Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 6 of 6 for food (0.1 sec)

  1. src/cmd/asm/internal/asm/testdata/mips64.s

    //	{
    //		outcode(int($1), &nullgen, 0, &nullgen);
    //	}
    	SYSCALL
    	BEQ	R1, 2(PC)
    	RET
    
    
    // More JMP/JAL cases, and canonical names JMP, CALL.
    
    	JAL	foo(SB) // CALL foo(SB)
    	BEQ	R1, 2(PC)
    	JMP	foo(SB)
    	CALL	foo(SB)
    	RET	foo(SB)
    
    	// unary operation
    	NEGW	R1, R2 // 00011023
    	NEGV	R1, R2 // 0001102f
    
    	WSBH	R1, R2 // 7c0110a0
    	DSBH	R1, R2 // 7c0110a4
    	DSHD	R1, R2 // 7c011164
    
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Tue Aug 08 12:17:12 UTC 2023
    - 12.4K bytes
    - Viewed (0)
  2. src/cmd/asm/internal/asm/testdata/arm.s

    //	{
    //		outcode($1, $2, &nullgen, 0, &nullgen);
    //	}
    	BEQ	2(PC)
    	RET
    
    // More B/BL cases, and canonical names JMP, CALL.
    
    	BEQ	2(PC)
    	B	foo(SB) // JMP foo(SB)
    	BL	foo(SB) // CALL foo(SB)
    	BEQ	2(PC)
    	JMP	foo(SB)
    	CALL	foo(SB)
    
    // CMPF and CMPD are special.
    	CMPF F1, F2
    	CMPD F1, F2
    
    // AND
    	AND	$255, R0, R1         // ff1000e2
    	AND	$4278190080, R0, R1  // ff1400e2
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Fri Dec 15 20:51:01 UTC 2023
    - 69K bytes
    - Viewed (0)
  3. src/cmd/asm/internal/asm/testdata/ppc64.s

    	MOVHBR (R3)(R4), R5             // 7ca41e2c
    	MOVHBR (R3)(R0), R5             // 7ca01e2c
    	MOVHBR (R3), R5                 // 7ca01e2c
    	OR $0, R0, R0
    	MOVD $foo+4009806848(FP), R5    // 3ca1ef0138a5cc40 or 0600ef0038a1cc40
    	MOVD $foo(SB), R5               // 3ca0000038a50000 or 0610000038a00000
    
    	MOVDU 8(R3), R4                 // e8830009
    	MOVDU (R3)(R4), R5              // 7ca4186a
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Fri May 17 21:53:50 UTC 2024
    - 50.2K bytes
    - Viewed (0)
  4. src/cmd/asm/internal/asm/testdata/mips.s

    	//	{
    	//		outcode(int($1), &nullgen, 0, &nullgen);
    	//	}
    	SYSCALL
    	BEQ	R1, 2(PC)
    	RET
    
    
    	// More JMP/JAL cases, and canonical names JMP, CALL.
    
    	JAL	foo(SB)	// CALL foo(SB)
    	BEQ	R1, 2(PC)
    	JMP	foo(SB)
    	CALL	foo(SB)
    	RET	foo(SB)
    
    	// unary operation
    	NEGW	R1, R2 // 00011023
    	CLZ	R1, R2 // 70221020
    	CLO	R1, R2 // 70221021
    
    	WSBH	R1, R2 // 7c0110a0
    
    	SEB	R1, R2 // 7c011420
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Tue Aug 08 12:17:12 UTC 2023
    - 6.7K bytes
    - Viewed (0)
  5. src/cmd/asm/internal/asm/testdata/loong64.s

    // license that can be found in the LICENSE file.
    
    #include "../../../../../runtime/textflag.h"
    // TODO: cover more instruction
    
    TEXT foo(SB),DUPOK|NOSPLIT,$0
    	JAL	1(PC)	//CALL 1(PC)	//00040054
    	JAL	(R4)	//CALL (R4)	//8100004c
    	// relocation in play so the assembled offset should be 0
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed Mar 22 18:50:59 UTC 2023
    - 434 bytes
    - Viewed (0)
  6. .github/ISSUE_TEMPLATE/04-vuln.yml

          required: true
      - type: textarea
        id: what-did-you-do
        attributes:
          label: "What did you do?"
          description: "If possible, provide a recipe for reproducing the error. A complete runnable program is good. A link on [go.dev/play](https://go.dev/play) is best."
        validations:
          required: true
      - type: textarea
        id: actual-behavior
        attributes:
          label: "What did you see happen?"
        validations:
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu Jan 04 23:31:17 UTC 2024
    - 1.9K bytes
    - Viewed (0)
Back to top