.eeworm.com/read/340665/3267927

d locall1.d

# objdump: -t .*: file format elf64-mmix SYMBOL TABLE: 0+ l d \.text 0+ 0+ l d \.data 0+ 0+ l d \.bss 0+ 0+14 l \.text 0+ L9 0+18 l \.text 0+ L12 0+1c l \.text 0
www.eeworm.com/read/340665/3267942

d greg2.d

# objdump: -rst .*: file format elf64-mmix SYMBOL TABLE: 0+ l d \.text 0+ 0+ l d \.data 0+ 0+ l d \.bss 0+ 0+ l \.text 0+ D4 0+4 l \.text 0+ E6 0+ l \.MMIX\.reg_
www.eeworm.com/read/340665/3268196

d diffexp-ovwr.d

#objdump: -sr #name: diffexp-ovwr .*: file format .*-cris Contents of section \.text: 0000 2f000000 2dab4f8e 2a005f8e 2900a532 .* 0010 48656c6c 6f2c2077 6f726c64 0a000000 .* 0020 00000000 0
www.eeworm.com/read/340665/3268323

d high-1.d

#as: #objdump: -dr #name: high-1 .*: +file format .* Disassembly of section .text: 0* : *0: d4 c0 00 01 seth r4,[#]*0x1 [ ]*0: R_M32R_HI16_ULO .text *4: 84 e4 00 00 or3 r4,r4,[#]*0x0 [ ]
www.eeworm.com/read/278867/4141127

d addend.d

#objdump: -r # name : addends .*: +file format a.out-sunos-big RELOCATION RECORDS FOR \[.text\]: OFFSET TYPE +VALUE 0+08 WDISP22 +foo1\+0xf+fc 0+0c WDISP22 +foo1\+0xf+f8 0+10 WDISP22 +foo1\+0xf+f0
www.eeworm.com/read/447738/1695059

d pushjs2b.d

#source: start4.s #source: nop123.s #source: a.s #source: pad2p18m32.s #source: pad16.s #source: pad4.s #source: pad4.s #source: pad4.s #source: pushja.s #source: start.s #ld: -m elf64mmix #objdump: -
www.eeworm.com/read/447738/1695444

d link-hcs12.d

#source: link-hcs12.s -m68hcs12 #source: link-hc12.s -m68hc12 #as: -mshort #ld: -m m68hc12elf #objdump: -p -d --prefix-addresses -r #target: m6811-*-* m6812-*-* .*: file format elf32\-m68hc12 Pr