hexsha
stringlengths
40
40
size
int64
5
1.05M
ext
stringclasses
588 values
lang
stringclasses
305 values
max_stars_repo_path
stringlengths
3
363
max_stars_repo_name
stringlengths
5
118
max_stars_repo_head_hexsha
stringlengths
40
40
max_stars_repo_licenses
listlengths
1
10
max_stars_count
float64
1
191k
max_stars_repo_stars_event_min_datetime
stringdate
2015-01-01 00:00:35
2022-03-31 23:43:49
max_stars_repo_stars_event_max_datetime
stringdate
2015-01-01 12:37:38
2022-03-31 23:59:52
max_issues_repo_path
stringlengths
3
363
max_issues_repo_name
stringlengths
5
118
max_issues_repo_head_hexsha
stringlengths
40
40
max_issues_repo_licenses
listlengths
1
10
max_issues_count
float64
1
134k
max_issues_repo_issues_event_min_datetime
stringlengths
24
24
max_issues_repo_issues_event_max_datetime
stringlengths
24
24
max_forks_repo_path
stringlengths
3
363
max_forks_repo_name
stringlengths
5
135
max_forks_repo_head_hexsha
stringlengths
40
40
max_forks_repo_licenses
listlengths
1
10
max_forks_count
float64
1
105k
max_forks_repo_forks_event_min_datetime
stringdate
2015-01-01 00:01:02
2022-03-31 23:27:27
max_forks_repo_forks_event_max_datetime
stringdate
2015-01-03 08:55:07
2022-03-31 23:59:24
content
stringlengths
5
1.05M
avg_line_length
float64
1.13
1.04M
max_line_length
int64
1
1.05M
alphanum_fraction
float64
0
1
e2b778d2540b7d1ee8cf1ac411f9ca1ff433214f
4,807
asm
Assembly
Transynther/x86/_processed/NONE/_xt_sm_/i7-8650U_0xd2_notsx.log_3_1732.asm
ljhsiun2/medusa
67d769b8a2fb42c538f10287abaf0e6dbb463f0c
[ "MIT" ]
9
2020-08-13T19:41:58.000Z
2022-03-30T12:22:51.000Z
Transynther/x86/_processed/NONE/_xt_sm_/i7-8650U_0xd2_notsx.log_3_1732.asm
ljhsiun2/medusa
67d769b8a2fb42c538f10287abaf0e6dbb463f0c
[ "MIT" ]
1
2021-04-29T06:29:35.000Z
2021-05-13T21:02:30.000Z
Transynther/x86/_processed/NONE/_xt_sm_/i7-8650U_0xd2_notsx.log_3_1732.asm
ljhsiun2/medusa
67d769b8a2fb42c538f10287abaf0e6dbb463f0c
[ "MIT" ]
3
2020-07-14T17:07:07.000Z
2022-03-21T01:12:22.000Z
.global s_prepare_buffers s_prepare_buffers: push %r11 push %r14 push %r8 push %r9 push %rbp push %rcx push %rdi push %rdx push %rsi lea addresses_UC_ht+0x18cd3, %rdx nop add %r14, %r14 movups (%rdx), %xmm4 vpextrq $0, %xmm4, %rbp nop nop cmp $40166, %r8 lea addresses_UC_ht+0x150d3, %r11 nop nop nop nop cmp $25389, %r14 movl $0x61626364, (%r11) nop xor $16542, %r14 lea addresses_WT_ht+0x138f3, %rdx nop nop nop cmp %rsi, %rsi mov $0x6162636465666768, %rbp movq %rbp, (%rdx) nop sub %rbp, %rbp lea addresses_normal_ht+0x41f3, %rbp clflush (%rbp) nop nop nop nop dec %r8 mov (%rbp), %r9w nop sub $7881, %rbp lea addresses_UC_ht+0x2d6b, %rsi nop nop nop cmp %rdx, %rdx movb (%rsi), %r14b nop nop nop nop sub %r8, %r8 lea addresses_WT_ht+0x19d13, %rsi lea addresses_UC_ht+0xc7d3, %rdi nop nop cmp %rdx, %rdx mov $111, %rcx rep movsl nop xor $61211, %r8 lea addresses_normal_ht+0xf0d3, %rdi add $2638, %rcx vmovups (%rdi), %ymm4 vextracti128 $0, %ymm4, %xmm4 vpextrq $1, %xmm4, %rbp nop cmp %rbp, %rbp lea addresses_D_ht+0x60d3, %rsi lea addresses_WC_ht+0x19453, %rdi nop nop sub %r14, %r14 mov $10, %rcx rep movsl nop nop and %r9, %r9 lea addresses_normal_ht+0x8bd3, %rsi lea addresses_WT_ht+0x15813, %rdi nop nop nop nop nop sub %r9, %r9 mov $45, %rcx rep movsb nop nop nop nop nop cmp %r9, %r9 pop %rsi pop %rdx pop %rdi pop %rcx pop %rbp pop %r9 pop %r8 pop %r14 pop %r11 ret .global s_faulty_load s_faulty_load: push %r10 push %r11 push %r14 push %r9 push %rax push %rbp push %rdi // Store lea addresses_A+0xacd3, %r9 nop nop nop and %r14, %r14 mov $0x5152535455565758, %rbp movq %rbp, %xmm6 vmovups %ymm6, (%r9) nop cmp $12095, %r11 // Store lea addresses_US+0x1335f, %r9 nop nop nop nop nop add $42237, %rdi mov $0x5152535455565758, %rax movq %rax, %xmm3 vmovaps %ymm3, (%r9) nop nop nop nop nop add %r11, %r11 // Load lea addresses_A+0x9853, %r9 nop nop nop and %r10, %r10 mov (%r9), %r11 nop nop nop nop nop add %r9, %r9 // Store mov $0x2236ad00000008d3, %rbp nop nop nop nop cmp $24984, %rdi movw $0x5152, (%rbp) nop nop nop nop nop add %r14, %r14 // Store lea addresses_PSE+0x15d1f, %r9 dec %rdi mov $0x5152535455565758, %r10 movq %r10, (%r9) nop inc %r14 // Store lea addresses_PSE+0xfb45, %r9 nop xor $64946, %rdi mov $0x5152535455565758, %r10 movq %r10, %xmm6 vmovaps %ymm6, (%r9) xor %r14, %r14 // Faulty Load lea addresses_A+0xacd3, %r14 nop xor $691, %r10 movb (%r14), %al lea oracles, %r9 and $0xff, %rax shlq $12, %rax mov (%r9,%rax,1), %rax pop %rdi pop %rbp pop %rax pop %r9 pop %r14 pop %r11 pop %r10 ret /* <gen_faulty_load> [REF] {'OP': 'LOAD', 'src': {'type': 'addresses_A', 'size': 1, 'AVXalign': False, 'NT': False, 'congruent': 0, 'same': False}} {'OP': 'STOR', 'dst': {'type': 'addresses_A', 'size': 32, 'AVXalign': False, 'NT': False, 'congruent': 0, 'same': True}} {'OP': 'STOR', 'dst': {'type': 'addresses_US', 'size': 32, 'AVXalign': True, 'NT': False, 'congruent': 1, 'same': False}} {'OP': 'LOAD', 'src': {'type': 'addresses_A', 'size': 8, 'AVXalign': False, 'NT': False, 'congruent': 1, 'same': False}} {'OP': 'STOR', 'dst': {'type': 'addresses_NC', 'size': 2, 'AVXalign': True, 'NT': False, 'congruent': 8, 'same': False}} {'OP': 'STOR', 'dst': {'type': 'addresses_PSE', 'size': 8, 'AVXalign': False, 'NT': False, 'congruent': 1, 'same': False}} {'OP': 'STOR', 'dst': {'type': 'addresses_PSE', 'size': 32, 'AVXalign': True, 'NT': False, 'congruent': 1, 'same': False}} [Faulty Load] {'OP': 'LOAD', 'src': {'type': 'addresses_A', 'size': 1, 'AVXalign': False, 'NT': False, 'congruent': 0, 'same': True}} <gen_prepare_buffer> {'OP': 'LOAD', 'src': {'type': 'addresses_UC_ht', 'size': 16, 'AVXalign': False, 'NT': False, 'congruent': 11, 'same': False}} {'OP': 'STOR', 'dst': {'type': 'addresses_UC_ht', 'size': 4, 'AVXalign': False, 'NT': False, 'congruent': 10, 'same': False}} {'OP': 'STOR', 'dst': {'type': 'addresses_WT_ht', 'size': 8, 'AVXalign': False, 'NT': False, 'congruent': 5, 'same': False}} {'OP': 'LOAD', 'src': {'type': 'addresses_normal_ht', 'size': 2, 'AVXalign': False, 'NT': False, 'congruent': 1, 'same': False}} {'OP': 'LOAD', 'src': {'type': 'addresses_UC_ht', 'size': 1, 'AVXalign': False, 'NT': False, 'congruent': 3, 'same': False}} {'OP': 'REPM', 'src': {'type': 'addresses_WT_ht', 'congruent': 6, 'same': False}, 'dst': {'type': 'addresses_UC_ht', 'congruent': 8, 'same': False}} {'OP': 'LOAD', 'src': {'type': 'addresses_normal_ht', 'size': 32, 'AVXalign': False, 'NT': False, 'congruent': 8, 'same': False}} {'OP': 'REPM', 'src': {'type': 'addresses_D_ht', 'congruent': 10, 'same': False}, 'dst': {'type': 'addresses_WC_ht', 'congruent': 7, 'same': False}} {'OP': 'REPM', 'src': {'type': 'addresses_normal_ht', 'congruent': 8, 'same': False}, 'dst': {'type': 'addresses_WT_ht', 'congruent': 5, 'same': False}} {'58': 3} 58 58 58 */
19.946058
152
0.644893
416e31d25901931d9beded434dfadc0125daa3ad
9,283
asm
Assembly
Transynther/x86/_processed/US/_zr_/i9-9900K_12_0xca.log_21829_817.asm
ljhsiun2/medusa
67d769b8a2fb42c538f10287abaf0e6dbb463f0c
[ "MIT" ]
9
2020-08-13T19:41:58.000Z
2022-03-30T12:22:51.000Z
Transynther/x86/_processed/US/_zr_/i9-9900K_12_0xca.log_21829_817.asm
ljhsiun2/medusa
67d769b8a2fb42c538f10287abaf0e6dbb463f0c
[ "MIT" ]
1
2021-04-29T06:29:35.000Z
2021-05-13T21:02:30.000Z
Transynther/x86/_processed/US/_zr_/i9-9900K_12_0xca.log_21829_817.asm
ljhsiun2/medusa
67d769b8a2fb42c538f10287abaf0e6dbb463f0c
[ "MIT" ]
3
2020-07-14T17:07:07.000Z
2022-03-21T01:12:22.000Z
.global s_prepare_buffers s_prepare_buffers: push %r11 push %r14 push %r15 push %r8 push %rax push %rcx push %rdi push %rsi lea addresses_UC_ht+0x1b409, %r15 nop and %r8, %r8 movb (%r15), %al nop nop nop nop and %r11, %r11 lea addresses_normal_ht+0x139e9, %rsi lea addresses_normal_ht+0x3d49, %rdi nop nop and %rax, %rax mov $94, %rcx rep movsl and $63976, %r8 lea addresses_A_ht+0xec09, %rsi lea addresses_WT_ht+0x6409, %rdi nop nop nop and %r14, %r14 mov $80, %rcx rep movsw nop nop add $5393, %rcx lea addresses_UC_ht+0x16609, %r14 nop nop nop nop nop sub %rax, %rax movb $0x61, (%r14) nop nop nop nop and %r14, %r14 lea addresses_WC_ht+0x8a96, %rax nop nop xor %r8, %r8 movb $0x61, (%rax) and %rax, %rax lea addresses_D_ht+0x7209, %rsi lea addresses_normal_ht+0x18a09, %rdi clflush (%rsi) nop nop nop nop cmp %r14, %r14 mov $112, %rcx rep movsq nop nop nop nop dec %rdi lea addresses_D_ht+0x117e7, %rsi clflush (%rsi) nop nop nop add %r14, %r14 mov (%rsi), %r11 cmp $3277, %rax lea addresses_WC_ht+0x17021, %r14 nop cmp $1732, %rax vmovups (%r14), %ymm7 vextracti128 $1, %ymm7, %xmm7 vpextrq $0, %xmm7, %rsi add $46720, %rdi lea addresses_A_ht+0x12c89, %rsi lea addresses_UC_ht+0xe161, %rdi nop nop nop add $64718, %r15 mov $10, %rcx rep movsq nop nop xor %rdi, %rdi lea addresses_A_ht+0x4e09, %rdi nop nop nop nop mfence movl $0x61626364, (%rdi) nop nop nop nop add %rsi, %rsi lea addresses_normal_ht+0xcb09, %r14 nop and %rsi, %rsi mov $0x6162636465666768, %r15 movq %r15, %xmm7 vmovups %ymm7, (%r14) nop nop nop nop and %r11, %r11 lea addresses_normal_ht+0x60b9, %r15 nop nop nop nop nop and %rsi, %rsi and $0xffffffffffffffc0, %r15 movaps (%r15), %xmm0 vpextrq $1, %xmm0, %r14 nop nop nop nop add %r11, %r11 lea addresses_UC_ht+0x13fab, %rcx nop cmp $22540, %rdi movb (%rcx), %r15b cmp $51990, %r15 lea addresses_normal_ht+0xb609, %rsi lea addresses_A_ht+0x4c89, %rdi clflush (%rdi) nop nop xor $40893, %r8 mov $14, %rcx rep movsb nop nop nop nop nop sub %r8, %r8 lea addresses_D_ht+0x14809, %rcx clflush (%rcx) nop nop nop nop nop add %rsi, %rsi mov (%rcx), %r8 add %rcx, %rcx pop %rsi pop %rdi pop %rcx pop %rax pop %r8 pop %r15 pop %r14 pop %r11 ret .global s_faulty_load s_faulty_load: push %r11 push %r13 push %r14 push %r15 push %rbx push %rcx push %rdx // Load lea addresses_US+0x2809, %r15 nop add $61243, %r11 mov (%r15), %r14 nop nop and $54767, %r11 // Store lea addresses_UC+0xf71, %r13 nop nop nop nop dec %rcx mov $0x5152535455565758, %r15 movq %r15, %xmm4 vmovups %ymm4, (%r13) nop nop sub %rbx, %rbx // Load mov $0x7a775a0000000609, %rdx nop nop nop nop cmp %r13, %r13 mov (%rdx), %rbx nop nop nop inc %r13 // Store lea addresses_A+0xfe09, %rdx nop nop nop nop nop add %r13, %r13 movl $0x51525354, (%rdx) nop and $57603, %r11 // Store lea addresses_WC+0xe09, %r14 nop nop sub %r15, %r15 movw $0x5152, (%r14) cmp $13973, %rbx // Store lea addresses_UC+0xc329, %rcx nop nop nop nop nop and %rbx, %rbx movw $0x5152, (%rcx) nop nop nop nop nop add %r13, %r13 // Faulty Load lea addresses_US+0x2809, %rbx nop sub $16159, %r13 mov (%rbx), %r11w lea oracles, %r15 and $0xff, %r11 shlq $12, %r11 mov (%r15,%r11,1), %r11 pop %rdx pop %rcx pop %rbx pop %r15 pop %r14 pop %r13 pop %r11 ret /* <gen_faulty_load> [REF] {'OP': 'LOAD', 'src': {'size': 4, 'NT': False, 'type': 'addresses_US', 'same': False, 'AVXalign': False, 'congruent': 0}} {'OP': 'LOAD', 'src': {'size': 8, 'NT': False, 'type': 'addresses_US', 'same': True, 'AVXalign': True, 'congruent': 0}} {'OP': 'STOR', 'dst': {'size': 32, 'NT': False, 'type': 'addresses_UC', 'same': False, 'AVXalign': False, 'congruent': 3}} {'OP': 'LOAD', 'src': {'size': 8, 'NT': True, 'type': 'addresses_NC', 'same': False, 'AVXalign': True, 'congruent': 5}} {'OP': 'STOR', 'dst': {'size': 4, 'NT': False, 'type': 'addresses_A', 'same': False, 'AVXalign': False, 'congruent': 9}} {'OP': 'STOR', 'dst': {'size': 2, 'NT': False, 'type': 'addresses_WC', 'same': False, 'AVXalign': False, 'congruent': 9}} {'OP': 'STOR', 'dst': {'size': 2, 'NT': False, 'type': 'addresses_UC', 'same': False, 'AVXalign': False, 'congruent': 5}} [Faulty Load] {'OP': 'LOAD', 'src': {'size': 2, 'NT': False, 'type': 'addresses_US', 'same': True, 'AVXalign': False, 'congruent': 0}} <gen_prepare_buffer> {'OP': 'LOAD', 'src': {'size': 1, 'NT': False, 'type': 'addresses_UC_ht', 'same': False, 'AVXalign': False, 'congruent': 10}} {'OP': 'REPM', 'src': {'same': False, 'type': 'addresses_normal_ht', 'congruent': 3}, 'dst': {'same': False, 'type': 'addresses_normal_ht', 'congruent': 6}} {'OP': 'REPM', 'src': {'same': False, 'type': 'addresses_A_ht', 'congruent': 10}, 'dst': {'same': False, 'type': 'addresses_WT_ht', 'congruent': 10}} {'OP': 'STOR', 'dst': {'size': 1, 'NT': False, 'type': 'addresses_UC_ht', 'same': False, 'AVXalign': False, 'congruent': 9}} {'OP': 'STOR', 'dst': {'size': 1, 'NT': False, 'type': 'addresses_WC_ht', 'same': False, 'AVXalign': False, 'congruent': 0}} {'OP': 'REPM', 'src': {'same': False, 'type': 'addresses_D_ht', 'congruent': 9}, 'dst': {'same': False, 'type': 'addresses_normal_ht', 'congruent': 9}} {'OP': 'LOAD', 'src': {'size': 8, 'NT': False, 'type': 'addresses_D_ht', 'same': False, 'AVXalign': False, 'congruent': 1}} {'OP': 'LOAD', 'src': {'size': 32, 'NT': False, 'type': 'addresses_WC_ht', 'same': False, 'AVXalign': False, 'congruent': 2}} {'OP': 'REPM', 'src': {'same': False, 'type': 'addresses_A_ht', 'congruent': 6}, 'dst': {'same': False, 'type': 'addresses_UC_ht', 'congruent': 2}} {'OP': 'STOR', 'dst': {'size': 4, 'NT': False, 'type': 'addresses_A_ht', 'same': False, 'AVXalign': False, 'congruent': 9}} {'OP': 'STOR', 'dst': {'size': 32, 'NT': False, 'type': 'addresses_normal_ht', 'same': False, 'AVXalign': False, 'congruent': 8}} {'OP': 'LOAD', 'src': {'size': 16, 'NT': False, 'type': 'addresses_normal_ht', 'same': False, 'AVXalign': True, 'congruent': 3}} {'OP': 'LOAD', 'src': {'size': 1, 'NT': False, 'type': 'addresses_UC_ht', 'same': False, 'AVXalign': False, 'congruent': 1}} {'OP': 'REPM', 'src': {'same': False, 'type': 'addresses_normal_ht', 'congruent': 9}, 'dst': {'same': False, 'type': 'addresses_A_ht', 'congruent': 7}} {'OP': 'LOAD', 'src': {'size': 8, 'NT': False, 'type': 'addresses_D_ht', 'same': False, 'AVXalign': False, 'congruent': 8}} {'00': 21829} 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 */
30.237785
2,999
0.652483
72f741e0fc8f1d0f6af72cbfa9a12575490e647c
6,773
asm
Assembly
Transynther/x86/_processed/AVXALIGN/_st_/i9-9900K_12_0xa0_notsx.log_21829_1751.asm
ljhsiun2/medusa
67d769b8a2fb42c538f10287abaf0e6dbb463f0c
[ "MIT" ]
9
2020-08-13T19:41:58.000Z
2022-03-30T12:22:51.000Z
Transynther/x86/_processed/AVXALIGN/_st_/i9-9900K_12_0xa0_notsx.log_21829_1751.asm
ljhsiun2/medusa
67d769b8a2fb42c538f10287abaf0e6dbb463f0c
[ "MIT" ]
1
2021-04-29T06:29:35.000Z
2021-05-13T21:02:30.000Z
Transynther/x86/_processed/AVXALIGN/_st_/i9-9900K_12_0xa0_notsx.log_21829_1751.asm
ljhsiun2/medusa
67d769b8a2fb42c538f10287abaf0e6dbb463f0c
[ "MIT" ]
3
2020-07-14T17:07:07.000Z
2022-03-21T01:12:22.000Z
.global s_prepare_buffers s_prepare_buffers: push %r13 push %r14 push %r9 push %rbp push %rbx push %rcx push %rdi push %rsi lea addresses_normal_ht+0x4a8a, %rsi lea addresses_WT_ht+0x9aaa, %rdi nop xor %r13, %r13 mov $58, %rcx rep movsw nop nop nop nop nop cmp $29756, %rdi lea addresses_D_ht+0x8474, %rsi nop inc %rbx movb (%rsi), %r14b add $35696, %rsi lea addresses_A_ht+0x1e82a, %rsi nop and $54105, %r9 mov (%rsi), %rdi nop nop nop cmp %r13, %r13 lea addresses_UC_ht+0x5b94, %rsi lea addresses_UC_ht+0x61ea, %rdi nop nop nop nop nop inc %rbp mov $77, %rcx rep movsq nop sub %rdi, %rdi lea addresses_A_ht+0x814a, %rsi lea addresses_normal_ht+0x11d2a, %rdi nop and $24342, %r13 mov $114, %rcx rep movsl nop nop nop nop add $61237, %rbp lea addresses_A_ht+0xab2a, %rdi nop nop nop xor $5862, %rsi movl $0x61626364, (%rdi) nop nop nop xor %r9, %r9 lea addresses_UC_ht+0x1861a, %rsi lea addresses_normal_ht+0x1b32a, %rdi nop nop nop nop xor %r14, %r14 mov $58, %rcx rep movsw nop xor %r13, %r13 lea addresses_D_ht+0x12206, %r13 cmp %r14, %r14 movw $0x6162, (%r13) nop nop and %rsi, %rsi lea addresses_WC_ht+0x1c9aa, %rsi lea addresses_normal_ht+0x2811, %rdi clflush (%rsi) nop nop cmp $54891, %r13 mov $42, %rcx rep movsb nop nop nop nop cmp $40766, %rsi lea addresses_D_ht+0x176ea, %rsi clflush (%rsi) nop nop nop inc %rbx movl $0x61626364, (%rsi) nop add $62819, %rsi pop %rsi pop %rdi pop %rcx pop %rbx pop %rbp pop %r9 pop %r14 pop %r13 ret .global s_faulty_load s_faulty_load: push %r10 push %r11 push %r12 push %rcx push %rdi push %rsi // REPMOV lea addresses_A+0x154aa, %rsi lea addresses_UC+0x1209a, %rdi clflush (%rsi) nop nop nop sub %r12, %r12 mov $65, %rcx rep movsb nop and $4746, %r12 // Faulty Load lea addresses_RW+0x1032a, %rdi nop nop nop and %r11, %r11 mov (%rdi), %ecx lea oracles, %r10 and $0xff, %rcx shlq $12, %rcx mov (%r10,%rcx,1), %rcx pop %rsi pop %rdi pop %rcx pop %r12 pop %r11 pop %r10 ret /* <gen_faulty_load> [REF] {'src': {'type': 'addresses_RW', 'AVXalign': False, 'size': 16, 'NT': False, 'same': False, 'congruent': 0}, 'OP': 'LOAD'} {'src': {'type': 'addresses_A', 'congruent': 3, 'same': False}, 'OP': 'REPM', 'dst': {'type': 'addresses_UC', 'congruent': 3, 'same': False}} [Faulty Load] {'src': {'type': 'addresses_RW', 'AVXalign': True, 'size': 4, 'NT': False, 'same': True, 'congruent': 0}, 'OP': 'LOAD'} <gen_prepare_buffer> {'src': {'type': 'addresses_normal_ht', 'congruent': 5, 'same': False}, 'OP': 'REPM', 'dst': {'type': 'addresses_WT_ht', 'congruent': 7, 'same': False}} {'src': {'type': 'addresses_D_ht', 'AVXalign': False, 'size': 1, 'NT': False, 'same': False, 'congruent': 1}, 'OP': 'LOAD'} {'src': {'type': 'addresses_A_ht', 'AVXalign': False, 'size': 8, 'NT': False, 'same': False, 'congruent': 8}, 'OP': 'LOAD'} {'src': {'type': 'addresses_UC_ht', 'congruent': 0, 'same': False}, 'OP': 'REPM', 'dst': {'type': 'addresses_UC_ht', 'congruent': 5, 'same': False}} {'src': {'type': 'addresses_A_ht', 'congruent': 4, 'same': True}, 'OP': 'REPM', 'dst': {'type': 'addresses_normal_ht', 'congruent': 8, 'same': False}} {'OP': 'STOR', 'dst': {'type': 'addresses_A_ht', 'AVXalign': False, 'size': 4, 'NT': False, 'same': False, 'congruent': 10}} {'src': {'type': 'addresses_UC_ht', 'congruent': 4, 'same': False}, 'OP': 'REPM', 'dst': {'type': 'addresses_normal_ht', 'congruent': 11, 'same': False}} {'OP': 'STOR', 'dst': {'type': 'addresses_D_ht', 'AVXalign': False, 'size': 2, 'NT': False, 'same': False, 'congruent': 2}} {'src': {'type': 'addresses_WC_ht', 'congruent': 6, 'same': False}, 'OP': 'REPM', 'dst': {'type': 'addresses_normal_ht', 'congruent': 0, 'same': False}} {'OP': 'STOR', 'dst': {'type': 'addresses_D_ht', 'AVXalign': False, 'size': 4, 'NT': False, 'same': False, 'congruent': 5}} {'32': 21829} 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 */
37.627778
2,999
0.659826
c777ca103704d4e2743a42edf98127390c3e533c
564
asm
Assembly
programs/oeis/000/A000384.asm
neoneye/loda
afe9559fb53ee12e3040da54bd6aa47283e0d9ec
[ "Apache-2.0" ]
22
2018-02-06T19:19:31.000Z
2022-01-17T21:53:31.000Z
programs/oeis/000/A000384.asm
neoneye/loda
afe9559fb53ee12e3040da54bd6aa47283e0d9ec
[ "Apache-2.0" ]
41
2021-02-22T19:00:34.000Z
2021-08-28T10:47:47.000Z
programs/oeis/000/A000384.asm
neoneye/loda
afe9559fb53ee12e3040da54bd6aa47283e0d9ec
[ "Apache-2.0" ]
5
2021-02-24T21:14:16.000Z
2021-08-09T19:48:05.000Z
; A000384: Hexagonal numbers: a(n) = n*(2*n-1). ; 0,1,6,15,28,45,66,91,120,153,190,231,276,325,378,435,496,561,630,703,780,861,946,1035,1128,1225,1326,1431,1540,1653,1770,1891,2016,2145,2278,2415,2556,2701,2850,3003,3160,3321,3486,3655,3828,4005,4186,4371,4560,4753,4950,5151,5356,5565,5778,5995,6216,6441,6670,6903,7140,7381,7626,7875,8128,8385,8646,8911,9180,9453,9730,10011,10296,10585,10878,11175,11476,11781,12090,12403,12720,13041,13366,13695,14028,14365,14706,15051,15400,15753,16110,16471,16836,17205,17578,17955,18336,18721,19110,19503 mul $0,2 bin $0,2
94
496
0.769504
343317f81e2ca9ddfd7d4f53ccff347c7f008db7
758
asm
Assembly
oeis/059/A059838.asm
neoneye/loda-programs
84790877f8e6c2e821b183d2e334d612045d29c0
[ "Apache-2.0" ]
11
2021-08-22T19:44:55.000Z
2022-03-20T16:47:57.000Z
oeis/059/A059838.asm
neoneye/loda-programs
84790877f8e6c2e821b183d2e334d612045d29c0
[ "Apache-2.0" ]
9
2021-08-29T13:15:54.000Z
2022-03-09T19:52:31.000Z
oeis/059/A059838.asm
neoneye/loda-programs
84790877f8e6c2e821b183d2e334d612045d29c0
[ "Apache-2.0" ]
3
2021-08-22T20:56:47.000Z
2021-09-29T06:26:12.000Z
; A059838: Number of permutations in the symmetric group S_n that have even order. ; Submitted by Christian Krause ; 0,0,1,3,15,75,495,3465,29295,263655,2735775,30093525,370945575,4822292475,68916822975,1033752344625,16813959537375,285837312135375,5214921734397375,99083512953550125,2004231846526284375,42088868777051971875,934957186489800849375,21504015289265419535625,520444368391989625959375,13011109209799740648984375,340788940288324502208609375,9201301387784761559632453125,259324006920606914270844234375,7520396200697600513854482796875,226933251813970116856323617109375,7034930806233073622546032130390625 mov $2,1 lpb $0 mul $1,$0 sub $2,$3 mul $3,2 add $3,$0 sub $3,1 mod $3,2 mul $3,$2 add $1,$3 mul $2,$0 sub $0,1 lpe mov $0,$1
39.894737
495
0.819261
2c4cd4a75ee65b3f341696e885f7f759f53f6ec3
3,174
asm
Assembly
macros.asm
jeremylive/Shared_Code
bbb4e105aeb2412b7b3b8ff8b5ee2e791254fb77
[ "Unlicense" ]
null
null
null
macros.asm
jeremylive/Shared_Code
bbb4e105aeb2412b7b3b8ff8b5ee2e791254fb77
[ "Unlicense" ]
null
null
null
macros.asm
jeremylive/Shared_Code
bbb4e105aeb2412b7b3b8ff8b5ee2e791254fb77
[ "Unlicense" ]
null
null
null
;;ESPACIO DE MACROS ;;;MACRO DE EXPLICITO A STRBIN %macro IntToBin 2 push eax push ebx push ecx push edx mov eax, %1 mov ebx, [eax] mov ecx, 31 xor edx, edx %%while: dec ecx cmp ecx, 0 je %%salir ror ebx , 1 jc %%inicio jmp while %%inicio: push eax mov eax, %2 mov [eax + edx], '0' mov [eax + edx], '1' pop eax %%largo: dec ecx cmp ecx,0 je %%salir push eax mov eax, %2 ror ebx, 1 jc %%uno jmp %%cero %%uno: mov byte[eax + edx], '1' pop eax jmp %%largo %%cero: mov byte[eax + edx], '0' pop eax jmp %%largo %%salir: PutCh '^' PutStr string pop edx pop ecx pop ebx pop eax %endmacro ;;;MACRO DE EXPLICITO A STROCT %macro IntToOct 1 push eax push ebx push ecx push edx pop edx pop ecx pop ebx pop eax %endmacro ;;;MACRO DE EXPLICITO A STRDEC %macro IntToDec 1 push eax push ebx push ecx push edx pop edx pop ecx pop ebx pop eax %endmacro ;;;MACRO DE EXPLICITO A STRHEX %macro IntToHex 1 push eax push ebx push ecx push edx pop edx pop ecx pop ebx pop eax %endmacro ;;;MACRO DE HEXADECIMAL A EXPLICITO (BINARIO) %macro HexToInt 2 ;;; IN: "H000B" ;;; OUT: 0000 0000 0000 1011 (11) push eax push ebx push ecx push edx xor eax,eax xor ebx, ebx xor ecx, ecx mov eax, %1 mov ecx, %2 %%ite: mov ch, [eax] sub ch, 30H cmp ch, 9 jg %%no_number cmp ch, 0 jl %%no_valid add bl, ch dec cl cmp cl, 0 je %%salir rol ebx, 4 inc eax jmp %%ite %%no_number: sub ch, 17 cmp ch, 5 jg %%no_valid add ch, 10 add bl, ch dec cl cmp cl, 0 je %%salir rol ebx, 4 inc eax jmp %%ite %%no_valid: PutStr error_variableMsg2 xor ebx, ebx %%salir: PutCh '(' PutLInt ebx PutCh ')' mov [aux], ebx pop edx pop ecx pop ebx pop eax %endmacro ;;;MACRO DE OCTAL A EXPLICITO (BINARIO) %macro OctToInt 2 ;;; IN: "00000017" ;;; OUT: 0000 0000 0000 1111 (7) ;;; _--- ___- --__ _--- ;;; (s)(0) (0)(0) (1) (7) ;PutLInt eax PutCh '<' PutCh '-' push eax push ebx push ecx push edx xor eax,eax xor ebx, ebx xor ecx, ecx mov eax, %1 PutStr eax mov ecx, %2 %%ite: mov ch, [eax] sub ch, 30H cmp ch, 7 jg %%no_valid cmp ch, 0 jl %%no_valid add bl, ch dec cl cmp cl, 0 je %%salir rol ebx, 3 inc eax jmp %%ite %%no_valid: PutStr error_variableMsg2 xor ebx, ebx %%salir: PutCh '(' PutLInt ebx PutCh ')' mov [aux], ebx pop edx pop ecx pop ebx pop eax %endmacro ;;;MACRO DE BINARIO A EXPLICITO (BINARIO) %macro BinToInt 2 ;;; IN: "000101" ;;; OUT: 0000 0000 0000 0101 (5) push eax push ebx push ecx push edx xor eax,eax xor ebx, ebx xor ecx, ecx mov eax, %1 mov ecx, %2 %%ite: mov ch, [eax] PutStr eax sub ch, 30H cmp ch, 1 jg %%no_valid cmp ch, 0 jl %%no_valid add bl, ch dec cl cmp cl, 0 je %%salir rol ebx,1 inc eax jmp %%ite %%no_valid: PutStr error_variableMsg2 xor ebx, ebx %%salir: PutCh '(' PutLInt ebx PutCh ')' mov [aux], ebx pop edx pop ecx pop ebx pop eax %endmacro
8.991501
45
0.58097
74a50882b40bb1905d54501590ebf88a1c6837c2
573
asm
Assembly
programs/oeis/053/A053209.asm
karttu/loda
9c3b0fc57b810302220c044a9d17db733c76a598
[ "Apache-2.0" ]
1
2021-03-15T11:38:20.000Z
2021-03-15T11:38:20.000Z
programs/oeis/053/A053209.asm
karttu/loda
9c3b0fc57b810302220c044a9d17db733c76a598
[ "Apache-2.0" ]
null
null
null
programs/oeis/053/A053209.asm
karttu/loda
9c3b0fc57b810302220c044a9d17db733c76a598
[ "Apache-2.0" ]
null
null
null
; A053209: Row sums of A051598. ; 1,5,14,32,68,140,284,572,1148,2300,4604,9212,18428,36860,73724,147452,294908,589820,1179644,2359292,4718588,9437180,18874364,37748732,75497468,150994940,301989884,603979772,1207959548,2415919100,4831838204,9663676412,19327352828,38654705660,77309411324,154618822652,309237645308,618475290620,1236950581244,2473901162492,4947802324988,9895604649980,19791209299964,39582418599932,79164837199868,158329674399740,316659348799484,633318697598972,1266637395197948,2533274790395900,5066549580791804 mov $1,2 pow $1,$0 mul $1,9 sub $1,7 div $1,2
63.666667
493
0.853403
ffde165ab7cb7c8ed590ca4e644e7d03573c9fe1
312
asm
Assembly
oeis/021/A021639.asm
neoneye/loda-programs
84790877f8e6c2e821b183d2e334d612045d29c0
[ "Apache-2.0" ]
11
2021-08-22T19:44:55.000Z
2022-03-20T16:47:57.000Z
oeis/021/A021639.asm
neoneye/loda-programs
84790877f8e6c2e821b183d2e334d612045d29c0
[ "Apache-2.0" ]
9
2021-08-29T13:15:54.000Z
2022-03-09T19:52:31.000Z
oeis/021/A021639.asm
neoneye/loda-programs
84790877f8e6c2e821b183d2e334d612045d29c0
[ "Apache-2.0" ]
3
2021-08-22T20:56:47.000Z
2021-09-29T06:26:12.000Z
; A021639: Decimal expansion of 1/635. ; Submitted by Jon Maiga ; 0,0,1,5,7,4,8,0,3,1,4,9,6,0,6,2,9,9,2,1,2,5,9,8,4,2,5,1,9,6,8,5,0,3,9,3,7,0,0,7,8,7,4,0,1,5,7,4,8,0,3,1,4,9,6,0,6,2,9,9,2,1,2,5,9,8,4,2,5,1,9,6,8,5,0,3,9,3,7,0,0,7,8,7,4,0,1,5,7,4,8,0,3,1,4,9,6,0,6 seq $0,199684 ; 4*10^n+1. div $0,254 mod $0,10
39
199
0.560897
be5eabeb06c62d8401db6b276e81457708910436
4,110
asm
Assembly
lab3/mathtest.asm
jeffliou64/elec291
dc6c77554b6894ae703328eea61653aab429d8ae
[ "MIT" ]
null
null
null
lab3/mathtest.asm
jeffliou64/elec291
dc6c77554b6894ae703328eea61653aab429d8ae
[ "MIT" ]
null
null
null
lab3/mathtest.asm
jeffliou64/elec291
dc6c77554b6894ae703328eea61653aab429d8ae
[ "MIT" ]
1
2022-01-28T19:04:22.000Z
2022-01-28T19:04:22.000Z
; mathtest.asm: Examples using math32.asm routines $NOLIST $MODLP52 $LIST org 0000H ljmp MyProgram ; These register definitions needed by 'math32.inc' DSEG at 30H x: ds 4 y: ds 4 bcd: ds 5 BSEG mf: dbit 1 $NOLIST $include(math32.inc) $LIST ; These 'equ' must match the hardware wiring ; They are used by 'LCD_4bit.inc' LCD_RS equ P1.4 LCD_RW equ P1.5 LCD_E equ P1.6 LCD_D4 equ P3.2 LCD_D5 equ P3.3 LCD_D6 equ P3.4 LCD_D7 equ P3.5 $NOLIST $include(LCD_4bit.inc) $LIST CSEG Left_blank mac mov a, %0 anl a, #0xf0 swap a jz Left_blank_%M_a ljmp %1 Left_blank_%M_a: Display_char(#' ') mov a, %0 anl a, #0x0f jz Left_blank_%M_b ljmp %1 Left_blank_%M_b: Display_char(#' ') endmac ; Sends 10-digit BCD number in bcd to the LCD Display_10_digit_BCD: Set_Cursor(2, 7) Display_BCD(bcd+4) Display_BCD(bcd+3) Display_BCD(bcd+2) Display_BCD(bcd+1) Display_BCD(bcd+0) ; Replace all the zeros to the left with blanks Set_Cursor(2, 7) Left_blank(bcd+4, skip_blank) Left_blank(bcd+3, skip_blank) Left_blank(bcd+2, skip_blank) Left_blank(bcd+1, skip_blank) mov a, bcd+0 anl a, #0f0h swap a jnz skip_blank Display_char(#' ') skip_blank: ret ; We can display a number any way we want. In this case with ; four decimal places. Display_formated_BCD: Set_Cursor(2, 7) Display_char(#' ') Display_BCD(bcd+3) Display_BCD(bcd+2) Display_char(#'.') Display_BCD(bcd+1) Display_BCD(bcd+0) ret wait_for_P4_5: jb P4.5, $ ; loop while the button is not pressed Wait_Milli_Seconds(#50) ; debounce time jb P4.5, wait_for_P4_5 ; it was a bounce, try again jnb P4.5, $ ; loop while the button is pressed ret Test_msg: db 'Test xx answer:', 0 MyProgram: mov sp, #07FH ; Initialize the stack pointer mov PMOD, #0 ; Configure all ports in bidirectional mode lcall LCD_4BIT Set_Cursor(1, 1) Send_Constant_String(#Test_msg) Forever: ; Test 1 Set_Cursor(1, 6) Display_BCD(#0x01) ; LCD line 1 should say now 'Test 01 answer:' ; Try multiplying 1234 x 4567 = 5635678 mov x+0, #low(1234) mov x+1, #high(1234) mov x+2, #0 mov x+3, #0 mov y+0, #low(4567) mov y+1, #high(4567) mov y+2, #0 mov y+3, #0 ; mul32 and hex2bcd are in math32.asm lcall mul32 lcall hex2bcd ; display the result lcall Display_10_digit_BCD ; Now wait for key1 to be pressed and released so we can see the result. lcall wait_for_P4_5 ; Test 2 Set_Cursor(1, 6); Display_BCD(#0x02) ; There are macros defined in math32.asm that can be used to load constants ; to variables x and y. The same code above may be written as: Load_x(1234) Load_y(4567) lcall mul32 lcall hex2bcd lcall Display_10_digit_BCD lcall wait_for_P4_5 ; Test 3 Set_Cursor(1, 6); Display_BCD(#0x03) ; Try dividing 5635678 / 1234 = 4567 Load_x(5635678) Load_y(1234) lcall div32 ; This subroutine is in math32.asm lcall hex2bcd lcall Display_10_digit_BCD lcall wait_for_P4_5 ; Test 4 Set_Cursor(1, 6); Display_BCD(#0x04) ; Try adding 1234 + 4567 = 5801 Load_x(1234) Load_y(4567) lcall add32 ; This subroutine is in math32.asm lcall hex2bcd lcall Display_10_digit_BCD lcall wait_for_P4_5 ; Test 5 Set_Cursor(1, 6); Display_BCD(#0x05) ; Try subtracting 4567 - 1234 = 3333 Load_x(4567) Load_y(1234) lcall sub32 ; This subroutine is in math32.asm lcall hex2bcd lcall Display_10_digit_BCD lcall wait_for_P4_5 ; Test 6 Set_Cursor(1, 6); Display_BCD(#0x06) ; Ok, that was easy. Try computing the area of circle ; with a radius of 23.2. Remember we are working with ; usigned 32-bit integers here, so there is the risk ; of overflow, in particular when multiplying big numbers. ; One trick you may use: approximate pi to 355/113. Load_x(232) Load_y(232) lcall mul32 ; Result is stored in x ; Now multiply by pi Load_y(35500) lcall mul32 Load_y(113) lcall div32 lcall hex2bcd lcall Display_formated_BCD ; result should be 1690.9309 lcall wait_for_P4_5 ljmp Forever END
21.40625
77
0.690754
9e1812dada044c9116158e51123dc2e102144ea3
179
asm
Assembly
libsrc/_DEVELOPMENT/threads/mutex/c/sdcc_iy/mtx_unlock_fastcall.asm
jpoikela/z88dk
7108b2d7e3a98a77de99b30c9a7c9199da9c75cb
[ "ClArtistic" ]
640
2017-01-14T23:33:45.000Z
2022-03-30T11:28:42.000Z
libsrc/_DEVELOPMENT/threads/mutex/c/sdcc_iy/mtx_unlock_fastcall.asm
jpoikela/z88dk
7108b2d7e3a98a77de99b30c9a7c9199da9c75cb
[ "ClArtistic" ]
1,600
2017-01-15T16:12:02.000Z
2022-03-31T12:11:12.000Z
libsrc/_DEVELOPMENT/threads/mutex/c/sdcc_iy/mtx_unlock_fastcall.asm
jpoikela/z88dk
7108b2d7e3a98a77de99b30c9a7c9199da9c75cb
[ "ClArtistic" ]
215
2017-01-17T10:43:03.000Z
2022-03-23T17:25:02.000Z
; int mtx_unlock_fastcall(mtx_t *m) SECTION code_clib SECTION code_threads_mutex PUBLIC _mtx_unlock_fastcall EXTERN asm_mtx_unlock defc _mtx_unlock_fastcall = asm_mtx_unlock
14.916667
42
0.854749
e74084a73e2983f67691262b7ad40e7cb63e1c7c
4,325
asm
Assembly
Transynther/x86/_processed/NONE/_xt_/i9-9900K_12_0xa0.log_21829_433.asm
ljhsiun2/medusa
67d769b8a2fb42c538f10287abaf0e6dbb463f0c
[ "MIT" ]
9
2020-08-13T19:41:58.000Z
2022-03-30T12:22:51.000Z
Transynther/x86/_processed/NONE/_xt_/i9-9900K_12_0xa0.log_21829_433.asm
ljhsiun2/medusa
67d769b8a2fb42c538f10287abaf0e6dbb463f0c
[ "MIT" ]
1
2021-04-29T06:29:35.000Z
2021-05-13T21:02:30.000Z
Transynther/x86/_processed/NONE/_xt_/i9-9900K_12_0xa0.log_21829_433.asm
ljhsiun2/medusa
67d769b8a2fb42c538f10287abaf0e6dbb463f0c
[ "MIT" ]
3
2020-07-14T17:07:07.000Z
2022-03-21T01:12:22.000Z
.global s_prepare_buffers s_prepare_buffers: push %r10 push %r14 push %r8 push %rdx lea addresses_D_ht+0x1ef4, %r14 clflush (%r14) nop nop nop add %rdx, %rdx mov $0x6162636465666768, %r10 movq %r10, (%r14) sub $32054, %r8 pop %rdx pop %r8 pop %r14 pop %r10 ret .global s_faulty_load s_faulty_load: push %r10 push %r12 push %r9 push %rax push %rdi push %rdx // Store lea addresses_US+0x15d2, %r12 nop nop sub %rdx, %rdx mov $0x5152535455565758, %rax movq %rax, (%r12) // Exception!!! nop nop mov (0), %r9 nop xor $61648, %rax // Faulty Load lea addresses_PSE+0xdef4, %rdi nop nop nop sub $39132, %r10 mov (%rdi), %eax lea oracles, %rdi and $0xff, %rax shlq $12, %rax mov (%rdi,%rax,1), %rax pop %rdx pop %rdi pop %rax pop %r9 pop %r12 pop %r10 ret /* <gen_faulty_load> [REF] {'src': {'NT': False, 'same': False, 'congruent': 0, 'type': 'addresses_PSE', 'AVXalign': True, 'size': 4}, 'OP': 'LOAD'} {'OP': 'STOR', 'dst': {'NT': False, 'same': False, 'congruent': 1, 'type': 'addresses_US', 'AVXalign': False, 'size': 8}} [Faulty Load] {'src': {'NT': False, 'same': True, 'congruent': 0, 'type': 'addresses_PSE', 'AVXalign': False, 'size': 4}, 'OP': 'LOAD'} <gen_prepare_buffer> {'OP': 'STOR', 'dst': {'NT': False, 'same': True, 'congruent': 11, 'type': 'addresses_D_ht', 'AVXalign': False, 'size': 8}} {'33': 21829} 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 */
56.168831
2,999
0.660116
d4516bfa33dcce868bddfd448be96835cb3a4da7
198
asm
Assembly
tests/listing/sorted_msglst.asm
fengjixuchui/sjasmplus
df0fabd2411bf89e23637fce46d273f52dafbe16
[ "BSD-3-Clause" ]
220
2016-10-22T19:44:39.000Z
2022-03-29T20:57:04.000Z
tests/listing/sorted_msglst.asm
ped7g/sjasmplus
487635c8057cd5594c372d9b70bc00a3f3a1ecc4
[ "BSD-3-Clause" ]
153
2018-05-07T10:31:23.000Z
2022-03-30T04:35:59.000Z
tests/listing/sorted_msglst.asm
ped7g/sjasmplus
487635c8057cd5594c372d9b70bc00a3f3a1ecc4
[ "BSD-3-Clause" ]
51
2016-05-12T21:27:36.000Z
2022-03-27T15:16:16.000Z
; verify the symbol table appended by --msg=lstlab is sorted (same as --lstlab=sort) ORG $8000 FirstLabel: SecondLabel: LastLabel: ; should be in the middle of the table after being sorted
33
84
0.732323
d776813f1f05167c3b79b4a5bb164d7e4310cebe
4,074
asm
Assembly
RECTANGLE_AVR/RectangleScenario2CTR/Rectangle128FlashLowF.asm
FreeDisciplina/BlockCiphersOnAVR
79e200e36f80daacd5b35eed2fe901b263d7b5d0
[ "MIT" ]
12
2015-12-28T07:17:45.000Z
2022-01-26T03:42:06.000Z
RECTANGLE_AVR/RectangleScenario2CTR/Rectangle128FlashLowF.asm
FreeDisciplina/PRINCE_LED_RECTANGLE_AVR
79e200e36f80daacd5b35eed2fe901b263d7b5d0
[ "MIT" ]
null
null
null
RECTANGLE_AVR/RectangleScenario2CTR/Rectangle128FlashLowF.asm
FreeDisciplina/PRINCE_LED_RECTANGLE_AVR
79e200e36f80daacd5b35eed2fe901b263d7b5d0
[ "MIT" ]
3
2016-08-20T14:16:52.000Z
2020-11-04T12:11:14.000Z
.EQU COUNTER_BYTE = 8 .EQU COUNT_NUM_BYTE = (8) .EQU PTEXT_NUM_BYTE = (8*2) #define ENCRYPT ; Registers declarations .def s0 =r0 .def s1 =r1 .def s2 =r2 .def s3 =r3 .def s4 =r4 .def s5 =r5 .def s6 =r6 .def s7 =r7 .def s10 =r8 .def s11 =r9 .def s12 =r10 .def s13 =r11 .def s14 =r12 .def s15 =r13 .def s16 =r14 .def s17 =r15 .def t0 =r16 .def t1 =r17 .def t2 =r18 .def t3 =r19 .def rrn =r20 .def rcnt =r21 .def rzero =r22 .def kt0 =r24 .def kt1 =r25 .def YL =r28 .def YH =r29 .def ZL =r30 .def ZH =r31 ;;;**************************************************************************** ;;; ;;; store_output ;;; .MACRO store_output ld t0, Y eor s0, t0 st Y+, s0 ld t0, Y eor s1, t0 st Y+, s1 ld t0, Y eor s2, t0 st Y+, s2 ld t0, Y eor s3, t0 st Y+, s3 ld t0, Y eor s4, t0 st Y+, s4 ld t0, Y eor s5, t0 st Y+, s5 ld t0, Y eor s6, t0 st Y+, s6 ld t0, Y eor s7, t0 st Y+, s7 .ENDMACRO ;;;**************************************************************************** .MACRO keyxor eor s3, kt0 eor s7, kt1 lpm t0, Z+ eor s0, t0 lpm t0, Z+ eor s2, t0 lpm t0, Z+ eor s4, t0 lpm t0, Z+ eor s6, t0 lpm kt0, Z+ eor s5, kt0 lpm kt1, Z+ eor s1, kt1 .ENDMACRO ;;;**************************************************************************** .MACRO forward_round keyxor ;forward_sbox block0 movw t0, s4 eor s4, s2 eor s5, s3 com s2 com s3 movw t2, s0 and s0, s2 and s1, s3 or s2, s6 or s3, s7 eor s6, t0 eor s7, t1 eor s0, s6 eor s1, s7 eor s2, t2 eor s3, t3 and s6, s2 and s7, s3 eor s6, s4 eor s7, s5 or s4, s0 or s5, s1 eor s4, s2 eor s5, s3 eor s2, t0 eor s3, t1 ;forward_permutation block0 ;rotate16_left_row1 <<< 1 lsl s2 rol s3 adc s2, rzero ;rotate16_left_row2 <<< 12 = >>> 4 swap s4 swap s5 movw t0, s4 eor t1, t0 andi t1, 0xf0 eor s4, t1 eor s5, t1 ;rotate16_left_row3 <<< 13 = >>> 3 = ((>>>4)<<<1) swap s6 swap s7 movw t0, s6 eor t1, t0 andi t1, 0xf0 eor s6, t1 eor s7, t1 lsl s6 rol s7 adc s6, rzero .ENDMACRO .MACRO forward_last_round keyxor .ENDMACRO #ifdef ENCRYPT encrypt: clr rzero ldi XH, high(SRAM_COUNT) ldi XL, low(SRAM_COUNT) ld s0, X+ ld s1, X+ ld s2, X+ ld s3, X+ ld s4, X+ ld s5, X+ ld s6, X+ ld s7, X+ movw s10, s0 movw s12, s2 movw s14, s4 movw s16, s6 inc s17 ldi YH, high(SRAM_PTEXT) ;SRAM_PTEXT ldi YL, low(SRAM_PTEXT) ;SRAM_PTEXT ldi rrn, 1 blocks: ldi rcnt, 25 ldi ZH, high(RK<<1) ldi ZL, low(RK<<1) lpm kt0, Z+ lpm kt1, Z+ encrypt_start: forward_round dec rcnt cpse rcnt, rzero rjmp encrypt_start forward_last_round store_output dec rrn cpse rrn, rzero rjmp encrypt_end movw s0, s10 movw s2, s12 movw s4, s14 movw s6, s16 rjmp blocks encrypt_end: ret ; master key is: 10 0f 0e 0d 0c 0b 0a 09 08 07 06 05 04 03 02 01 ; reordered: 0 1 2 3 4 5 6 7 => 3 7 0 2 4 6 5 1 and then remove the duplicated 3 7 inter-round RK: .db 0x0b, 0x03, 0x10, 0x0c, 0x08, 0x04, 0x07, 0x0f .db 0xe3, 0xfb, 0x06, 0x1c, 0x06, 0x17 .db 0xfc, 0x00, 0x1e, 0x1a, 0x09, 0x1d .db 0x19, 0xfd, 0x10, 0xf8, 0x1c, 0xfe .db 0xed, 0x0e, 0xf5, 0xe8, 0x13, 0xe1 .db 0x1c, 0xeb, 0xf0, 0xfc, 0xe2, 0xe0 .db 0xeb, 0xfb, 0x14, 0x18, 0xe5, 0x0b .db 0xed, 0x18, 0xe0, 0x0c, 0xed, 0xee .db 0x0f, 0xfb, 0xf9, 0x09, 0x10, 0xec .db 0xfe, 0xf4, 0x06, 0xf4, 0x06, 0x19 .db 0xe0, 0xfb, 0x02, 0xf8, 0x07, 0xe8 .db 0x08, 0xe7, 0xff, 0xfa, 0x16, 0xfc .db 0xfc, 0xef, 0x12, 0x0d, 0x11, 0x0a .db 0xeb, 0x1e, 0x0e, 0x0f, 0xef, 0x19 .db 0x0e, 0xf4, 0x16, 0xe0, 0xed, 0xf1 .db 0xfe, 0x1b, 0x10, 0xfc, 0xe1, 0x13 .db 0x02, 0x09, 0x10, 0x08, 0x07, 0xe5 .db 0xfb, 0xe7, 0xe3, 0x1a, 0xe1, 0xfb .db 0xe0, 0x04, 0xf5, 0xe1, 0xee, 0xe6 .db 0xe1, 0xee, 0xe0, 0xf4, 0x15, 0x15 .db 0xe0, 0x0b, 0x0a, 0x15, 0xfb, 0xfb .db 0x0a, 0xea, 0x06, 0xff, 0x0c, 0xea .db 0xe1, 0x08, 0x01, 0xf9, 0x12, 0x02 .db 0xfa, 0x07, 0x0d, 0x19, 0xfe, 0x15 .db 0x11, 0xed, 0xe6, 0xec, 0x19, 0xfe .db 0x1e, 0xf4, 0x14, 0x1a, 0x19, 0xe4 #endif
15.490494
94
0.577565
901c3f4b014bdeac5defe8ae4d8c66ea0b534959
259
asm
Assembly
programs/oeis/033/A033347.asm
neoneye/loda
afe9559fb53ee12e3040da54bd6aa47283e0d9ec
[ "Apache-2.0" ]
22
2018-02-06T19:19:31.000Z
2022-01-17T21:53:31.000Z
programs/oeis/033/A033347.asm
neoneye/loda
afe9559fb53ee12e3040da54bd6aa47283e0d9ec
[ "Apache-2.0" ]
41
2021-02-22T19:00:34.000Z
2021-08-28T10:47:47.000Z
programs/oeis/033/A033347.asm
neoneye/loda
afe9559fb53ee12e3040da54bd6aa47283e0d9ec
[ "Apache-2.0" ]
5
2021-02-24T21:14:16.000Z
2021-08-09T19:48:05.000Z
; A033347: a(n) = floor(27/n). ; 27,13,9,6,5,4,3,3,3,2,2,2,2,1,1,1,1,1,1,1,1,1,1,1,1,1,1,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0 add $0,1 mov $1,27 div $1,$0 mov $0,$1
32.375
187
0.509653
4e40aefd62e4e5fce1548c17e00733aa9fe7beed
809
asm
Assembly
programs/oeis/158/A158659.asm
neoneye/loda
afe9559fb53ee12e3040da54bd6aa47283e0d9ec
[ "Apache-2.0" ]
22
2018-02-06T19:19:31.000Z
2022-01-17T21:53:31.000Z
programs/oeis/158/A158659.asm
neoneye/loda
afe9559fb53ee12e3040da54bd6aa47283e0d9ec
[ "Apache-2.0" ]
41
2021-02-22T19:00:34.000Z
2021-08-28T10:47:47.000Z
programs/oeis/158/A158659.asm
neoneye/loda
afe9559fb53ee12e3040da54bd6aa47283e0d9ec
[ "Apache-2.0" ]
5
2021-02-24T21:14:16.000Z
2021-08-09T19:48:05.000Z
; A158659: a(n) = 784*n^2 + 28. ; 28,812,3164,7084,12572,19628,28252,38444,50204,63532,78428,94892,112924,132524,153692,176428,200732,226604,254044,283052,313628,345772,379484,414764,451612,490028,530012,571564,614684,659372,705628,753452,802844,853804,906332,960428,1016092,1073324,1132124,1192492,1254428,1317932,1383004,1449644,1517852,1587628,1658972,1731884,1806364,1882412,1960028,2039212,2119964,2202284,2286172,2371628,2458652,2547244,2637404,2729132,2822428,2917292,3013724,3111724,3211292,3312428,3415132,3519404,3625244,3732652,3841628,3952172,4064284,4177964,4293212,4410028,4528412,4648364,4769884,4892972,5017628,5143852,5271644,5401004,5531932,5664428,5798492,5934124,6071324,6210092,6350428,6492332,6635804,6780844,6927452,7075628,7225372,7376684,7529564,7684012 mul $0,28 pow $0,2 add $0,28
115.571429
746
0.838072
ba91d535101269d65b6f21c9072fab12582b85da
449
asm
Assembly
oeis/171/A171572.asm
neoneye/loda-programs
84790877f8e6c2e821b183d2e334d612045d29c0
[ "Apache-2.0" ]
11
2021-08-22T19:44:55.000Z
2022-03-20T16:47:57.000Z
oeis/171/A171572.asm
neoneye/loda-programs
84790877f8e6c2e821b183d2e334d612045d29c0
[ "Apache-2.0" ]
9
2021-08-29T13:15:54.000Z
2022-03-09T19:52:31.000Z
oeis/171/A171572.asm
neoneye/loda-programs
84790877f8e6c2e821b183d2e334d612045d29c0
[ "Apache-2.0" ]
3
2021-08-22T20:56:47.000Z
2021-09-29T06:26:12.000Z
; A171572: a(n) = 0+1+2+...+n in lunar arithmetic in base 5 written in base 10. ; Submitted by Christian Krause ; 0,1,2,3,4,9,9,9,9,9,14,14,14,14,14,19,19,19,19,19,24,24,24,24,24,49,49,49,49,49,49,49,49,49,49,49,49,49,49,49,49,49,49,49,49,49,49,49,49,49,74,74,74,74,74,74,74,74,74,74,74,74,74,74,74,74,74,74,74,74,74,74,74 mov $2,2 mov $3,1 lpb $0 mov $2,$0 div $0,5 add $2,1 mul $2,2 mul $2,$3 mul $3,5 lpe mov $0,$2 div $0,2 sub $0,1
24.944444
210
0.614699
50853fb9d64c1e05d88193a9995cbd7f112f5d37
339
asm
Assembly
programs/oeis/173/A173864.asm
neoneye/loda
afe9559fb53ee12e3040da54bd6aa47283e0d9ec
[ "Apache-2.0" ]
22
2018-02-06T19:19:31.000Z
2022-01-17T21:53:31.000Z
programs/oeis/173/A173864.asm
neoneye/loda
afe9559fb53ee12e3040da54bd6aa47283e0d9ec
[ "Apache-2.0" ]
41
2021-02-22T19:00:34.000Z
2021-08-28T10:47:47.000Z
programs/oeis/173/A173864.asm
neoneye/loda
afe9559fb53ee12e3040da54bd6aa47283e0d9ec
[ "Apache-2.0" ]
5
2021-02-24T21:14:16.000Z
2021-08-09T19:48:05.000Z
; A173864: Expansion of 9/8 in base phi. ; 1,0,0,0,0,1,0,1,0,0,0,0,0,0,0,0,0,1,0,1,0,0,0,0,0,0,0,0,0,1,0,1,0,0,0,0,0,0,0,0,0,1,0,1,0,0,0,0,0,0,0,0,0,1,0,1,0,0,0,0,0,0,0,0,0,1,0,1,0,0,0,0,0,0,0,0,0,1,0,1,0,0,0,0,0,0,0,0,0,1,0,1,0,0,0,0,0,0,0,0 mov $1,$0 lpb $1 mod $0,2 mul $0,$1 add $0,8 div $0,4 mov $1,2 lpe gcd $0,3 div $0,2
24.214286
201
0.519174
e4f39277f02b7fbd241611c09eba464efcfd3c3f
702
asm
Assembly
os.asm
thesam/bootloader
a6077e9a76a379d3671e20ccceef2d991498e18d
[ "MIT" ]
null
null
null
os.asm
thesam/bootloader
a6077e9a76a379d3671e20ccceef2d991498e18d
[ "MIT" ]
null
null
null
os.asm
thesam/bootloader
a6077e9a76a379d3671e20ccceef2d991498e18d
[ "MIT" ]
null
null
null
use16 org 0x8000 main: call clear_screen xor dx, dx mov dh, 0 call move_cursor mov si, msg call print_string xor dx, dx mov dh, 1 call move_cursor mov si, prompt call print_string jmp $ move_cursor: ; dh=row mov al, 0 mov ah, 2 xor bx, bx int 10h ret clear_screen: xor ax, ax mov ah, 6 mov al, 0 xor bx, bx mov bh, 1fh xor cx, cx mov dx, 184fh int 10h ; Scroll screen ret print_string: ; si = string to print .loop: lodsb or al, al jz .done mov ah, 0x0e int 0x10 ; Print character jmp .loop .done: ret msg db "Hello, Studentkonferens! This is the operating system!", 0 prompt db "$ ", 0
12.535714
66
0.603989
1b1f6b1eb04acec1f5ad80f72c049af3326caf04
101
asm
Assembly
test/naive-tests/5-simple-mem.asm
skyzh/mips-simulator
61a319ab776fa30831e75aab906c6ef22bb7755e
[ "MIT" ]
35
2020-04-02T05:15:53.000Z
2022-03-13T14:15:32.000Z
test/naive-tests/5-simple-mem.asm
skyzh/mips-simulator
61a319ab776fa30831e75aab906c6ef22bb7755e
[ "MIT" ]
1
2020-04-04T10:12:11.000Z
2020-04-04T10:12:11.000Z
test/naive-tests/5-simple-mem.asm
skyzh/mips-simulator
61a319ab776fa30831e75aab906c6ef22bb7755e
[ "MIT" ]
1
2020-12-27T21:15:20.000Z
2020-12-27T21:15:20.000Z
li $a0, 0x10 sb $a0, 0x2000($zero) sw $a0, 0x2010($zero) lb $a1, 0x2000($zero) lw $a2, 0x2010($zero)
16.833333
21
0.633663
a20ca7f376b9b0231169e63fa4d7e3f2f3f72f74
94,731
asm
Assembly
project/ntstub/i386/5_1_2600_sp3_ssdt_sysenter.asm
rmusser01/windows-syscall-table
6216a2559d714eb04bad278792a6544ab8f21d41
[ "BSD-3-Clause" ]
6
2018-01-18T02:30:27.000Z
2020-01-11T03:42:33.000Z
project/ntstub/i386/5_1_2600_sp3_ssdt_sysenter.asm
stonedreamforest/windows-syscall-table
6216a2559d714eb04bad278792a6544ab8f21d41
[ "BSD-3-Clause" ]
null
null
null
project/ntstub/i386/5_1_2600_sp3_ssdt_sysenter.asm
stonedreamforest/windows-syscall-table
6216a2559d714eb04bad278792a6544ab8f21d41
[ "BSD-3-Clause" ]
3
2017-12-29T07:50:35.000Z
2020-10-15T09:28:54.000Z
; DO NOT MODIFY THIS FILE DIRECTLY! ; author: @TinySecEx ; ssdt asm stub for 5.1.2600-sp3-windows-xp i386 .686 .mmx .xmm .model flat,stdcall option casemap:none option prologue:none option epilogue:none .code ; ULONG __stdcall NtAcceptConnectPort( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 , ULONG arg_06 ); _5_1_2600_sp3_windows_xp_NtAcceptConnectPort PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD , arg_06:DWORD mov eax , 0 mov edx , 7FFE0300h call dword ptr [edx] ret 24 _5_1_2600_sp3_windows_xp_NtAcceptConnectPort ENDP ; ULONG __stdcall NtAccessCheck( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 , ULONG arg_06 , ULONG arg_07 , ULONG arg_08 ); _5_1_2600_sp3_windows_xp_NtAccessCheck PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD , arg_06:DWORD , arg_07:DWORD , arg_08:DWORD mov eax , 1 mov edx , 7FFE0300h call dword ptr [edx] ret 32 _5_1_2600_sp3_windows_xp_NtAccessCheck ENDP ; ULONG __stdcall NtAccessCheckAndAuditAlarm( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 , ULONG arg_06 , ULONG arg_07 , ULONG arg_08 , ULONG arg_09 , ULONG arg_10 , ULONG arg_11 ); _5_1_2600_sp3_windows_xp_NtAccessCheckAndAuditAlarm PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD , arg_06:DWORD , arg_07:DWORD , arg_08:DWORD , arg_09:DWORD , arg_10:DWORD , arg_11:DWORD mov eax , 2 mov edx , 7FFE0300h call dword ptr [edx] ret 44 _5_1_2600_sp3_windows_xp_NtAccessCheckAndAuditAlarm ENDP ; ULONG __stdcall NtAccessCheckByType( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 , ULONG arg_06 , ULONG arg_07 , ULONG arg_08 , ULONG arg_09 , ULONG arg_10 , ULONG arg_11 ); _5_1_2600_sp3_windows_xp_NtAccessCheckByType PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD , arg_06:DWORD , arg_07:DWORD , arg_08:DWORD , arg_09:DWORD , arg_10:DWORD , arg_11:DWORD mov eax , 3 mov edx , 7FFE0300h call dword ptr [edx] ret 44 _5_1_2600_sp3_windows_xp_NtAccessCheckByType ENDP ; ULONG __stdcall NtAccessCheckByTypeAndAuditAlarm( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 , ULONG arg_06 , ULONG arg_07 , ULONG arg_08 , ULONG arg_09 , ULONG arg_10 , ULONG arg_11 , ULONG arg_12 , ULONG arg_13 , ULONG arg_14 , ULONG arg_15 , ULONG arg_16 ); _5_1_2600_sp3_windows_xp_NtAccessCheckByTypeAndAuditAlarm PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD , arg_06:DWORD , arg_07:DWORD , arg_08:DWORD , arg_09:DWORD , arg_10:DWORD , arg_11:DWORD , arg_12:DWORD , arg_13:DWORD , arg_14:DWORD , arg_15:DWORD , arg_16:DWORD mov eax , 4 mov edx , 7FFE0300h call dword ptr [edx] ret 64 _5_1_2600_sp3_windows_xp_NtAccessCheckByTypeAndAuditAlarm ENDP ; ULONG __stdcall NtAccessCheckByTypeResultList( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 , ULONG arg_06 , ULONG arg_07 , ULONG arg_08 , ULONG arg_09 , ULONG arg_10 , ULONG arg_11 ); _5_1_2600_sp3_windows_xp_NtAccessCheckByTypeResultList PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD , arg_06:DWORD , arg_07:DWORD , arg_08:DWORD , arg_09:DWORD , arg_10:DWORD , arg_11:DWORD mov eax , 5 mov edx , 7FFE0300h call dword ptr [edx] ret 44 _5_1_2600_sp3_windows_xp_NtAccessCheckByTypeResultList ENDP ; ULONG __stdcall NtAccessCheckByTypeResultListAndAuditAlarm( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 , ULONG arg_06 , ULONG arg_07 , ULONG arg_08 , ULONG arg_09 , ULONG arg_10 , ULONG arg_11 , ULONG arg_12 , ULONG arg_13 , ULONG arg_14 , ULONG arg_15 , ULONG arg_16 ); _5_1_2600_sp3_windows_xp_NtAccessCheckByTypeResultListAndAuditAlarm PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD , arg_06:DWORD , arg_07:DWORD , arg_08:DWORD , arg_09:DWORD , arg_10:DWORD , arg_11:DWORD , arg_12:DWORD , arg_13:DWORD , arg_14:DWORD , arg_15:DWORD , arg_16:DWORD mov eax , 6 mov edx , 7FFE0300h call dword ptr [edx] ret 64 _5_1_2600_sp3_windows_xp_NtAccessCheckByTypeResultListAndAuditAlarm ENDP ; ULONG __stdcall NtAccessCheckByTypeResultListAndAuditAlarmByHandle( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 , ULONG arg_06 , ULONG arg_07 , ULONG arg_08 , ULONG arg_09 , ULONG arg_10 , ULONG arg_11 , ULONG arg_12 , ULONG arg_13 , ULONG arg_14 , ULONG arg_15 , ULONG arg_16 , ULONG arg_17 ); _5_1_2600_sp3_windows_xp_NtAccessCheckByTypeResultListAndAuditAlarmByHandle PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD , arg_06:DWORD , arg_07:DWORD , arg_08:DWORD , arg_09:DWORD , arg_10:DWORD , arg_11:DWORD , arg_12:DWORD , arg_13:DWORD , arg_14:DWORD , arg_15:DWORD , arg_16:DWORD , arg_17:DWORD mov eax , 7 mov edx , 7FFE0300h call dword ptr [edx] ret 68 _5_1_2600_sp3_windows_xp_NtAccessCheckByTypeResultListAndAuditAlarmByHandle ENDP ; ULONG __stdcall NtAddAtom( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 ); _5_1_2600_sp3_windows_xp_NtAddAtom PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD mov eax , 8 mov edx , 7FFE0300h call dword ptr [edx] ret 12 _5_1_2600_sp3_windows_xp_NtAddAtom ENDP ; ULONG __stdcall NtAddBootEntry( ULONG arg_01 , ULONG arg_02 ); _5_1_2600_sp3_windows_xp_NtAddBootEntry PROC STDCALL arg_01:DWORD , arg_02:DWORD mov eax , 9 mov edx , 7FFE0300h call dword ptr [edx] ret 8 _5_1_2600_sp3_windows_xp_NtAddBootEntry ENDP ; ULONG __stdcall NtAdjustGroupsToken( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 , ULONG arg_06 ); _5_1_2600_sp3_windows_xp_NtAdjustGroupsToken PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD , arg_06:DWORD mov eax , 10 mov edx , 7FFE0300h call dword ptr [edx] ret 24 _5_1_2600_sp3_windows_xp_NtAdjustGroupsToken ENDP ; ULONG __stdcall NtAdjustPrivilegesToken( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 , ULONG arg_06 ); _5_1_2600_sp3_windows_xp_NtAdjustPrivilegesToken PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD , arg_06:DWORD mov eax , 11 mov edx , 7FFE0300h call dword ptr [edx] ret 24 _5_1_2600_sp3_windows_xp_NtAdjustPrivilegesToken ENDP ; ULONG __stdcall NtAlertResumeThread( ULONG arg_01 , ULONG arg_02 ); _5_1_2600_sp3_windows_xp_NtAlertResumeThread PROC STDCALL arg_01:DWORD , arg_02:DWORD mov eax , 12 mov edx , 7FFE0300h call dword ptr [edx] ret 8 _5_1_2600_sp3_windows_xp_NtAlertResumeThread ENDP ; ULONG __stdcall NtAlertThread( ULONG arg_01 ); _5_1_2600_sp3_windows_xp_NtAlertThread PROC STDCALL arg_01:DWORD mov eax , 13 mov edx , 7FFE0300h call dword ptr [edx] ret 4 _5_1_2600_sp3_windows_xp_NtAlertThread ENDP ; ULONG __stdcall NtAllocateLocallyUniqueId( ULONG arg_01 ); _5_1_2600_sp3_windows_xp_NtAllocateLocallyUniqueId PROC STDCALL arg_01:DWORD mov eax , 14 mov edx , 7FFE0300h call dword ptr [edx] ret 4 _5_1_2600_sp3_windows_xp_NtAllocateLocallyUniqueId ENDP ; ULONG __stdcall NtAllocateUserPhysicalPages( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 ); _5_1_2600_sp3_windows_xp_NtAllocateUserPhysicalPages PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD mov eax , 15 mov edx , 7FFE0300h call dword ptr [edx] ret 12 _5_1_2600_sp3_windows_xp_NtAllocateUserPhysicalPages ENDP ; ULONG __stdcall NtAllocateUuids( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 ); _5_1_2600_sp3_windows_xp_NtAllocateUuids PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD mov eax , 16 mov edx , 7FFE0300h call dword ptr [edx] ret 16 _5_1_2600_sp3_windows_xp_NtAllocateUuids ENDP ; ULONG __stdcall NtAllocateVirtualMemory( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 , ULONG arg_06 ); _5_1_2600_sp3_windows_xp_NtAllocateVirtualMemory PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD , arg_06:DWORD mov eax , 17 mov edx , 7FFE0300h call dword ptr [edx] ret 24 _5_1_2600_sp3_windows_xp_NtAllocateVirtualMemory ENDP ; ULONG __stdcall NtAreMappedFilesTheSame( ULONG arg_01 , ULONG arg_02 ); _5_1_2600_sp3_windows_xp_NtAreMappedFilesTheSame PROC STDCALL arg_01:DWORD , arg_02:DWORD mov eax , 18 mov edx , 7FFE0300h call dword ptr [edx] ret 8 _5_1_2600_sp3_windows_xp_NtAreMappedFilesTheSame ENDP ; ULONG __stdcall NtAssignProcessToJobObject( ULONG arg_01 , ULONG arg_02 ); _5_1_2600_sp3_windows_xp_NtAssignProcessToJobObject PROC STDCALL arg_01:DWORD , arg_02:DWORD mov eax , 19 mov edx , 7FFE0300h call dword ptr [edx] ret 8 _5_1_2600_sp3_windows_xp_NtAssignProcessToJobObject ENDP ; ULONG __stdcall NtCallbackReturn( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 ); _5_1_2600_sp3_windows_xp_NtCallbackReturn PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD mov eax , 20 mov edx , 7FFE0300h call dword ptr [edx] ret 12 _5_1_2600_sp3_windows_xp_NtCallbackReturn ENDP ; ULONG __stdcall NtCancelDeviceWakeupRequest( ULONG arg_01 ); _5_1_2600_sp3_windows_xp_NtCancelDeviceWakeupRequest PROC STDCALL arg_01:DWORD mov eax , 21 mov edx , 7FFE0300h call dword ptr [edx] ret 4 _5_1_2600_sp3_windows_xp_NtCancelDeviceWakeupRequest ENDP ; ULONG __stdcall NtCancelIoFile( ULONG arg_01 , ULONG arg_02 ); _5_1_2600_sp3_windows_xp_NtCancelIoFile PROC STDCALL arg_01:DWORD , arg_02:DWORD mov eax , 22 mov edx , 7FFE0300h call dword ptr [edx] ret 8 _5_1_2600_sp3_windows_xp_NtCancelIoFile ENDP ; ULONG __stdcall NtCancelTimer( ULONG arg_01 , ULONG arg_02 ); _5_1_2600_sp3_windows_xp_NtCancelTimer PROC STDCALL arg_01:DWORD , arg_02:DWORD mov eax , 23 mov edx , 7FFE0300h call dword ptr [edx] ret 8 _5_1_2600_sp3_windows_xp_NtCancelTimer ENDP ; ULONG __stdcall NtClearEvent( ULONG arg_01 ); _5_1_2600_sp3_windows_xp_NtClearEvent PROC STDCALL arg_01:DWORD mov eax , 24 mov edx , 7FFE0300h call dword ptr [edx] ret 4 _5_1_2600_sp3_windows_xp_NtClearEvent ENDP ; ULONG __stdcall NtClose( ULONG arg_01 ); _5_1_2600_sp3_windows_xp_NtClose PROC STDCALL arg_01:DWORD mov eax , 25 mov edx , 7FFE0300h call dword ptr [edx] ret 4 _5_1_2600_sp3_windows_xp_NtClose ENDP ; ULONG __stdcall NtCloseObjectAuditAlarm( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 ); _5_1_2600_sp3_windows_xp_NtCloseObjectAuditAlarm PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD mov eax , 26 mov edx , 7FFE0300h call dword ptr [edx] ret 12 _5_1_2600_sp3_windows_xp_NtCloseObjectAuditAlarm ENDP ; ULONG __stdcall NtCompactKeys( ULONG arg_01 , ULONG arg_02 ); _5_1_2600_sp3_windows_xp_NtCompactKeys PROC STDCALL arg_01:DWORD , arg_02:DWORD mov eax , 27 mov edx , 7FFE0300h call dword ptr [edx] ret 8 _5_1_2600_sp3_windows_xp_NtCompactKeys ENDP ; ULONG __stdcall NtCompareTokens( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 ); _5_1_2600_sp3_windows_xp_NtCompareTokens PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD mov eax , 28 mov edx , 7FFE0300h call dword ptr [edx] ret 12 _5_1_2600_sp3_windows_xp_NtCompareTokens ENDP ; ULONG __stdcall NtCompleteConnectPort( ULONG arg_01 ); _5_1_2600_sp3_windows_xp_NtCompleteConnectPort PROC STDCALL arg_01:DWORD mov eax , 29 mov edx , 7FFE0300h call dword ptr [edx] ret 4 _5_1_2600_sp3_windows_xp_NtCompleteConnectPort ENDP ; ULONG __stdcall NtCompressKey( ULONG arg_01 ); _5_1_2600_sp3_windows_xp_NtCompressKey PROC STDCALL arg_01:DWORD mov eax , 30 mov edx , 7FFE0300h call dword ptr [edx] ret 4 _5_1_2600_sp3_windows_xp_NtCompressKey ENDP ; ULONG __stdcall NtConnectPort( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 , ULONG arg_06 , ULONG arg_07 , ULONG arg_08 ); _5_1_2600_sp3_windows_xp_NtConnectPort PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD , arg_06:DWORD , arg_07:DWORD , arg_08:DWORD mov eax , 31 mov edx , 7FFE0300h call dword ptr [edx] ret 32 _5_1_2600_sp3_windows_xp_NtConnectPort ENDP ; ULONG __stdcall NtContinue( ULONG arg_01 , ULONG arg_02 ); _5_1_2600_sp3_windows_xp_NtContinue PROC STDCALL arg_01:DWORD , arg_02:DWORD mov eax , 32 mov edx , 7FFE0300h call dword ptr [edx] ret 8 _5_1_2600_sp3_windows_xp_NtContinue ENDP ; ULONG __stdcall NtCreateDebugObject( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 ); _5_1_2600_sp3_windows_xp_NtCreateDebugObject PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD mov eax , 33 mov edx , 7FFE0300h call dword ptr [edx] ret 16 _5_1_2600_sp3_windows_xp_NtCreateDebugObject ENDP ; ULONG __stdcall NtCreateDirectoryObject( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 ); _5_1_2600_sp3_windows_xp_NtCreateDirectoryObject PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD mov eax , 34 mov edx , 7FFE0300h call dword ptr [edx] ret 12 _5_1_2600_sp3_windows_xp_NtCreateDirectoryObject ENDP ; ULONG __stdcall NtCreateEvent( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 ); _5_1_2600_sp3_windows_xp_NtCreateEvent PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD mov eax , 35 mov edx , 7FFE0300h call dword ptr [edx] ret 20 _5_1_2600_sp3_windows_xp_NtCreateEvent ENDP ; ULONG __stdcall NtCreateEventPair( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 ); _5_1_2600_sp3_windows_xp_NtCreateEventPair PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD mov eax , 36 mov edx , 7FFE0300h call dword ptr [edx] ret 12 _5_1_2600_sp3_windows_xp_NtCreateEventPair ENDP ; ULONG __stdcall NtCreateFile( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 , ULONG arg_06 , ULONG arg_07 , ULONG arg_08 , ULONG arg_09 , ULONG arg_10 , ULONG arg_11 ); _5_1_2600_sp3_windows_xp_NtCreateFile PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD , arg_06:DWORD , arg_07:DWORD , arg_08:DWORD , arg_09:DWORD , arg_10:DWORD , arg_11:DWORD mov eax , 37 mov edx , 7FFE0300h call dword ptr [edx] ret 44 _5_1_2600_sp3_windows_xp_NtCreateFile ENDP ; ULONG __stdcall NtCreateIoCompletion( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 ); _5_1_2600_sp3_windows_xp_NtCreateIoCompletion PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD mov eax , 38 mov edx , 7FFE0300h call dword ptr [edx] ret 16 _5_1_2600_sp3_windows_xp_NtCreateIoCompletion ENDP ; ULONG __stdcall NtCreateJobObject( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 ); _5_1_2600_sp3_windows_xp_NtCreateJobObject PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD mov eax , 39 mov edx , 7FFE0300h call dword ptr [edx] ret 12 _5_1_2600_sp3_windows_xp_NtCreateJobObject ENDP ; ULONG __stdcall NtCreateJobSet( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 ); _5_1_2600_sp3_windows_xp_NtCreateJobSet PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD mov eax , 40 mov edx , 7FFE0300h call dword ptr [edx] ret 12 _5_1_2600_sp3_windows_xp_NtCreateJobSet ENDP ; ULONG __stdcall NtCreateKey( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 , ULONG arg_06 , ULONG arg_07 ); _5_1_2600_sp3_windows_xp_NtCreateKey PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD , arg_06:DWORD , arg_07:DWORD mov eax , 41 mov edx , 7FFE0300h call dword ptr [edx] ret 28 _5_1_2600_sp3_windows_xp_NtCreateKey ENDP ; ULONG __stdcall NtCreateMailslotFile( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 , ULONG arg_06 , ULONG arg_07 , ULONG arg_08 ); _5_1_2600_sp3_windows_xp_NtCreateMailslotFile PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD , arg_06:DWORD , arg_07:DWORD , arg_08:DWORD mov eax , 42 mov edx , 7FFE0300h call dword ptr [edx] ret 32 _5_1_2600_sp3_windows_xp_NtCreateMailslotFile ENDP ; ULONG __stdcall NtCreateMutant( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 ); _5_1_2600_sp3_windows_xp_NtCreateMutant PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD mov eax , 43 mov edx , 7FFE0300h call dword ptr [edx] ret 16 _5_1_2600_sp3_windows_xp_NtCreateMutant ENDP ; ULONG __stdcall NtCreateNamedPipeFile( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 , ULONG arg_06 , ULONG arg_07 , ULONG arg_08 , ULONG arg_09 , ULONG arg_10 , ULONG arg_11 , ULONG arg_12 , ULONG arg_13 , ULONG arg_14 ); _5_1_2600_sp3_windows_xp_NtCreateNamedPipeFile PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD , arg_06:DWORD , arg_07:DWORD , arg_08:DWORD , arg_09:DWORD , arg_10:DWORD , arg_11:DWORD , arg_12:DWORD , arg_13:DWORD , arg_14:DWORD mov eax , 44 mov edx , 7FFE0300h call dword ptr [edx] ret 56 _5_1_2600_sp3_windows_xp_NtCreateNamedPipeFile ENDP ; ULONG __stdcall NtCreatePagingFile( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 ); _5_1_2600_sp3_windows_xp_NtCreatePagingFile PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD mov eax , 45 mov edx , 7FFE0300h call dword ptr [edx] ret 16 _5_1_2600_sp3_windows_xp_NtCreatePagingFile ENDP ; ULONG __stdcall NtCreatePort( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 ); _5_1_2600_sp3_windows_xp_NtCreatePort PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD mov eax , 46 mov edx , 7FFE0300h call dword ptr [edx] ret 20 _5_1_2600_sp3_windows_xp_NtCreatePort ENDP ; ULONG __stdcall NtCreateProcess( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 , ULONG arg_06 , ULONG arg_07 , ULONG arg_08 ); _5_1_2600_sp3_windows_xp_NtCreateProcess PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD , arg_06:DWORD , arg_07:DWORD , arg_08:DWORD mov eax , 47 mov edx , 7FFE0300h call dword ptr [edx] ret 32 _5_1_2600_sp3_windows_xp_NtCreateProcess ENDP ; ULONG __stdcall NtCreateProcessEx( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 , ULONG arg_06 , ULONG arg_07 , ULONG arg_08 , ULONG arg_09 ); _5_1_2600_sp3_windows_xp_NtCreateProcessEx PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD , arg_06:DWORD , arg_07:DWORD , arg_08:DWORD , arg_09:DWORD mov eax , 48 mov edx , 7FFE0300h call dword ptr [edx] ret 36 _5_1_2600_sp3_windows_xp_NtCreateProcessEx ENDP ; ULONG __stdcall NtCreateProfile( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 , ULONG arg_06 , ULONG arg_07 , ULONG arg_08 , ULONG arg_09 ); _5_1_2600_sp3_windows_xp_NtCreateProfile PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD , arg_06:DWORD , arg_07:DWORD , arg_08:DWORD , arg_09:DWORD mov eax , 49 mov edx , 7FFE0300h call dword ptr [edx] ret 36 _5_1_2600_sp3_windows_xp_NtCreateProfile ENDP ; ULONG __stdcall NtCreateSection( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 , ULONG arg_06 , ULONG arg_07 ); _5_1_2600_sp3_windows_xp_NtCreateSection PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD , arg_06:DWORD , arg_07:DWORD mov eax , 50 mov edx , 7FFE0300h call dword ptr [edx] ret 28 _5_1_2600_sp3_windows_xp_NtCreateSection ENDP ; ULONG __stdcall NtCreateSemaphore( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 ); _5_1_2600_sp3_windows_xp_NtCreateSemaphore PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD mov eax , 51 mov edx , 7FFE0300h call dword ptr [edx] ret 20 _5_1_2600_sp3_windows_xp_NtCreateSemaphore ENDP ; ULONG __stdcall NtCreateSymbolicLinkObject( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 ); _5_1_2600_sp3_windows_xp_NtCreateSymbolicLinkObject PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD mov eax , 52 mov edx , 7FFE0300h call dword ptr [edx] ret 16 _5_1_2600_sp3_windows_xp_NtCreateSymbolicLinkObject ENDP ; ULONG __stdcall NtCreateThread( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 , ULONG arg_06 , ULONG arg_07 , ULONG arg_08 ); _5_1_2600_sp3_windows_xp_NtCreateThread PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD , arg_06:DWORD , arg_07:DWORD , arg_08:DWORD mov eax , 53 mov edx , 7FFE0300h call dword ptr [edx] ret 32 _5_1_2600_sp3_windows_xp_NtCreateThread ENDP ; ULONG __stdcall NtCreateTimer( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 ); _5_1_2600_sp3_windows_xp_NtCreateTimer PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD mov eax , 54 mov edx , 7FFE0300h call dword ptr [edx] ret 16 _5_1_2600_sp3_windows_xp_NtCreateTimer ENDP ; ULONG __stdcall NtCreateToken( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 , ULONG arg_06 , ULONG arg_07 , ULONG arg_08 , ULONG arg_09 , ULONG arg_10 , ULONG arg_11 , ULONG arg_12 , ULONG arg_13 ); _5_1_2600_sp3_windows_xp_NtCreateToken PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD , arg_06:DWORD , arg_07:DWORD , arg_08:DWORD , arg_09:DWORD , arg_10:DWORD , arg_11:DWORD , arg_12:DWORD , arg_13:DWORD mov eax , 55 mov edx , 7FFE0300h call dword ptr [edx] ret 52 _5_1_2600_sp3_windows_xp_NtCreateToken ENDP ; ULONG __stdcall NtCreateWaitablePort( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 ); _5_1_2600_sp3_windows_xp_NtCreateWaitablePort PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD mov eax , 56 mov edx , 7FFE0300h call dword ptr [edx] ret 20 _5_1_2600_sp3_windows_xp_NtCreateWaitablePort ENDP ; ULONG __stdcall NtDebugActiveProcess( ULONG arg_01 , ULONG arg_02 ); _5_1_2600_sp3_windows_xp_NtDebugActiveProcess PROC STDCALL arg_01:DWORD , arg_02:DWORD mov eax , 57 mov edx , 7FFE0300h call dword ptr [edx] ret 8 _5_1_2600_sp3_windows_xp_NtDebugActiveProcess ENDP ; ULONG __stdcall NtDebugContinue( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 ); _5_1_2600_sp3_windows_xp_NtDebugContinue PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD mov eax , 58 mov edx , 7FFE0300h call dword ptr [edx] ret 12 _5_1_2600_sp3_windows_xp_NtDebugContinue ENDP ; ULONG __stdcall NtDelayExecution( ULONG arg_01 , ULONG arg_02 ); _5_1_2600_sp3_windows_xp_NtDelayExecution PROC STDCALL arg_01:DWORD , arg_02:DWORD mov eax , 59 mov edx , 7FFE0300h call dword ptr [edx] ret 8 _5_1_2600_sp3_windows_xp_NtDelayExecution ENDP ; ULONG __stdcall NtDeleteAtom( ULONG arg_01 ); _5_1_2600_sp3_windows_xp_NtDeleteAtom PROC STDCALL arg_01:DWORD mov eax , 60 mov edx , 7FFE0300h call dword ptr [edx] ret 4 _5_1_2600_sp3_windows_xp_NtDeleteAtom ENDP ; ULONG __stdcall NtDeleteBootEntry( ULONG arg_01 ); _5_1_2600_sp3_windows_xp_NtDeleteBootEntry PROC STDCALL arg_01:DWORD mov eax , 61 mov edx , 7FFE0300h call dword ptr [edx] ret 4 _5_1_2600_sp3_windows_xp_NtDeleteBootEntry ENDP ; ULONG __stdcall NtDeleteFile( ULONG arg_01 ); _5_1_2600_sp3_windows_xp_NtDeleteFile PROC STDCALL arg_01:DWORD mov eax , 62 mov edx , 7FFE0300h call dword ptr [edx] ret 4 _5_1_2600_sp3_windows_xp_NtDeleteFile ENDP ; ULONG __stdcall NtDeleteKey( ULONG arg_01 ); _5_1_2600_sp3_windows_xp_NtDeleteKey PROC STDCALL arg_01:DWORD mov eax , 63 mov edx , 7FFE0300h call dword ptr [edx] ret 4 _5_1_2600_sp3_windows_xp_NtDeleteKey ENDP ; ULONG __stdcall NtDeleteObjectAuditAlarm( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 ); _5_1_2600_sp3_windows_xp_NtDeleteObjectAuditAlarm PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD mov eax , 64 mov edx , 7FFE0300h call dword ptr [edx] ret 12 _5_1_2600_sp3_windows_xp_NtDeleteObjectAuditAlarm ENDP ; ULONG __stdcall NtDeleteValueKey( ULONG arg_01 , ULONG arg_02 ); _5_1_2600_sp3_windows_xp_NtDeleteValueKey PROC STDCALL arg_01:DWORD , arg_02:DWORD mov eax , 65 mov edx , 7FFE0300h call dword ptr [edx] ret 8 _5_1_2600_sp3_windows_xp_NtDeleteValueKey ENDP ; ULONG __stdcall NtDeviceIoControlFile( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 , ULONG arg_06 , ULONG arg_07 , ULONG arg_08 , ULONG arg_09 , ULONG arg_10 ); _5_1_2600_sp3_windows_xp_NtDeviceIoControlFile PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD , arg_06:DWORD , arg_07:DWORD , arg_08:DWORD , arg_09:DWORD , arg_10:DWORD mov eax , 66 mov edx , 7FFE0300h call dword ptr [edx] ret 40 _5_1_2600_sp3_windows_xp_NtDeviceIoControlFile ENDP ; ULONG __stdcall NtDisplayString( ULONG arg_01 ); _5_1_2600_sp3_windows_xp_NtDisplayString PROC STDCALL arg_01:DWORD mov eax , 67 mov edx , 7FFE0300h call dword ptr [edx] ret 4 _5_1_2600_sp3_windows_xp_NtDisplayString ENDP ; ULONG __stdcall NtDuplicateObject( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 , ULONG arg_06 , ULONG arg_07 ); _5_1_2600_sp3_windows_xp_NtDuplicateObject PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD , arg_06:DWORD , arg_07:DWORD mov eax , 68 mov edx , 7FFE0300h call dword ptr [edx] ret 28 _5_1_2600_sp3_windows_xp_NtDuplicateObject ENDP ; ULONG __stdcall NtDuplicateToken( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 , ULONG arg_06 ); _5_1_2600_sp3_windows_xp_NtDuplicateToken PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD , arg_06:DWORD mov eax , 69 mov edx , 7FFE0300h call dword ptr [edx] ret 24 _5_1_2600_sp3_windows_xp_NtDuplicateToken ENDP ; ULONG __stdcall NtEnumerateBootEntries( ULONG arg_01 , ULONG arg_02 ); _5_1_2600_sp3_windows_xp_NtEnumerateBootEntries PROC STDCALL arg_01:DWORD , arg_02:DWORD mov eax , 70 mov edx , 7FFE0300h call dword ptr [edx] ret 8 _5_1_2600_sp3_windows_xp_NtEnumerateBootEntries ENDP ; ULONG __stdcall NtEnumerateKey( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 , ULONG arg_06 ); _5_1_2600_sp3_windows_xp_NtEnumerateKey PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD , arg_06:DWORD mov eax , 71 mov edx , 7FFE0300h call dword ptr [edx] ret 24 _5_1_2600_sp3_windows_xp_NtEnumerateKey ENDP ; ULONG __stdcall NtEnumerateSystemEnvironmentValuesEx( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 ); _5_1_2600_sp3_windows_xp_NtEnumerateSystemEnvironmentValuesEx PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD mov eax , 72 mov edx , 7FFE0300h call dword ptr [edx] ret 12 _5_1_2600_sp3_windows_xp_NtEnumerateSystemEnvironmentValuesEx ENDP ; ULONG __stdcall NtEnumerateValueKey( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 , ULONG arg_06 ); _5_1_2600_sp3_windows_xp_NtEnumerateValueKey PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD , arg_06:DWORD mov eax , 73 mov edx , 7FFE0300h call dword ptr [edx] ret 24 _5_1_2600_sp3_windows_xp_NtEnumerateValueKey ENDP ; ULONG __stdcall NtExtendSection( ULONG arg_01 , ULONG arg_02 ); _5_1_2600_sp3_windows_xp_NtExtendSection PROC STDCALL arg_01:DWORD , arg_02:DWORD mov eax , 74 mov edx , 7FFE0300h call dword ptr [edx] ret 8 _5_1_2600_sp3_windows_xp_NtExtendSection ENDP ; ULONG __stdcall NtFilterToken( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 , ULONG arg_06 ); _5_1_2600_sp3_windows_xp_NtFilterToken PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD , arg_06:DWORD mov eax , 75 mov edx , 7FFE0300h call dword ptr [edx] ret 24 _5_1_2600_sp3_windows_xp_NtFilterToken ENDP ; ULONG __stdcall NtFindAtom( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 ); _5_1_2600_sp3_windows_xp_NtFindAtom PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD mov eax , 76 mov edx , 7FFE0300h call dword ptr [edx] ret 12 _5_1_2600_sp3_windows_xp_NtFindAtom ENDP ; ULONG __stdcall NtFlushBuffersFile( ULONG arg_01 , ULONG arg_02 ); _5_1_2600_sp3_windows_xp_NtFlushBuffersFile PROC STDCALL arg_01:DWORD , arg_02:DWORD mov eax , 77 mov edx , 7FFE0300h call dword ptr [edx] ret 8 _5_1_2600_sp3_windows_xp_NtFlushBuffersFile ENDP ; ULONG __stdcall NtFlushInstructionCache( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 ); _5_1_2600_sp3_windows_xp_NtFlushInstructionCache PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD mov eax , 78 mov edx , 7FFE0300h call dword ptr [edx] ret 12 _5_1_2600_sp3_windows_xp_NtFlushInstructionCache ENDP ; ULONG __stdcall NtFlushKey( ULONG arg_01 ); _5_1_2600_sp3_windows_xp_NtFlushKey PROC STDCALL arg_01:DWORD mov eax , 79 mov edx , 7FFE0300h call dword ptr [edx] ret 4 _5_1_2600_sp3_windows_xp_NtFlushKey ENDP ; ULONG __stdcall NtFlushVirtualMemory( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 ); _5_1_2600_sp3_windows_xp_NtFlushVirtualMemory PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD mov eax , 80 mov edx , 7FFE0300h call dword ptr [edx] ret 16 _5_1_2600_sp3_windows_xp_NtFlushVirtualMemory ENDP ; ULONG __stdcall NtFlushWriteBuffer( ); _5_1_2600_sp3_windows_xp_NtFlushWriteBuffer PROC STDCALL mov eax , 81 mov edx , 7FFE0300h call dword ptr [edx] ret _5_1_2600_sp3_windows_xp_NtFlushWriteBuffer ENDP ; ULONG __stdcall NtFreeUserPhysicalPages( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 ); _5_1_2600_sp3_windows_xp_NtFreeUserPhysicalPages PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD mov eax , 82 mov edx , 7FFE0300h call dword ptr [edx] ret 12 _5_1_2600_sp3_windows_xp_NtFreeUserPhysicalPages ENDP ; ULONG __stdcall NtFreeVirtualMemory( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 ); _5_1_2600_sp3_windows_xp_NtFreeVirtualMemory PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD mov eax , 83 mov edx , 7FFE0300h call dword ptr [edx] ret 16 _5_1_2600_sp3_windows_xp_NtFreeVirtualMemory ENDP ; ULONG __stdcall NtFsControlFile( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 , ULONG arg_06 , ULONG arg_07 , ULONG arg_08 , ULONG arg_09 , ULONG arg_10 ); _5_1_2600_sp3_windows_xp_NtFsControlFile PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD , arg_06:DWORD , arg_07:DWORD , arg_08:DWORD , arg_09:DWORD , arg_10:DWORD mov eax , 84 mov edx , 7FFE0300h call dword ptr [edx] ret 40 _5_1_2600_sp3_windows_xp_NtFsControlFile ENDP ; ULONG __stdcall NtGetContextThread( ULONG arg_01 , ULONG arg_02 ); _5_1_2600_sp3_windows_xp_NtGetContextThread PROC STDCALL arg_01:DWORD , arg_02:DWORD mov eax , 85 mov edx , 7FFE0300h call dword ptr [edx] ret 8 _5_1_2600_sp3_windows_xp_NtGetContextThread ENDP ; ULONG __stdcall NtGetDevicePowerState( ULONG arg_01 , ULONG arg_02 ); _5_1_2600_sp3_windows_xp_NtGetDevicePowerState PROC STDCALL arg_01:DWORD , arg_02:DWORD mov eax , 86 mov edx , 7FFE0300h call dword ptr [edx] ret 8 _5_1_2600_sp3_windows_xp_NtGetDevicePowerState ENDP ; ULONG __stdcall NtGetPlugPlayEvent( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 ); _5_1_2600_sp3_windows_xp_NtGetPlugPlayEvent PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD mov eax , 87 mov edx , 7FFE0300h call dword ptr [edx] ret 16 _5_1_2600_sp3_windows_xp_NtGetPlugPlayEvent ENDP ; ULONG __stdcall NtGetWriteWatch( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 , ULONG arg_06 , ULONG arg_07 ); _5_1_2600_sp3_windows_xp_NtGetWriteWatch PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD , arg_06:DWORD , arg_07:DWORD mov eax , 88 mov edx , 7FFE0300h call dword ptr [edx] ret 28 _5_1_2600_sp3_windows_xp_NtGetWriteWatch ENDP ; ULONG __stdcall NtImpersonateAnonymousToken( ULONG arg_01 ); _5_1_2600_sp3_windows_xp_NtImpersonateAnonymousToken PROC STDCALL arg_01:DWORD mov eax , 89 mov edx , 7FFE0300h call dword ptr [edx] ret 4 _5_1_2600_sp3_windows_xp_NtImpersonateAnonymousToken ENDP ; ULONG __stdcall NtImpersonateClientOfPort( ULONG arg_01 , ULONG arg_02 ); _5_1_2600_sp3_windows_xp_NtImpersonateClientOfPort PROC STDCALL arg_01:DWORD , arg_02:DWORD mov eax , 90 mov edx , 7FFE0300h call dword ptr [edx] ret 8 _5_1_2600_sp3_windows_xp_NtImpersonateClientOfPort ENDP ; ULONG __stdcall NtImpersonateThread( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 ); _5_1_2600_sp3_windows_xp_NtImpersonateThread PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD mov eax , 91 mov edx , 7FFE0300h call dword ptr [edx] ret 12 _5_1_2600_sp3_windows_xp_NtImpersonateThread ENDP ; ULONG __stdcall NtInitializeRegistry( ULONG arg_01 ); _5_1_2600_sp3_windows_xp_NtInitializeRegistry PROC STDCALL arg_01:DWORD mov eax , 92 mov edx , 7FFE0300h call dword ptr [edx] ret 4 _5_1_2600_sp3_windows_xp_NtInitializeRegistry ENDP ; ULONG __stdcall NtInitiatePowerAction( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 ); _5_1_2600_sp3_windows_xp_NtInitiatePowerAction PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD mov eax , 93 mov edx , 7FFE0300h call dword ptr [edx] ret 16 _5_1_2600_sp3_windows_xp_NtInitiatePowerAction ENDP ; ULONG __stdcall NtIsProcessInJob( ULONG arg_01 , ULONG arg_02 ); _5_1_2600_sp3_windows_xp_NtIsProcessInJob PROC STDCALL arg_01:DWORD , arg_02:DWORD mov eax , 94 mov edx , 7FFE0300h call dword ptr [edx] ret 8 _5_1_2600_sp3_windows_xp_NtIsProcessInJob ENDP ; ULONG __stdcall NtIsSystemResumeAutomatic( ); _5_1_2600_sp3_windows_xp_NtIsSystemResumeAutomatic PROC STDCALL mov eax , 95 mov edx , 7FFE0300h call dword ptr [edx] ret _5_1_2600_sp3_windows_xp_NtIsSystemResumeAutomatic ENDP ; ULONG __stdcall NtListenPort( ULONG arg_01 , ULONG arg_02 ); _5_1_2600_sp3_windows_xp_NtListenPort PROC STDCALL arg_01:DWORD , arg_02:DWORD mov eax , 96 mov edx , 7FFE0300h call dword ptr [edx] ret 8 _5_1_2600_sp3_windows_xp_NtListenPort ENDP ; ULONG __stdcall NtLoadDriver( ULONG arg_01 ); _5_1_2600_sp3_windows_xp_NtLoadDriver PROC STDCALL arg_01:DWORD mov eax , 97 mov edx , 7FFE0300h call dword ptr [edx] ret 4 _5_1_2600_sp3_windows_xp_NtLoadDriver ENDP ; ULONG __stdcall NtLoadKey( ULONG arg_01 , ULONG arg_02 ); _5_1_2600_sp3_windows_xp_NtLoadKey PROC STDCALL arg_01:DWORD , arg_02:DWORD mov eax , 98 mov edx , 7FFE0300h call dword ptr [edx] ret 8 _5_1_2600_sp3_windows_xp_NtLoadKey ENDP ; ULONG __stdcall NtLoadKey2( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 ); _5_1_2600_sp3_windows_xp_NtLoadKey2 PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD mov eax , 99 mov edx , 7FFE0300h call dword ptr [edx] ret 12 _5_1_2600_sp3_windows_xp_NtLoadKey2 ENDP ; ULONG __stdcall NtLockFile( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 , ULONG arg_06 , ULONG arg_07 , ULONG arg_08 , ULONG arg_09 , ULONG arg_10 ); _5_1_2600_sp3_windows_xp_NtLockFile PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD , arg_06:DWORD , arg_07:DWORD , arg_08:DWORD , arg_09:DWORD , arg_10:DWORD mov eax , 100 mov edx , 7FFE0300h call dword ptr [edx] ret 40 _5_1_2600_sp3_windows_xp_NtLockFile ENDP ; ULONG __stdcall NtLockProductActivationKeys( ULONG arg_01 , ULONG arg_02 ); _5_1_2600_sp3_windows_xp_NtLockProductActivationKeys PROC STDCALL arg_01:DWORD , arg_02:DWORD mov eax , 101 mov edx , 7FFE0300h call dword ptr [edx] ret 8 _5_1_2600_sp3_windows_xp_NtLockProductActivationKeys ENDP ; ULONG __stdcall NtLockRegistryKey( ULONG arg_01 ); _5_1_2600_sp3_windows_xp_NtLockRegistryKey PROC STDCALL arg_01:DWORD mov eax , 102 mov edx , 7FFE0300h call dword ptr [edx] ret 4 _5_1_2600_sp3_windows_xp_NtLockRegistryKey ENDP ; ULONG __stdcall NtLockVirtualMemory( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 ); _5_1_2600_sp3_windows_xp_NtLockVirtualMemory PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD mov eax , 103 mov edx , 7FFE0300h call dword ptr [edx] ret 16 _5_1_2600_sp3_windows_xp_NtLockVirtualMemory ENDP ; ULONG __stdcall NtMakePermanentObject( ULONG arg_01 ); _5_1_2600_sp3_windows_xp_NtMakePermanentObject PROC STDCALL arg_01:DWORD mov eax , 104 mov edx , 7FFE0300h call dword ptr [edx] ret 4 _5_1_2600_sp3_windows_xp_NtMakePermanentObject ENDP ; ULONG __stdcall NtMakeTemporaryObject( ULONG arg_01 ); _5_1_2600_sp3_windows_xp_NtMakeTemporaryObject PROC STDCALL arg_01:DWORD mov eax , 105 mov edx , 7FFE0300h call dword ptr [edx] ret 4 _5_1_2600_sp3_windows_xp_NtMakeTemporaryObject ENDP ; ULONG __stdcall NtMapUserPhysicalPages( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 ); _5_1_2600_sp3_windows_xp_NtMapUserPhysicalPages PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD mov eax , 106 mov edx , 7FFE0300h call dword ptr [edx] ret 12 _5_1_2600_sp3_windows_xp_NtMapUserPhysicalPages ENDP ; ULONG __stdcall NtMapUserPhysicalPagesScatter( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 ); _5_1_2600_sp3_windows_xp_NtMapUserPhysicalPagesScatter PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD mov eax , 107 mov edx , 7FFE0300h call dword ptr [edx] ret 12 _5_1_2600_sp3_windows_xp_NtMapUserPhysicalPagesScatter ENDP ; ULONG __stdcall NtMapViewOfSection( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 , ULONG arg_06 , ULONG arg_07 , ULONG arg_08 , ULONG arg_09 , ULONG arg_10 ); _5_1_2600_sp3_windows_xp_NtMapViewOfSection PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD , arg_06:DWORD , arg_07:DWORD , arg_08:DWORD , arg_09:DWORD , arg_10:DWORD mov eax , 108 mov edx , 7FFE0300h call dword ptr [edx] ret 40 _5_1_2600_sp3_windows_xp_NtMapViewOfSection ENDP ; ULONG __stdcall NtModifyBootEntry( ULONG arg_01 ); _5_1_2600_sp3_windows_xp_NtModifyBootEntry PROC STDCALL arg_01:DWORD mov eax , 109 mov edx , 7FFE0300h call dword ptr [edx] ret 4 _5_1_2600_sp3_windows_xp_NtModifyBootEntry ENDP ; ULONG __stdcall NtNotifyChangeDirectoryFile( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 , ULONG arg_06 , ULONG arg_07 , ULONG arg_08 , ULONG arg_09 ); _5_1_2600_sp3_windows_xp_NtNotifyChangeDirectoryFile PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD , arg_06:DWORD , arg_07:DWORD , arg_08:DWORD , arg_09:DWORD mov eax , 110 mov edx , 7FFE0300h call dword ptr [edx] ret 36 _5_1_2600_sp3_windows_xp_NtNotifyChangeDirectoryFile ENDP ; ULONG __stdcall NtNotifyChangeKey( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 , ULONG arg_06 , ULONG arg_07 , ULONG arg_08 , ULONG arg_09 , ULONG arg_10 ); _5_1_2600_sp3_windows_xp_NtNotifyChangeKey PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD , arg_06:DWORD , arg_07:DWORD , arg_08:DWORD , arg_09:DWORD , arg_10:DWORD mov eax , 111 mov edx , 7FFE0300h call dword ptr [edx] ret 40 _5_1_2600_sp3_windows_xp_NtNotifyChangeKey ENDP ; ULONG __stdcall NtNotifyChangeMultipleKeys( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 , ULONG arg_06 , ULONG arg_07 , ULONG arg_08 , ULONG arg_09 , ULONG arg_10 , ULONG arg_11 , ULONG arg_12 ); _5_1_2600_sp3_windows_xp_NtNotifyChangeMultipleKeys PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD , arg_06:DWORD , arg_07:DWORD , arg_08:DWORD , arg_09:DWORD , arg_10:DWORD , arg_11:DWORD , arg_12:DWORD mov eax , 112 mov edx , 7FFE0300h call dword ptr [edx] ret 48 _5_1_2600_sp3_windows_xp_NtNotifyChangeMultipleKeys ENDP ; ULONG __stdcall NtOpenDirectoryObject( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 ); _5_1_2600_sp3_windows_xp_NtOpenDirectoryObject PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD mov eax , 113 mov edx , 7FFE0300h call dword ptr [edx] ret 12 _5_1_2600_sp3_windows_xp_NtOpenDirectoryObject ENDP ; ULONG __stdcall NtOpenEvent( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 ); _5_1_2600_sp3_windows_xp_NtOpenEvent PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD mov eax , 114 mov edx , 7FFE0300h call dword ptr [edx] ret 12 _5_1_2600_sp3_windows_xp_NtOpenEvent ENDP ; ULONG __stdcall NtOpenEventPair( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 ); _5_1_2600_sp3_windows_xp_NtOpenEventPair PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD mov eax , 115 mov edx , 7FFE0300h call dword ptr [edx] ret 12 _5_1_2600_sp3_windows_xp_NtOpenEventPair ENDP ; ULONG __stdcall NtOpenFile( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 , ULONG arg_06 ); _5_1_2600_sp3_windows_xp_NtOpenFile PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD , arg_06:DWORD mov eax , 116 mov edx , 7FFE0300h call dword ptr [edx] ret 24 _5_1_2600_sp3_windows_xp_NtOpenFile ENDP ; ULONG __stdcall NtOpenIoCompletion( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 ); _5_1_2600_sp3_windows_xp_NtOpenIoCompletion PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD mov eax , 117 mov edx , 7FFE0300h call dword ptr [edx] ret 12 _5_1_2600_sp3_windows_xp_NtOpenIoCompletion ENDP ; ULONG __stdcall NtOpenJobObject( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 ); _5_1_2600_sp3_windows_xp_NtOpenJobObject PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD mov eax , 118 mov edx , 7FFE0300h call dword ptr [edx] ret 12 _5_1_2600_sp3_windows_xp_NtOpenJobObject ENDP ; ULONG __stdcall NtOpenKey( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 ); _5_1_2600_sp3_windows_xp_NtOpenKey PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD mov eax , 119 mov edx , 7FFE0300h call dword ptr [edx] ret 12 _5_1_2600_sp3_windows_xp_NtOpenKey ENDP ; ULONG __stdcall NtOpenMutant( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 ); _5_1_2600_sp3_windows_xp_NtOpenMutant PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD mov eax , 120 mov edx , 7FFE0300h call dword ptr [edx] ret 12 _5_1_2600_sp3_windows_xp_NtOpenMutant ENDP ; ULONG __stdcall NtOpenObjectAuditAlarm( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 , ULONG arg_06 , ULONG arg_07 , ULONG arg_08 , ULONG arg_09 , ULONG arg_10 , ULONG arg_11 , ULONG arg_12 ); _5_1_2600_sp3_windows_xp_NtOpenObjectAuditAlarm PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD , arg_06:DWORD , arg_07:DWORD , arg_08:DWORD , arg_09:DWORD , arg_10:DWORD , arg_11:DWORD , arg_12:DWORD mov eax , 121 mov edx , 7FFE0300h call dword ptr [edx] ret 48 _5_1_2600_sp3_windows_xp_NtOpenObjectAuditAlarm ENDP ; ULONG __stdcall NtOpenProcess( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 ); _5_1_2600_sp3_windows_xp_NtOpenProcess PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD mov eax , 122 mov edx , 7FFE0300h call dword ptr [edx] ret 16 _5_1_2600_sp3_windows_xp_NtOpenProcess ENDP ; ULONG __stdcall NtOpenProcessToken( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 ); _5_1_2600_sp3_windows_xp_NtOpenProcessToken PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD mov eax , 123 mov edx , 7FFE0300h call dword ptr [edx] ret 12 _5_1_2600_sp3_windows_xp_NtOpenProcessToken ENDP ; ULONG __stdcall NtOpenProcessTokenEx( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 ); _5_1_2600_sp3_windows_xp_NtOpenProcessTokenEx PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD mov eax , 124 mov edx , 7FFE0300h call dword ptr [edx] ret 16 _5_1_2600_sp3_windows_xp_NtOpenProcessTokenEx ENDP ; ULONG __stdcall NtOpenSection( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 ); _5_1_2600_sp3_windows_xp_NtOpenSection PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD mov eax , 125 mov edx , 7FFE0300h call dword ptr [edx] ret 12 _5_1_2600_sp3_windows_xp_NtOpenSection ENDP ; ULONG __stdcall NtOpenSemaphore( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 ); _5_1_2600_sp3_windows_xp_NtOpenSemaphore PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD mov eax , 126 mov edx , 7FFE0300h call dword ptr [edx] ret 12 _5_1_2600_sp3_windows_xp_NtOpenSemaphore ENDP ; ULONG __stdcall NtOpenSymbolicLinkObject( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 ); _5_1_2600_sp3_windows_xp_NtOpenSymbolicLinkObject PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD mov eax , 127 mov edx , 7FFE0300h call dword ptr [edx] ret 12 _5_1_2600_sp3_windows_xp_NtOpenSymbolicLinkObject ENDP ; ULONG __stdcall NtOpenThread( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 ); _5_1_2600_sp3_windows_xp_NtOpenThread PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD mov eax , 128 mov edx , 7FFE0300h call dword ptr [edx] ret 16 _5_1_2600_sp3_windows_xp_NtOpenThread ENDP ; ULONG __stdcall NtOpenThreadToken( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 ); _5_1_2600_sp3_windows_xp_NtOpenThreadToken PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD mov eax , 129 mov edx , 7FFE0300h call dword ptr [edx] ret 16 _5_1_2600_sp3_windows_xp_NtOpenThreadToken ENDP ; ULONG __stdcall NtOpenThreadTokenEx( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 ); _5_1_2600_sp3_windows_xp_NtOpenThreadTokenEx PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD mov eax , 130 mov edx , 7FFE0300h call dword ptr [edx] ret 20 _5_1_2600_sp3_windows_xp_NtOpenThreadTokenEx ENDP ; ULONG __stdcall NtOpenTimer( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 ); _5_1_2600_sp3_windows_xp_NtOpenTimer PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD mov eax , 131 mov edx , 7FFE0300h call dword ptr [edx] ret 12 _5_1_2600_sp3_windows_xp_NtOpenTimer ENDP ; ULONG __stdcall NtPlugPlayControl( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 ); _5_1_2600_sp3_windows_xp_NtPlugPlayControl PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD mov eax , 132 mov edx , 7FFE0300h call dword ptr [edx] ret 12 _5_1_2600_sp3_windows_xp_NtPlugPlayControl ENDP ; ULONG __stdcall NtPowerInformation( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 ); _5_1_2600_sp3_windows_xp_NtPowerInformation PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD mov eax , 133 mov edx , 7FFE0300h call dword ptr [edx] ret 20 _5_1_2600_sp3_windows_xp_NtPowerInformation ENDP ; ULONG __stdcall NtPrivilegeCheck( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 ); _5_1_2600_sp3_windows_xp_NtPrivilegeCheck PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD mov eax , 134 mov edx , 7FFE0300h call dword ptr [edx] ret 12 _5_1_2600_sp3_windows_xp_NtPrivilegeCheck ENDP ; ULONG __stdcall NtPrivilegeObjectAuditAlarm( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 , ULONG arg_06 ); _5_1_2600_sp3_windows_xp_NtPrivilegeObjectAuditAlarm PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD , arg_06:DWORD mov eax , 135 mov edx , 7FFE0300h call dword ptr [edx] ret 24 _5_1_2600_sp3_windows_xp_NtPrivilegeObjectAuditAlarm ENDP ; ULONG __stdcall NtPrivilegedServiceAuditAlarm( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 ); _5_1_2600_sp3_windows_xp_NtPrivilegedServiceAuditAlarm PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD mov eax , 136 mov edx , 7FFE0300h call dword ptr [edx] ret 20 _5_1_2600_sp3_windows_xp_NtPrivilegedServiceAuditAlarm ENDP ; ULONG __stdcall NtProtectVirtualMemory( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 ); _5_1_2600_sp3_windows_xp_NtProtectVirtualMemory PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD mov eax , 137 mov edx , 7FFE0300h call dword ptr [edx] ret 20 _5_1_2600_sp3_windows_xp_NtProtectVirtualMemory ENDP ; ULONG __stdcall NtPulseEvent( ULONG arg_01 , ULONG arg_02 ); _5_1_2600_sp3_windows_xp_NtPulseEvent PROC STDCALL arg_01:DWORD , arg_02:DWORD mov eax , 138 mov edx , 7FFE0300h call dword ptr [edx] ret 8 _5_1_2600_sp3_windows_xp_NtPulseEvent ENDP ; ULONG __stdcall NtQueryAttributesFile( ULONG arg_01 , ULONG arg_02 ); _5_1_2600_sp3_windows_xp_NtQueryAttributesFile PROC STDCALL arg_01:DWORD , arg_02:DWORD mov eax , 139 mov edx , 7FFE0300h call dword ptr [edx] ret 8 _5_1_2600_sp3_windows_xp_NtQueryAttributesFile ENDP ; ULONG __stdcall NtQueryBootEntryOrder( ULONG arg_01 , ULONG arg_02 ); _5_1_2600_sp3_windows_xp_NtQueryBootEntryOrder PROC STDCALL arg_01:DWORD , arg_02:DWORD mov eax , 140 mov edx , 7FFE0300h call dword ptr [edx] ret 8 _5_1_2600_sp3_windows_xp_NtQueryBootEntryOrder ENDP ; ULONG __stdcall NtQueryBootOptions( ULONG arg_01 , ULONG arg_02 ); _5_1_2600_sp3_windows_xp_NtQueryBootOptions PROC STDCALL arg_01:DWORD , arg_02:DWORD mov eax , 141 mov edx , 7FFE0300h call dword ptr [edx] ret 8 _5_1_2600_sp3_windows_xp_NtQueryBootOptions ENDP ; ULONG __stdcall NtQueryDebugFilterState( ULONG arg_01 , ULONG arg_02 ); _5_1_2600_sp3_windows_xp_NtQueryDebugFilterState PROC STDCALL arg_01:DWORD , arg_02:DWORD mov eax , 142 mov edx , 7FFE0300h call dword ptr [edx] ret 8 _5_1_2600_sp3_windows_xp_NtQueryDebugFilterState ENDP ; ULONG __stdcall NtQueryDefaultLocale( ULONG arg_01 , ULONG arg_02 ); _5_1_2600_sp3_windows_xp_NtQueryDefaultLocale PROC STDCALL arg_01:DWORD , arg_02:DWORD mov eax , 143 mov edx , 7FFE0300h call dword ptr [edx] ret 8 _5_1_2600_sp3_windows_xp_NtQueryDefaultLocale ENDP ; ULONG __stdcall NtQueryDefaultUILanguage( ULONG arg_01 ); _5_1_2600_sp3_windows_xp_NtQueryDefaultUILanguage PROC STDCALL arg_01:DWORD mov eax , 144 mov edx , 7FFE0300h call dword ptr [edx] ret 4 _5_1_2600_sp3_windows_xp_NtQueryDefaultUILanguage ENDP ; ULONG __stdcall NtQueryDirectoryFile( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 , ULONG arg_06 , ULONG arg_07 , ULONG arg_08 , ULONG arg_09 , ULONG arg_10 , ULONG arg_11 ); _5_1_2600_sp3_windows_xp_NtQueryDirectoryFile PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD , arg_06:DWORD , arg_07:DWORD , arg_08:DWORD , arg_09:DWORD , arg_10:DWORD , arg_11:DWORD mov eax , 145 mov edx , 7FFE0300h call dword ptr [edx] ret 44 _5_1_2600_sp3_windows_xp_NtQueryDirectoryFile ENDP ; ULONG __stdcall NtQueryDirectoryObject( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 , ULONG arg_06 , ULONG arg_07 ); _5_1_2600_sp3_windows_xp_NtQueryDirectoryObject PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD , arg_06:DWORD , arg_07:DWORD mov eax , 146 mov edx , 7FFE0300h call dword ptr [edx] ret 28 _5_1_2600_sp3_windows_xp_NtQueryDirectoryObject ENDP ; ULONG __stdcall NtQueryEaFile( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 , ULONG arg_06 , ULONG arg_07 , ULONG arg_08 , ULONG arg_09 ); _5_1_2600_sp3_windows_xp_NtQueryEaFile PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD , arg_06:DWORD , arg_07:DWORD , arg_08:DWORD , arg_09:DWORD mov eax , 147 mov edx , 7FFE0300h call dword ptr [edx] ret 36 _5_1_2600_sp3_windows_xp_NtQueryEaFile ENDP ; ULONG __stdcall NtQueryEvent( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 ); _5_1_2600_sp3_windows_xp_NtQueryEvent PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD mov eax , 148 mov edx , 7FFE0300h call dword ptr [edx] ret 20 _5_1_2600_sp3_windows_xp_NtQueryEvent ENDP ; ULONG __stdcall NtQueryFullAttributesFile( ULONG arg_01 , ULONG arg_02 ); _5_1_2600_sp3_windows_xp_NtQueryFullAttributesFile PROC STDCALL arg_01:DWORD , arg_02:DWORD mov eax , 149 mov edx , 7FFE0300h call dword ptr [edx] ret 8 _5_1_2600_sp3_windows_xp_NtQueryFullAttributesFile ENDP ; ULONG __stdcall NtQueryInformationAtom( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 ); _5_1_2600_sp3_windows_xp_NtQueryInformationAtom PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD mov eax , 150 mov edx , 7FFE0300h call dword ptr [edx] ret 20 _5_1_2600_sp3_windows_xp_NtQueryInformationAtom ENDP ; ULONG __stdcall NtQueryInformationFile( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 ); _5_1_2600_sp3_windows_xp_NtQueryInformationFile PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD mov eax , 151 mov edx , 7FFE0300h call dword ptr [edx] ret 20 _5_1_2600_sp3_windows_xp_NtQueryInformationFile ENDP ; ULONG __stdcall NtQueryInformationJobObject( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 ); _5_1_2600_sp3_windows_xp_NtQueryInformationJobObject PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD mov eax , 152 mov edx , 7FFE0300h call dword ptr [edx] ret 20 _5_1_2600_sp3_windows_xp_NtQueryInformationJobObject ENDP ; ULONG __stdcall NtQueryInformationPort( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 ); _5_1_2600_sp3_windows_xp_NtQueryInformationPort PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD mov eax , 153 mov edx , 7FFE0300h call dword ptr [edx] ret 20 _5_1_2600_sp3_windows_xp_NtQueryInformationPort ENDP ; ULONG __stdcall NtQueryInformationProcess( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 ); _5_1_2600_sp3_windows_xp_NtQueryInformationProcess PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD mov eax , 154 mov edx , 7FFE0300h call dword ptr [edx] ret 20 _5_1_2600_sp3_windows_xp_NtQueryInformationProcess ENDP ; ULONG __stdcall NtQueryInformationThread( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 ); _5_1_2600_sp3_windows_xp_NtQueryInformationThread PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD mov eax , 155 mov edx , 7FFE0300h call dword ptr [edx] ret 20 _5_1_2600_sp3_windows_xp_NtQueryInformationThread ENDP ; ULONG __stdcall NtQueryInformationToken( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 ); _5_1_2600_sp3_windows_xp_NtQueryInformationToken PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD mov eax , 156 mov edx , 7FFE0300h call dword ptr [edx] ret 20 _5_1_2600_sp3_windows_xp_NtQueryInformationToken ENDP ; ULONG __stdcall NtQueryInstallUILanguage( ULONG arg_01 ); _5_1_2600_sp3_windows_xp_NtQueryInstallUILanguage PROC STDCALL arg_01:DWORD mov eax , 157 mov edx , 7FFE0300h call dword ptr [edx] ret 4 _5_1_2600_sp3_windows_xp_NtQueryInstallUILanguage ENDP ; ULONG __stdcall NtQueryIntervalProfile( ULONG arg_01 , ULONG arg_02 ); _5_1_2600_sp3_windows_xp_NtQueryIntervalProfile PROC STDCALL arg_01:DWORD , arg_02:DWORD mov eax , 158 mov edx , 7FFE0300h call dword ptr [edx] ret 8 _5_1_2600_sp3_windows_xp_NtQueryIntervalProfile ENDP ; ULONG __stdcall NtQueryIoCompletion( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 ); _5_1_2600_sp3_windows_xp_NtQueryIoCompletion PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD mov eax , 159 mov edx , 7FFE0300h call dword ptr [edx] ret 20 _5_1_2600_sp3_windows_xp_NtQueryIoCompletion ENDP ; ULONG __stdcall NtQueryKey( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 ); _5_1_2600_sp3_windows_xp_NtQueryKey PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD mov eax , 160 mov edx , 7FFE0300h call dword ptr [edx] ret 20 _5_1_2600_sp3_windows_xp_NtQueryKey ENDP ; ULONG __stdcall NtQueryMultipleValueKey( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 , ULONG arg_06 ); _5_1_2600_sp3_windows_xp_NtQueryMultipleValueKey PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD , arg_06:DWORD mov eax , 161 mov edx , 7FFE0300h call dword ptr [edx] ret 24 _5_1_2600_sp3_windows_xp_NtQueryMultipleValueKey ENDP ; ULONG __stdcall NtQueryMutant( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 ); _5_1_2600_sp3_windows_xp_NtQueryMutant PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD mov eax , 162 mov edx , 7FFE0300h call dword ptr [edx] ret 20 _5_1_2600_sp3_windows_xp_NtQueryMutant ENDP ; ULONG __stdcall NtQueryObject( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 ); _5_1_2600_sp3_windows_xp_NtQueryObject PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD mov eax , 163 mov edx , 7FFE0300h call dword ptr [edx] ret 20 _5_1_2600_sp3_windows_xp_NtQueryObject ENDP ; ULONG __stdcall NtQueryOpenSubKeys( ULONG arg_01 , ULONG arg_02 ); _5_1_2600_sp3_windows_xp_NtQueryOpenSubKeys PROC STDCALL arg_01:DWORD , arg_02:DWORD mov eax , 164 mov edx , 7FFE0300h call dword ptr [edx] ret 8 _5_1_2600_sp3_windows_xp_NtQueryOpenSubKeys ENDP ; ULONG __stdcall NtQueryPerformanceCounter( ULONG arg_01 , ULONG arg_02 ); _5_1_2600_sp3_windows_xp_NtQueryPerformanceCounter PROC STDCALL arg_01:DWORD , arg_02:DWORD mov eax , 165 mov edx , 7FFE0300h call dword ptr [edx] ret 8 _5_1_2600_sp3_windows_xp_NtQueryPerformanceCounter ENDP ; ULONG __stdcall NtQueryQuotaInformationFile( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 , ULONG arg_06 , ULONG arg_07 , ULONG arg_08 , ULONG arg_09 ); _5_1_2600_sp3_windows_xp_NtQueryQuotaInformationFile PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD , arg_06:DWORD , arg_07:DWORD , arg_08:DWORD , arg_09:DWORD mov eax , 166 mov edx , 7FFE0300h call dword ptr [edx] ret 36 _5_1_2600_sp3_windows_xp_NtQueryQuotaInformationFile ENDP ; ULONG __stdcall NtQuerySection( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 ); _5_1_2600_sp3_windows_xp_NtQuerySection PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD mov eax , 167 mov edx , 7FFE0300h call dword ptr [edx] ret 20 _5_1_2600_sp3_windows_xp_NtQuerySection ENDP ; ULONG __stdcall NtQuerySecurityObject( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 ); _5_1_2600_sp3_windows_xp_NtQuerySecurityObject PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD mov eax , 168 mov edx , 7FFE0300h call dword ptr [edx] ret 20 _5_1_2600_sp3_windows_xp_NtQuerySecurityObject ENDP ; ULONG __stdcall NtQuerySemaphore( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 ); _5_1_2600_sp3_windows_xp_NtQuerySemaphore PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD mov eax , 169 mov edx , 7FFE0300h call dword ptr [edx] ret 20 _5_1_2600_sp3_windows_xp_NtQuerySemaphore ENDP ; ULONG __stdcall NtQuerySymbolicLinkObject( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 ); _5_1_2600_sp3_windows_xp_NtQuerySymbolicLinkObject PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD mov eax , 170 mov edx , 7FFE0300h call dword ptr [edx] ret 12 _5_1_2600_sp3_windows_xp_NtQuerySymbolicLinkObject ENDP ; ULONG __stdcall NtQuerySystemEnvironmentValue( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 ); _5_1_2600_sp3_windows_xp_NtQuerySystemEnvironmentValue PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD mov eax , 171 mov edx , 7FFE0300h call dword ptr [edx] ret 16 _5_1_2600_sp3_windows_xp_NtQuerySystemEnvironmentValue ENDP ; ULONG __stdcall NtQuerySystemEnvironmentValueEx( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 ); _5_1_2600_sp3_windows_xp_NtQuerySystemEnvironmentValueEx PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD mov eax , 172 mov edx , 7FFE0300h call dword ptr [edx] ret 20 _5_1_2600_sp3_windows_xp_NtQuerySystemEnvironmentValueEx ENDP ; ULONG __stdcall NtQuerySystemInformation( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 ); _5_1_2600_sp3_windows_xp_NtQuerySystemInformation PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD mov eax , 173 mov edx , 7FFE0300h call dword ptr [edx] ret 16 _5_1_2600_sp3_windows_xp_NtQuerySystemInformation ENDP ; ULONG __stdcall NtQuerySystemTime( ULONG arg_01 ); _5_1_2600_sp3_windows_xp_NtQuerySystemTime PROC STDCALL arg_01:DWORD mov eax , 174 mov edx , 7FFE0300h call dword ptr [edx] ret 4 _5_1_2600_sp3_windows_xp_NtQuerySystemTime ENDP ; ULONG __stdcall NtQueryTimer( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 ); _5_1_2600_sp3_windows_xp_NtQueryTimer PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD mov eax , 175 mov edx , 7FFE0300h call dword ptr [edx] ret 20 _5_1_2600_sp3_windows_xp_NtQueryTimer ENDP ; ULONG __stdcall NtQueryTimerResolution( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 ); _5_1_2600_sp3_windows_xp_NtQueryTimerResolution PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD mov eax , 176 mov edx , 7FFE0300h call dword ptr [edx] ret 12 _5_1_2600_sp3_windows_xp_NtQueryTimerResolution ENDP ; ULONG __stdcall NtQueryValueKey( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 , ULONG arg_06 ); _5_1_2600_sp3_windows_xp_NtQueryValueKey PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD , arg_06:DWORD mov eax , 177 mov edx , 7FFE0300h call dword ptr [edx] ret 24 _5_1_2600_sp3_windows_xp_NtQueryValueKey ENDP ; ULONG __stdcall NtQueryVirtualMemory( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 , ULONG arg_06 ); _5_1_2600_sp3_windows_xp_NtQueryVirtualMemory PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD , arg_06:DWORD mov eax , 178 mov edx , 7FFE0300h call dword ptr [edx] ret 24 _5_1_2600_sp3_windows_xp_NtQueryVirtualMemory ENDP ; ULONG __stdcall NtQueryVolumeInformationFile( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 ); _5_1_2600_sp3_windows_xp_NtQueryVolumeInformationFile PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD mov eax , 179 mov edx , 7FFE0300h call dword ptr [edx] ret 20 _5_1_2600_sp3_windows_xp_NtQueryVolumeInformationFile ENDP ; ULONG __stdcall NtQueueApcThread( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 ); _5_1_2600_sp3_windows_xp_NtQueueApcThread PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD mov eax , 180 mov edx , 7FFE0300h call dword ptr [edx] ret 20 _5_1_2600_sp3_windows_xp_NtQueueApcThread ENDP ; ULONG __stdcall NtRaiseException( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 ); _5_1_2600_sp3_windows_xp_NtRaiseException PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD mov eax , 181 mov edx , 7FFE0300h call dword ptr [edx] ret 12 _5_1_2600_sp3_windows_xp_NtRaiseException ENDP ; ULONG __stdcall NtRaiseHardError( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 , ULONG arg_06 ); _5_1_2600_sp3_windows_xp_NtRaiseHardError PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD , arg_06:DWORD mov eax , 182 mov edx , 7FFE0300h call dword ptr [edx] ret 24 _5_1_2600_sp3_windows_xp_NtRaiseHardError ENDP ; ULONG __stdcall NtReadFile( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 , ULONG arg_06 , ULONG arg_07 , ULONG arg_08 , ULONG arg_09 ); _5_1_2600_sp3_windows_xp_NtReadFile PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD , arg_06:DWORD , arg_07:DWORD , arg_08:DWORD , arg_09:DWORD mov eax , 183 mov edx , 7FFE0300h call dword ptr [edx] ret 36 _5_1_2600_sp3_windows_xp_NtReadFile ENDP ; ULONG __stdcall NtReadFileScatter( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 , ULONG arg_06 , ULONG arg_07 , ULONG arg_08 , ULONG arg_09 ); _5_1_2600_sp3_windows_xp_NtReadFileScatter PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD , arg_06:DWORD , arg_07:DWORD , arg_08:DWORD , arg_09:DWORD mov eax , 184 mov edx , 7FFE0300h call dword ptr [edx] ret 36 _5_1_2600_sp3_windows_xp_NtReadFileScatter ENDP ; ULONG __stdcall NtReadRequestData( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 , ULONG arg_06 ); _5_1_2600_sp3_windows_xp_NtReadRequestData PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD , arg_06:DWORD mov eax , 185 mov edx , 7FFE0300h call dword ptr [edx] ret 24 _5_1_2600_sp3_windows_xp_NtReadRequestData ENDP ; ULONG __stdcall NtReadVirtualMemory( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 ); _5_1_2600_sp3_windows_xp_NtReadVirtualMemory PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD mov eax , 186 mov edx , 7FFE0300h call dword ptr [edx] ret 20 _5_1_2600_sp3_windows_xp_NtReadVirtualMemory ENDP ; ULONG __stdcall NtRegisterThreadTerminatePort( ULONG arg_01 ); _5_1_2600_sp3_windows_xp_NtRegisterThreadTerminatePort PROC STDCALL arg_01:DWORD mov eax , 187 mov edx , 7FFE0300h call dword ptr [edx] ret 4 _5_1_2600_sp3_windows_xp_NtRegisterThreadTerminatePort ENDP ; ULONG __stdcall NtReleaseMutant( ULONG arg_01 , ULONG arg_02 ); _5_1_2600_sp3_windows_xp_NtReleaseMutant PROC STDCALL arg_01:DWORD , arg_02:DWORD mov eax , 188 mov edx , 7FFE0300h call dword ptr [edx] ret 8 _5_1_2600_sp3_windows_xp_NtReleaseMutant ENDP ; ULONG __stdcall NtReleaseSemaphore( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 ); _5_1_2600_sp3_windows_xp_NtReleaseSemaphore PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD mov eax , 189 mov edx , 7FFE0300h call dword ptr [edx] ret 12 _5_1_2600_sp3_windows_xp_NtReleaseSemaphore ENDP ; ULONG __stdcall NtRemoveIoCompletion( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 ); _5_1_2600_sp3_windows_xp_NtRemoveIoCompletion PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD mov eax , 190 mov edx , 7FFE0300h call dword ptr [edx] ret 20 _5_1_2600_sp3_windows_xp_NtRemoveIoCompletion ENDP ; ULONG __stdcall NtRemoveProcessDebug( ULONG arg_01 , ULONG arg_02 ); _5_1_2600_sp3_windows_xp_NtRemoveProcessDebug PROC STDCALL arg_01:DWORD , arg_02:DWORD mov eax , 191 mov edx , 7FFE0300h call dword ptr [edx] ret 8 _5_1_2600_sp3_windows_xp_NtRemoveProcessDebug ENDP ; ULONG __stdcall NtRenameKey( ULONG arg_01 , ULONG arg_02 ); _5_1_2600_sp3_windows_xp_NtRenameKey PROC STDCALL arg_01:DWORD , arg_02:DWORD mov eax , 192 mov edx , 7FFE0300h call dword ptr [edx] ret 8 _5_1_2600_sp3_windows_xp_NtRenameKey ENDP ; ULONG __stdcall NtReplaceKey( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 ); _5_1_2600_sp3_windows_xp_NtReplaceKey PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD mov eax , 193 mov edx , 7FFE0300h call dword ptr [edx] ret 12 _5_1_2600_sp3_windows_xp_NtReplaceKey ENDP ; ULONG __stdcall NtReplyPort( ULONG arg_01 , ULONG arg_02 ); _5_1_2600_sp3_windows_xp_NtReplyPort PROC STDCALL arg_01:DWORD , arg_02:DWORD mov eax , 194 mov edx , 7FFE0300h call dword ptr [edx] ret 8 _5_1_2600_sp3_windows_xp_NtReplyPort ENDP ; ULONG __stdcall NtReplyWaitReceivePort( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 ); _5_1_2600_sp3_windows_xp_NtReplyWaitReceivePort PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD mov eax , 195 mov edx , 7FFE0300h call dword ptr [edx] ret 16 _5_1_2600_sp3_windows_xp_NtReplyWaitReceivePort ENDP ; ULONG __stdcall NtReplyWaitReceivePortEx( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 ); _5_1_2600_sp3_windows_xp_NtReplyWaitReceivePortEx PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD mov eax , 196 mov edx , 7FFE0300h call dword ptr [edx] ret 20 _5_1_2600_sp3_windows_xp_NtReplyWaitReceivePortEx ENDP ; ULONG __stdcall NtReplyWaitReplyPort( ULONG arg_01 , ULONG arg_02 ); _5_1_2600_sp3_windows_xp_NtReplyWaitReplyPort PROC STDCALL arg_01:DWORD , arg_02:DWORD mov eax , 197 mov edx , 7FFE0300h call dword ptr [edx] ret 8 _5_1_2600_sp3_windows_xp_NtReplyWaitReplyPort ENDP ; ULONG __stdcall NtRequestDeviceWakeup( ULONG arg_01 ); _5_1_2600_sp3_windows_xp_NtRequestDeviceWakeup PROC STDCALL arg_01:DWORD mov eax , 198 mov edx , 7FFE0300h call dword ptr [edx] ret 4 _5_1_2600_sp3_windows_xp_NtRequestDeviceWakeup ENDP ; ULONG __stdcall NtRequestPort( ULONG arg_01 , ULONG arg_02 ); _5_1_2600_sp3_windows_xp_NtRequestPort PROC STDCALL arg_01:DWORD , arg_02:DWORD mov eax , 199 mov edx , 7FFE0300h call dword ptr [edx] ret 8 _5_1_2600_sp3_windows_xp_NtRequestPort ENDP ; ULONG __stdcall NtRequestWaitReplyPort( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 ); _5_1_2600_sp3_windows_xp_NtRequestWaitReplyPort PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD mov eax , 200 mov edx , 7FFE0300h call dword ptr [edx] ret 12 _5_1_2600_sp3_windows_xp_NtRequestWaitReplyPort ENDP ; ULONG __stdcall NtRequestWakeupLatency( ULONG arg_01 ); _5_1_2600_sp3_windows_xp_NtRequestWakeupLatency PROC STDCALL arg_01:DWORD mov eax , 201 mov edx , 7FFE0300h call dword ptr [edx] ret 4 _5_1_2600_sp3_windows_xp_NtRequestWakeupLatency ENDP ; ULONG __stdcall NtResetEvent( ULONG arg_01 , ULONG arg_02 ); _5_1_2600_sp3_windows_xp_NtResetEvent PROC STDCALL arg_01:DWORD , arg_02:DWORD mov eax , 202 mov edx , 7FFE0300h call dword ptr [edx] ret 8 _5_1_2600_sp3_windows_xp_NtResetEvent ENDP ; ULONG __stdcall NtResetWriteWatch( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 ); _5_1_2600_sp3_windows_xp_NtResetWriteWatch PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD mov eax , 203 mov edx , 7FFE0300h call dword ptr [edx] ret 12 _5_1_2600_sp3_windows_xp_NtResetWriteWatch ENDP ; ULONG __stdcall NtRestoreKey( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 ); _5_1_2600_sp3_windows_xp_NtRestoreKey PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD mov eax , 204 mov edx , 7FFE0300h call dword ptr [edx] ret 12 _5_1_2600_sp3_windows_xp_NtRestoreKey ENDP ; ULONG __stdcall NtResumeProcess( ULONG arg_01 ); _5_1_2600_sp3_windows_xp_NtResumeProcess PROC STDCALL arg_01:DWORD mov eax , 205 mov edx , 7FFE0300h call dword ptr [edx] ret 4 _5_1_2600_sp3_windows_xp_NtResumeProcess ENDP ; ULONG __stdcall NtResumeThread( ULONG arg_01 , ULONG arg_02 ); _5_1_2600_sp3_windows_xp_NtResumeThread PROC STDCALL arg_01:DWORD , arg_02:DWORD mov eax , 206 mov edx , 7FFE0300h call dword ptr [edx] ret 8 _5_1_2600_sp3_windows_xp_NtResumeThread ENDP ; ULONG __stdcall NtSaveKey( ULONG arg_01 , ULONG arg_02 ); _5_1_2600_sp3_windows_xp_NtSaveKey PROC STDCALL arg_01:DWORD , arg_02:DWORD mov eax , 207 mov edx , 7FFE0300h call dword ptr [edx] ret 8 _5_1_2600_sp3_windows_xp_NtSaveKey ENDP ; ULONG __stdcall NtSaveKeyEx( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 ); _5_1_2600_sp3_windows_xp_NtSaveKeyEx PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD mov eax , 208 mov edx , 7FFE0300h call dword ptr [edx] ret 12 _5_1_2600_sp3_windows_xp_NtSaveKeyEx ENDP ; ULONG __stdcall NtSaveMergedKeys( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 ); _5_1_2600_sp3_windows_xp_NtSaveMergedKeys PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD mov eax , 209 mov edx , 7FFE0300h call dword ptr [edx] ret 12 _5_1_2600_sp3_windows_xp_NtSaveMergedKeys ENDP ; ULONG __stdcall NtSecureConnectPort( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 , ULONG arg_06 , ULONG arg_07 , ULONG arg_08 , ULONG arg_09 ); _5_1_2600_sp3_windows_xp_NtSecureConnectPort PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD , arg_06:DWORD , arg_07:DWORD , arg_08:DWORD , arg_09:DWORD mov eax , 210 mov edx , 7FFE0300h call dword ptr [edx] ret 36 _5_1_2600_sp3_windows_xp_NtSecureConnectPort ENDP ; ULONG __stdcall NtSetBootEntryOrder( ULONG arg_01 , ULONG arg_02 ); _5_1_2600_sp3_windows_xp_NtSetBootEntryOrder PROC STDCALL arg_01:DWORD , arg_02:DWORD mov eax , 211 mov edx , 7FFE0300h call dword ptr [edx] ret 8 _5_1_2600_sp3_windows_xp_NtSetBootEntryOrder ENDP ; ULONG __stdcall NtSetBootOptions( ULONG arg_01 , ULONG arg_02 ); _5_1_2600_sp3_windows_xp_NtSetBootOptions PROC STDCALL arg_01:DWORD , arg_02:DWORD mov eax , 212 mov edx , 7FFE0300h call dword ptr [edx] ret 8 _5_1_2600_sp3_windows_xp_NtSetBootOptions ENDP ; ULONG __stdcall NtSetContextThread( ULONG arg_01 , ULONG arg_02 ); _5_1_2600_sp3_windows_xp_NtSetContextThread PROC STDCALL arg_01:DWORD , arg_02:DWORD mov eax , 213 mov edx , 7FFE0300h call dword ptr [edx] ret 8 _5_1_2600_sp3_windows_xp_NtSetContextThread ENDP ; ULONG __stdcall NtSetDebugFilterState( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 ); _5_1_2600_sp3_windows_xp_NtSetDebugFilterState PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD mov eax , 214 mov edx , 7FFE0300h call dword ptr [edx] ret 12 _5_1_2600_sp3_windows_xp_NtSetDebugFilterState ENDP ; ULONG __stdcall NtSetDefaultHardErrorPort( ULONG arg_01 ); _5_1_2600_sp3_windows_xp_NtSetDefaultHardErrorPort PROC STDCALL arg_01:DWORD mov eax , 215 mov edx , 7FFE0300h call dword ptr [edx] ret 4 _5_1_2600_sp3_windows_xp_NtSetDefaultHardErrorPort ENDP ; ULONG __stdcall NtSetDefaultLocale( ULONG arg_01 , ULONG arg_02 ); _5_1_2600_sp3_windows_xp_NtSetDefaultLocale PROC STDCALL arg_01:DWORD , arg_02:DWORD mov eax , 216 mov edx , 7FFE0300h call dword ptr [edx] ret 8 _5_1_2600_sp3_windows_xp_NtSetDefaultLocale ENDP ; ULONG __stdcall NtSetDefaultUILanguage( ULONG arg_01 ); _5_1_2600_sp3_windows_xp_NtSetDefaultUILanguage PROC STDCALL arg_01:DWORD mov eax , 217 mov edx , 7FFE0300h call dword ptr [edx] ret 4 _5_1_2600_sp3_windows_xp_NtSetDefaultUILanguage ENDP ; ULONG __stdcall NtSetEaFile( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 ); _5_1_2600_sp3_windows_xp_NtSetEaFile PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD mov eax , 218 mov edx , 7FFE0300h call dword ptr [edx] ret 16 _5_1_2600_sp3_windows_xp_NtSetEaFile ENDP ; ULONG __stdcall NtSetEvent( ULONG arg_01 , ULONG arg_02 ); _5_1_2600_sp3_windows_xp_NtSetEvent PROC STDCALL arg_01:DWORD , arg_02:DWORD mov eax , 219 mov edx , 7FFE0300h call dword ptr [edx] ret 8 _5_1_2600_sp3_windows_xp_NtSetEvent ENDP ; ULONG __stdcall NtSetEventBoostPriority( ULONG arg_01 ); _5_1_2600_sp3_windows_xp_NtSetEventBoostPriority PROC STDCALL arg_01:DWORD mov eax , 220 mov edx , 7FFE0300h call dword ptr [edx] ret 4 _5_1_2600_sp3_windows_xp_NtSetEventBoostPriority ENDP ; ULONG __stdcall NtSetHighEventPair( ULONG arg_01 ); _5_1_2600_sp3_windows_xp_NtSetHighEventPair PROC STDCALL arg_01:DWORD mov eax , 221 mov edx , 7FFE0300h call dword ptr [edx] ret 4 _5_1_2600_sp3_windows_xp_NtSetHighEventPair ENDP ; ULONG __stdcall NtSetHighWaitLowEventPair( ULONG arg_01 ); _5_1_2600_sp3_windows_xp_NtSetHighWaitLowEventPair PROC STDCALL arg_01:DWORD mov eax , 222 mov edx , 7FFE0300h call dword ptr [edx] ret 4 _5_1_2600_sp3_windows_xp_NtSetHighWaitLowEventPair ENDP ; ULONG __stdcall NtSetInformationDebugObject( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 ); _5_1_2600_sp3_windows_xp_NtSetInformationDebugObject PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD mov eax , 223 mov edx , 7FFE0300h call dword ptr [edx] ret 20 _5_1_2600_sp3_windows_xp_NtSetInformationDebugObject ENDP ; ULONG __stdcall NtSetInformationFile( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 ); _5_1_2600_sp3_windows_xp_NtSetInformationFile PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD mov eax , 224 mov edx , 7FFE0300h call dword ptr [edx] ret 20 _5_1_2600_sp3_windows_xp_NtSetInformationFile ENDP ; ULONG __stdcall NtSetInformationJobObject( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 ); _5_1_2600_sp3_windows_xp_NtSetInformationJobObject PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD mov eax , 225 mov edx , 7FFE0300h call dword ptr [edx] ret 16 _5_1_2600_sp3_windows_xp_NtSetInformationJobObject ENDP ; ULONG __stdcall NtSetInformationKey( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 ); _5_1_2600_sp3_windows_xp_NtSetInformationKey PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD mov eax , 226 mov edx , 7FFE0300h call dword ptr [edx] ret 16 _5_1_2600_sp3_windows_xp_NtSetInformationKey ENDP ; ULONG __stdcall NtSetInformationObject( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 ); _5_1_2600_sp3_windows_xp_NtSetInformationObject PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD mov eax , 227 mov edx , 7FFE0300h call dword ptr [edx] ret 16 _5_1_2600_sp3_windows_xp_NtSetInformationObject ENDP ; ULONG __stdcall NtSetInformationProcess( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 ); _5_1_2600_sp3_windows_xp_NtSetInformationProcess PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD mov eax , 228 mov edx , 7FFE0300h call dword ptr [edx] ret 16 _5_1_2600_sp3_windows_xp_NtSetInformationProcess ENDP ; ULONG __stdcall NtSetInformationThread( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 ); _5_1_2600_sp3_windows_xp_NtSetInformationThread PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD mov eax , 229 mov edx , 7FFE0300h call dword ptr [edx] ret 16 _5_1_2600_sp3_windows_xp_NtSetInformationThread ENDP ; ULONG __stdcall NtSetInformationToken( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 ); _5_1_2600_sp3_windows_xp_NtSetInformationToken PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD mov eax , 230 mov edx , 7FFE0300h call dword ptr [edx] ret 16 _5_1_2600_sp3_windows_xp_NtSetInformationToken ENDP ; ULONG __stdcall NtSetIntervalProfile( ULONG arg_01 , ULONG arg_02 ); _5_1_2600_sp3_windows_xp_NtSetIntervalProfile PROC STDCALL arg_01:DWORD , arg_02:DWORD mov eax , 231 mov edx , 7FFE0300h call dword ptr [edx] ret 8 _5_1_2600_sp3_windows_xp_NtSetIntervalProfile ENDP ; ULONG __stdcall NtSetIoCompletion( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 ); _5_1_2600_sp3_windows_xp_NtSetIoCompletion PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD mov eax , 232 mov edx , 7FFE0300h call dword ptr [edx] ret 20 _5_1_2600_sp3_windows_xp_NtSetIoCompletion ENDP ; ULONG __stdcall NtSetLdtEntries( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 , ULONG arg_06 ); _5_1_2600_sp3_windows_xp_NtSetLdtEntries PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD , arg_06:DWORD mov eax , 233 mov edx , 7FFE0300h call dword ptr [edx] ret 24 _5_1_2600_sp3_windows_xp_NtSetLdtEntries ENDP ; ULONG __stdcall NtSetLowEventPair( ULONG arg_01 ); _5_1_2600_sp3_windows_xp_NtSetLowEventPair PROC STDCALL arg_01:DWORD mov eax , 234 mov edx , 7FFE0300h call dword ptr [edx] ret 4 _5_1_2600_sp3_windows_xp_NtSetLowEventPair ENDP ; ULONG __stdcall NtSetLowWaitHighEventPair( ULONG arg_01 ); _5_1_2600_sp3_windows_xp_NtSetLowWaitHighEventPair PROC STDCALL arg_01:DWORD mov eax , 235 mov edx , 7FFE0300h call dword ptr [edx] ret 4 _5_1_2600_sp3_windows_xp_NtSetLowWaitHighEventPair ENDP ; ULONG __stdcall NtSetQuotaInformationFile( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 ); _5_1_2600_sp3_windows_xp_NtSetQuotaInformationFile PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD mov eax , 236 mov edx , 7FFE0300h call dword ptr [edx] ret 16 _5_1_2600_sp3_windows_xp_NtSetQuotaInformationFile ENDP ; ULONG __stdcall NtSetSecurityObject( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 ); _5_1_2600_sp3_windows_xp_NtSetSecurityObject PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD mov eax , 237 mov edx , 7FFE0300h call dword ptr [edx] ret 12 _5_1_2600_sp3_windows_xp_NtSetSecurityObject ENDP ; ULONG __stdcall NtSetSystemEnvironmentValue( ULONG arg_01 , ULONG arg_02 ); _5_1_2600_sp3_windows_xp_NtSetSystemEnvironmentValue PROC STDCALL arg_01:DWORD , arg_02:DWORD mov eax , 238 mov edx , 7FFE0300h call dword ptr [edx] ret 8 _5_1_2600_sp3_windows_xp_NtSetSystemEnvironmentValue ENDP ; ULONG __stdcall NtSetSystemEnvironmentValueEx( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 ); _5_1_2600_sp3_windows_xp_NtSetSystemEnvironmentValueEx PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD mov eax , 239 mov edx , 7FFE0300h call dword ptr [edx] ret 20 _5_1_2600_sp3_windows_xp_NtSetSystemEnvironmentValueEx ENDP ; ULONG __stdcall NtSetSystemInformation( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 ); _5_1_2600_sp3_windows_xp_NtSetSystemInformation PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD mov eax , 240 mov edx , 7FFE0300h call dword ptr [edx] ret 12 _5_1_2600_sp3_windows_xp_NtSetSystemInformation ENDP ; ULONG __stdcall NtSetSystemPowerState( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 ); _5_1_2600_sp3_windows_xp_NtSetSystemPowerState PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD mov eax , 241 mov edx , 7FFE0300h call dword ptr [edx] ret 12 _5_1_2600_sp3_windows_xp_NtSetSystemPowerState ENDP ; ULONG __stdcall NtSetSystemTime( ULONG arg_01 , ULONG arg_02 ); _5_1_2600_sp3_windows_xp_NtSetSystemTime PROC STDCALL arg_01:DWORD , arg_02:DWORD mov eax , 242 mov edx , 7FFE0300h call dword ptr [edx] ret 8 _5_1_2600_sp3_windows_xp_NtSetSystemTime ENDP ; ULONG __stdcall NtSetThreadExecutionState( ULONG arg_01 , ULONG arg_02 ); _5_1_2600_sp3_windows_xp_NtSetThreadExecutionState PROC STDCALL arg_01:DWORD , arg_02:DWORD mov eax , 243 mov edx , 7FFE0300h call dword ptr [edx] ret 8 _5_1_2600_sp3_windows_xp_NtSetThreadExecutionState ENDP ; ULONG __stdcall NtSetTimer( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 , ULONG arg_06 , ULONG arg_07 ); _5_1_2600_sp3_windows_xp_NtSetTimer PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD , arg_06:DWORD , arg_07:DWORD mov eax , 244 mov edx , 7FFE0300h call dword ptr [edx] ret 28 _5_1_2600_sp3_windows_xp_NtSetTimer ENDP ; ULONG __stdcall NtSetTimerResolution( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 ); _5_1_2600_sp3_windows_xp_NtSetTimerResolution PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD mov eax , 245 mov edx , 7FFE0300h call dword ptr [edx] ret 12 _5_1_2600_sp3_windows_xp_NtSetTimerResolution ENDP ; ULONG __stdcall NtSetUuidSeed( ULONG arg_01 ); _5_1_2600_sp3_windows_xp_NtSetUuidSeed PROC STDCALL arg_01:DWORD mov eax , 246 mov edx , 7FFE0300h call dword ptr [edx] ret 4 _5_1_2600_sp3_windows_xp_NtSetUuidSeed ENDP ; ULONG __stdcall NtSetValueKey( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 , ULONG arg_06 ); _5_1_2600_sp3_windows_xp_NtSetValueKey PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD , arg_06:DWORD mov eax , 247 mov edx , 7FFE0300h call dword ptr [edx] ret 24 _5_1_2600_sp3_windows_xp_NtSetValueKey ENDP ; ULONG __stdcall NtSetVolumeInformationFile( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 ); _5_1_2600_sp3_windows_xp_NtSetVolumeInformationFile PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD mov eax , 248 mov edx , 7FFE0300h call dword ptr [edx] ret 20 _5_1_2600_sp3_windows_xp_NtSetVolumeInformationFile ENDP ; ULONG __stdcall NtShutdownSystem( ULONG arg_01 ); _5_1_2600_sp3_windows_xp_NtShutdownSystem PROC STDCALL arg_01:DWORD mov eax , 249 mov edx , 7FFE0300h call dword ptr [edx] ret 4 _5_1_2600_sp3_windows_xp_NtShutdownSystem ENDP ; ULONG __stdcall NtSignalAndWaitForSingleObject( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 ); _5_1_2600_sp3_windows_xp_NtSignalAndWaitForSingleObject PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD mov eax , 250 mov edx , 7FFE0300h call dword ptr [edx] ret 16 _5_1_2600_sp3_windows_xp_NtSignalAndWaitForSingleObject ENDP ; ULONG __stdcall NtStartProfile( ULONG arg_01 ); _5_1_2600_sp3_windows_xp_NtStartProfile PROC STDCALL arg_01:DWORD mov eax , 251 mov edx , 7FFE0300h call dword ptr [edx] ret 4 _5_1_2600_sp3_windows_xp_NtStartProfile ENDP ; ULONG __stdcall NtStopProfile( ULONG arg_01 ); _5_1_2600_sp3_windows_xp_NtStopProfile PROC STDCALL arg_01:DWORD mov eax , 252 mov edx , 7FFE0300h call dword ptr [edx] ret 4 _5_1_2600_sp3_windows_xp_NtStopProfile ENDP ; ULONG __stdcall NtSuspendProcess( ULONG arg_01 ); _5_1_2600_sp3_windows_xp_NtSuspendProcess PROC STDCALL arg_01:DWORD mov eax , 253 mov edx , 7FFE0300h call dword ptr [edx] ret 4 _5_1_2600_sp3_windows_xp_NtSuspendProcess ENDP ; ULONG __stdcall NtSuspendThread( ULONG arg_01 , ULONG arg_02 ); _5_1_2600_sp3_windows_xp_NtSuspendThread PROC STDCALL arg_01:DWORD , arg_02:DWORD mov eax , 254 mov edx , 7FFE0300h call dword ptr [edx] ret 8 _5_1_2600_sp3_windows_xp_NtSuspendThread ENDP ; ULONG __stdcall NtSystemDebugControl( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 , ULONG arg_06 ); _5_1_2600_sp3_windows_xp_NtSystemDebugControl PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD , arg_06:DWORD mov eax , 255 mov edx , 7FFE0300h call dword ptr [edx] ret 24 _5_1_2600_sp3_windows_xp_NtSystemDebugControl ENDP ; ULONG __stdcall NtTerminateJobObject( ULONG arg_01 , ULONG arg_02 ); _5_1_2600_sp3_windows_xp_NtTerminateJobObject PROC STDCALL arg_01:DWORD , arg_02:DWORD mov eax , 256 mov edx , 7FFE0300h call dword ptr [edx] ret 8 _5_1_2600_sp3_windows_xp_NtTerminateJobObject ENDP ; ULONG __stdcall NtTerminateProcess( ULONG arg_01 , ULONG arg_02 ); _5_1_2600_sp3_windows_xp_NtTerminateProcess PROC STDCALL arg_01:DWORD , arg_02:DWORD mov eax , 257 mov edx , 7FFE0300h call dword ptr [edx] ret 8 _5_1_2600_sp3_windows_xp_NtTerminateProcess ENDP ; ULONG __stdcall NtTerminateThread( ULONG arg_01 , ULONG arg_02 ); _5_1_2600_sp3_windows_xp_NtTerminateThread PROC STDCALL arg_01:DWORD , arg_02:DWORD mov eax , 258 mov edx , 7FFE0300h call dword ptr [edx] ret 8 _5_1_2600_sp3_windows_xp_NtTerminateThread ENDP ; ULONG __stdcall NtTestAlert( ); _5_1_2600_sp3_windows_xp_NtTestAlert PROC STDCALL mov eax , 259 mov edx , 7FFE0300h call dword ptr [edx] ret _5_1_2600_sp3_windows_xp_NtTestAlert ENDP ; ULONG __stdcall NtTraceEvent( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 ); _5_1_2600_sp3_windows_xp_NtTraceEvent PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD mov eax , 260 mov edx , 7FFE0300h call dword ptr [edx] ret 16 _5_1_2600_sp3_windows_xp_NtTraceEvent ENDP ; ULONG __stdcall NtTranslateFilePath( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 ); _5_1_2600_sp3_windows_xp_NtTranslateFilePath PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD mov eax , 261 mov edx , 7FFE0300h call dword ptr [edx] ret 16 _5_1_2600_sp3_windows_xp_NtTranslateFilePath ENDP ; ULONG __stdcall NtUnloadDriver( ULONG arg_01 ); _5_1_2600_sp3_windows_xp_NtUnloadDriver PROC STDCALL arg_01:DWORD mov eax , 262 mov edx , 7FFE0300h call dword ptr [edx] ret 4 _5_1_2600_sp3_windows_xp_NtUnloadDriver ENDP ; ULONG __stdcall NtUnloadKey( ULONG arg_01 ); _5_1_2600_sp3_windows_xp_NtUnloadKey PROC STDCALL arg_01:DWORD mov eax , 263 mov edx , 7FFE0300h call dword ptr [edx] ret 4 _5_1_2600_sp3_windows_xp_NtUnloadKey ENDP ; ULONG __stdcall NtUnloadKeyEx( ULONG arg_01 , ULONG arg_02 ); _5_1_2600_sp3_windows_xp_NtUnloadKeyEx PROC STDCALL arg_01:DWORD , arg_02:DWORD mov eax , 264 mov edx , 7FFE0300h call dword ptr [edx] ret 8 _5_1_2600_sp3_windows_xp_NtUnloadKeyEx ENDP ; ULONG __stdcall NtUnlockFile( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 ); _5_1_2600_sp3_windows_xp_NtUnlockFile PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD mov eax , 265 mov edx , 7FFE0300h call dword ptr [edx] ret 20 _5_1_2600_sp3_windows_xp_NtUnlockFile ENDP ; ULONG __stdcall NtUnlockVirtualMemory( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 ); _5_1_2600_sp3_windows_xp_NtUnlockVirtualMemory PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD mov eax , 266 mov edx , 7FFE0300h call dword ptr [edx] ret 16 _5_1_2600_sp3_windows_xp_NtUnlockVirtualMemory ENDP ; ULONG __stdcall NtUnmapViewOfSection( ULONG arg_01 , ULONG arg_02 ); _5_1_2600_sp3_windows_xp_NtUnmapViewOfSection PROC STDCALL arg_01:DWORD , arg_02:DWORD mov eax , 267 mov edx , 7FFE0300h call dword ptr [edx] ret 8 _5_1_2600_sp3_windows_xp_NtUnmapViewOfSection ENDP ; ULONG __stdcall NtVdmControl( ULONG arg_01 , ULONG arg_02 ); _5_1_2600_sp3_windows_xp_NtVdmControl PROC STDCALL arg_01:DWORD , arg_02:DWORD mov eax , 268 mov edx , 7FFE0300h call dword ptr [edx] ret 8 _5_1_2600_sp3_windows_xp_NtVdmControl ENDP ; ULONG __stdcall NtWaitForDebugEvent( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 ); _5_1_2600_sp3_windows_xp_NtWaitForDebugEvent PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD mov eax , 269 mov edx , 7FFE0300h call dword ptr [edx] ret 16 _5_1_2600_sp3_windows_xp_NtWaitForDebugEvent ENDP ; ULONG __stdcall NtWaitForMultipleObjects( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 ); _5_1_2600_sp3_windows_xp_NtWaitForMultipleObjects PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD mov eax , 270 mov edx , 7FFE0300h call dword ptr [edx] ret 20 _5_1_2600_sp3_windows_xp_NtWaitForMultipleObjects ENDP ; ULONG __stdcall NtWaitForSingleObject( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 ); _5_1_2600_sp3_windows_xp_NtWaitForSingleObject PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD mov eax , 271 mov edx , 7FFE0300h call dword ptr [edx] ret 12 _5_1_2600_sp3_windows_xp_NtWaitForSingleObject ENDP ; ULONG __stdcall NtWaitHighEventPair( ULONG arg_01 ); _5_1_2600_sp3_windows_xp_NtWaitHighEventPair PROC STDCALL arg_01:DWORD mov eax , 272 mov edx , 7FFE0300h call dword ptr [edx] ret 4 _5_1_2600_sp3_windows_xp_NtWaitHighEventPair ENDP ; ULONG __stdcall NtWaitLowEventPair( ULONG arg_01 ); _5_1_2600_sp3_windows_xp_NtWaitLowEventPair PROC STDCALL arg_01:DWORD mov eax , 273 mov edx , 7FFE0300h call dword ptr [edx] ret 4 _5_1_2600_sp3_windows_xp_NtWaitLowEventPair ENDP ; ULONG __stdcall NtWriteFile( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 , ULONG arg_06 , ULONG arg_07 , ULONG arg_08 , ULONG arg_09 ); _5_1_2600_sp3_windows_xp_NtWriteFile PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD , arg_06:DWORD , arg_07:DWORD , arg_08:DWORD , arg_09:DWORD mov eax , 274 mov edx , 7FFE0300h call dword ptr [edx] ret 36 _5_1_2600_sp3_windows_xp_NtWriteFile ENDP ; ULONG __stdcall NtWriteFileGather( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 , ULONG arg_06 , ULONG arg_07 , ULONG arg_08 , ULONG arg_09 ); _5_1_2600_sp3_windows_xp_NtWriteFileGather PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD , arg_06:DWORD , arg_07:DWORD , arg_08:DWORD , arg_09:DWORD mov eax , 275 mov edx , 7FFE0300h call dword ptr [edx] ret 36 _5_1_2600_sp3_windows_xp_NtWriteFileGather ENDP ; ULONG __stdcall NtWriteRequestData( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 , ULONG arg_06 ); _5_1_2600_sp3_windows_xp_NtWriteRequestData PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD , arg_06:DWORD mov eax , 276 mov edx , 7FFE0300h call dword ptr [edx] ret 24 _5_1_2600_sp3_windows_xp_NtWriteRequestData ENDP ; ULONG __stdcall NtWriteVirtualMemory( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 , ULONG arg_05 ); _5_1_2600_sp3_windows_xp_NtWriteVirtualMemory PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD , arg_05:DWORD mov eax , 277 mov edx , 7FFE0300h call dword ptr [edx] ret 20 _5_1_2600_sp3_windows_xp_NtWriteVirtualMemory ENDP ; ULONG __stdcall NtYieldExecution( ); _5_1_2600_sp3_windows_xp_NtYieldExecution PROC STDCALL mov eax , 278 mov edx , 7FFE0300h call dword ptr [edx] ret _5_1_2600_sp3_windows_xp_NtYieldExecution ENDP ; ULONG __stdcall NtCreateKeyedEvent( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 ); _5_1_2600_sp3_windows_xp_NtCreateKeyedEvent PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD mov eax , 279 mov edx , 7FFE0300h call dword ptr [edx] ret 16 _5_1_2600_sp3_windows_xp_NtCreateKeyedEvent ENDP ; ULONG __stdcall NtOpenKeyedEvent( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 ); _5_1_2600_sp3_windows_xp_NtOpenKeyedEvent PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD mov eax , 280 mov edx , 7FFE0300h call dword ptr [edx] ret 12 _5_1_2600_sp3_windows_xp_NtOpenKeyedEvent ENDP ; ULONG __stdcall NtReleaseKeyedEvent( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 ); _5_1_2600_sp3_windows_xp_NtReleaseKeyedEvent PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD mov eax , 281 mov edx , 7FFE0300h call dword ptr [edx] ret 16 _5_1_2600_sp3_windows_xp_NtReleaseKeyedEvent ENDP ; ULONG __stdcall NtWaitForKeyedEvent( ULONG arg_01 , ULONG arg_02 , ULONG arg_03 , ULONG arg_04 ); _5_1_2600_sp3_windows_xp_NtWaitForKeyedEvent PROC STDCALL arg_01:DWORD , arg_02:DWORD , arg_03:DWORD , arg_04:DWORD mov eax , 282 mov edx , 7FFE0300h call dword ptr [edx] ret 16 _5_1_2600_sp3_windows_xp_NtWaitForKeyedEvent ENDP ; ULONG __stdcall NtQueryPortInformationProcess( ); _5_1_2600_sp3_windows_xp_NtQueryPortInformationProcess PROC STDCALL mov eax , 283 mov edx , 7FFE0300h call dword ptr [edx] ret _5_1_2600_sp3_windows_xp_NtQueryPortInformationProcess ENDP
30.140312
341
0.796234
7517265546981b818fc83d78e569d29d13d833f4
599
asm
Assembly
SCS3211/Excercises/Take Home/question3.asm
UdeshUK/UCSC-CS
b7e8776218e709d4e0cabdfd04a5994a91bb4cf2
[ "Beerware" ]
6
2018-06-13T16:11:41.000Z
2019-04-27T10:30:35.000Z
SCS3211/Excercises/Take Home/question3.asm
Useful-Ad-1249/UCSC-CS
b7e8776218e709d4e0cabdfd04a5994a91bb4cf2
[ "Beerware" ]
null
null
null
SCS3211/Excercises/Take Home/question3.asm
Useful-Ad-1249/UCSC-CS
b7e8776218e709d4e0cabdfd04a5994a91bb4cf2
[ "Beerware" ]
null
null
null
.text la $a0,hint li $v0,4 syscall li $v0,5 syscall addi $t0,$v0,0 # Check divisability by 400 li $t1,400 div $t0,$t1 mfhi $t2 beqz $t2,leap # Check divisability by 100 li $t1,100 div $t0,$t1 mfhi $t2 beqz $t2,not_leap # Check divisability by 100 li $t1,4 div $t0,$t1 mfhi $t2 beqz $t2,leap # Else j not_leap leap: la $a0,leap_year li $v0,4 syscall j end not_leap: la $a0,not_leap_year li $v0,4 syscall j end end: li $v0,10 syscall .data hint: .asciiz "Enter year:\n" leap_year: .asciiz "Leap year\n" not_leap_year: .asciiz "Not leap year\n"
11.519231
40
0.642738
fd93bad56fc9a171847c28ded2a69be3e7a2b2e9
4,014
asm
Assembly
L6/L6.asm
Bardin08/CA_Labs
ca7d4dfaf097a9500cf737d6e81297a5e608907b
[ "MIT" ]
null
null
null
L6/L6.asm
Bardin08/CA_Labs
ca7d4dfaf097a9500cf737d6e81297a5e608907b
[ "MIT" ]
null
null
null
L6/L6.asm
Bardin08/CA_Labs
ca7d4dfaf097a9500cf737d6e81297a5e608907b
[ "MIT" ]
null
null
null
TITLE ЛР_6 ;------------------------------------------------------------------------------ ; Дисципліна: Архітектура комп'ютера ; НТУУ "КПІ" ; Факультет: ФІОТ ; Курс: 1 ; Група: ІТ-01 ;------------------------------------------------------------------------------ ; Автор: Бардін, Задніпрянець, Куркін ; Дата: 07/04/2021 ;------------------------------------------------------------------------------ IDEAL ;------------------------------------------------------------------------------ MACRO M_Exit ; Exit macros ; Input: AL = Exit code ; Output: --- mov ah, 04Ch ; DOS interruption number to exit int 21h ENDM ;------------------------------------------------------------------------------ MACRO M_Init ; Initiate DS and ES mov ax, @data ; ax <- @data mov ds, ax ; ds <- ax mov es, ax ; es <- ax ENDM MODEL small STACK 256 DATASEG msg db "Bardin, Zadnipryanets, Kurkin $" bak_int0Bh_offset DW ? ; Effective procedure address - default handler for COM1 interrupt bak_int0Bh_seg DW ? ; Segment begin address for hardware conversion function COM1 CODESEG PROC main M_Init ;Stage 1. Receiving effective address and interrupt offset-------------------- mov di, 61h call get_int_vector ; Output arguments: (bx - effective address, es - segment address ) mov [bak_int0Bh_offset], bx mov [bak_int0Bh_seg], es ; Stage 2. Збереження стандартного обробника переривань СОМ 2 за іншим вектором mov di, 61h ; Input parameter for set_int_vector, new interruption number mov dx, bx ; Offset for procedure, effcetive address call set_int_vector ; Stage 3. Set new handler for custom interruption mov di, 61h mov dx, OFFSET int61h mov ax, SEG int61h mov es, ax call set_int_vector int 61h ; call interruption ; Stage 4. Enroll all changes mov di, 61h mov dx, [bak_int0Bh_offset] mov ax, [bak_int0Bh_seg] mov es, ax call set_int_vector xor al, al ; Set al to zero M_Exit ENDP main ;-------------------------------------------------------------------------- PROC get_int_vector ; Purpose: Get logical address for procedure by interruption vector number ; Input: DI <- Interruption vector number ; Вихід: BX <- procedure`s effective address ; ES <- procedure`s segment address ;-------------------------------------------------------------------------- ; Add registers to stack push ax push di xor ax, ax ; Clean AX mov es, ax ; Move to 0000h shl di, 2 ; Left logical shift, same as multiply to 4 mov bx, [es:[di]] ; Write handler`s effectiva address to BX mov ax, [es:[di + 2]] ; Write handler`s segment address to АХ mov es, ax ; Write handler`s segment address to ES ; Restore registers pop di pop ax ret ; Return from procedure ENDP get_int_vector ;-------------------------------------------------------------------------- PROC set_int_vector ; Purpose: Set new a handler to interruption number ; Input: DI - interruption number, where the procedure will be bind ; DX - new handler effective address ; ES - new handler segment address ; Output: --- ;-------------------------------------------------------------------------- Cli ; Disable hardware interrupts ; Adding registers to stack push ax push di push ds xor ax, ax ; Clean AX mov ds, ax ; Move to 0000h shl di, 2 ; left logical shift, same as multiply to 4 mov [ds:[di]], dx ; Write effective address to the first half of vector mov [ds:[di + 2]], es ; Write segment address to the second half of vector ; Restore registers pop ds pop di pop ax sti ; Enable hardware interrupts ret ENDP set_int_vector ;-------------------------------------------------------------------------- PROC int61h ; Purpose: New interruption (61h) ; Input: --- ; Output: --- ;-------------------------------------------------------------------------- mov ah, 09h ; print a message mov dx, offset msg int 21h mov al, 20h ; exit to operation system out 20h, al iret ; return from interruption ENDP int61h END main ; Кінець коду
28.468085
89
0.55431
59b4160b8e78f1cf8c5073c963037e0ee49244c7
632
asm
Assembly
test/asm/segclash.asm
nigelperks/BasicAssembler
13dcc861254fa6c19f1d450682b4495bbebcf934
[ "MIT" ]
null
null
null
test/asm/segclash.asm
nigelperks/BasicAssembler
13dcc861254fa6c19f1d450682b4495bbebcf934
[ "MIT" ]
null
null
null
test/asm/segclash.asm
nigelperks/BasicAssembler
13dcc861254fa6c19f1d450682b4495bbebcf934
[ "MIT" ]
null
null
null
; Test clashing segment properties IDEAL ; defaulting to private SEGMENT SEG1 ENDS SEGMENT SEG1 PUBLIC ENDS SEGMENT SEG1 STACK ENDS SEGMENT SEG1 PRIVATE ENDS SEGMENT SEG1 ENDS ; explicitly private SEGMENT SEG2 PRIVATE ENDS SEGMENT SEG2 PUBLIC ENDS SEGMENT SEG2 STACK ENDS SEGMENT SEG2 PRIVATE ENDS SEGMENT SEG2 ENDS ; public SEGMENT SEG3 PUBLIC ENDS SEGMENT SEG3 PRIVATE ENDS SEGMENT SEG3 STACK ENDS SEGMENT SEG3 PUBLIC ENDS SEGMENT SEG3 ENDS ; stack SEGMENT SEG4 STACK ENDS SEGMENT SEG4 PRIVATE ENDS SEGMENT SEG4 PUBLIC ENDS SEGMENT SEG4 STACK ENDS SEGMENT SEG4 ENDS END
10.711864
34
0.75
37ffb5b94999a6b14d7a865ed70b28db582cbcdf
643
asm
Assembly
oeis/020/A020794.asm
neoneye/loda-programs
84790877f8e6c2e821b183d2e334d612045d29c0
[ "Apache-2.0" ]
11
2021-08-22T19:44:55.000Z
2022-03-20T16:47:57.000Z
oeis/020/A020794.asm
neoneye/loda-programs
84790877f8e6c2e821b183d2e334d612045d29c0
[ "Apache-2.0" ]
9
2021-08-29T13:15:54.000Z
2022-03-09T19:52:31.000Z
oeis/020/A020794.asm
neoneye/loda-programs
84790877f8e6c2e821b183d2e334d612045d29c0
[ "Apache-2.0" ]
3
2021-08-22T20:56:47.000Z
2021-09-29T06:26:12.000Z
; A020794: Decimal expansion of 1/sqrt(37). ; Submitted by Jamie Morken(s4) ; 1,6,4,3,9,8,9,8,7,3,0,5,3,5,7,2,8,8,8,9,1,8,8,3,3,5,7,9,7,8,4,3,4,2,4,4,9,2,1,2,1,5,4,0,7,9,6,7,2,0,0,3,0,2,3,3,5,6,5,2,7,8,5,0,4,0,1,7,1,1,5,4,7,3,8,3,4,8,9,2,5,4,0,0,0,8,2,8,7,6,4,3,1,2,9,3,2,0,7,1 mov $1,1 mov $2,1 mov $3,$0 add $3,8 mov $4,$0 add $0,5 add $4,3 mul $4,2 mov $7,10 pow $7,$4 mov $9,10 lpb $3 mov $4,$2 pow $4,2 mul $4,37 mov $5,$1 pow $5,2 add $4,$5 mov $6,$1 mov $1,$4 mul $6,$2 mul $6,2 mov $2,$6 mov $8,$4 div $8,$7 max $8,2 div $1,$8 div $2,$8 sub $3,2 lpe mov $3,$9 pow $3,$0 div $2,$3 mov $0,$2 mod $0,10
16.075
201
0.51633
abbb9457f973b5e88210998c4bc9cff1441d681a
3,670
asm
Assembly
src/native/tinype-corkami/tiny.asm
AlexUg/gluegen
1390bc236de531646aaa4525a17de1a533b1fa06
[ "Apache-2.0" ]
1
2015-05-26T23:20:59.000Z
2015-05-26T23:20:59.000Z
src/native/tinype-corkami/tiny.asm
AlexUg/gluegen
1390bc236de531646aaa4525a17de1a533b1fa06
[ "Apache-2.0" ]
null
null
null
src/native/tinype-corkami/tiny.asm
AlexUg/gluegen
1390bc236de531646aaa4525a17de1a533b1fa06
[ "Apache-2.0" ]
null
null
null
; a 268-byte PE (as small as possible), XP-W8x64 compatible ; similar with the w7 x64 PE, but larger sizeofimage and IAT required. XP compat also requires Debug Size and TLS VA to be null ; a few extra tricks required for Windows 8 compatibility ;Ange Albertini, BSD Licence, 2010-2013 %include 'consts.inc' IMAGEBASE equ 400000h org IMAGEBASE DOS_HEADER: .e_magic dw 'MZ' align 4, db 0 istruc IMAGE_NT_HEADERS at IMAGE_NT_HEADERS.Signature, db 'PE',0,0 iend istruc IMAGE_FILE_HEADER at IMAGE_FILE_HEADER.Machine, dw IMAGE_FILE_MACHINE_I386 at IMAGE_FILE_HEADER.TimeDateStamp msvcrt db 'msvcrt.dll', 0 ; keeping the extension in case it'd work under W2K at IMAGE_FILE_HEADER.Characteristics, dw IMAGE_FILE_EXECUTABLE_IMAGE ; | IMAGE_FILE_32BIT_MACHINE iend istruc IMAGE_OPTIONAL_HEADER32 at IMAGE_OPTIONAL_HEADER32.Magic, dw IMAGE_NT_OPTIONAL_HDR32_MAGIC bits 32 realEntryPoint: push message call [__imp__printf] jmp _2 at IMAGE_OPTIONAL_HEADER32.AddressOfEntryPoint, dd EntryPoint - IMAGEBASE at IMAGE_OPTIONAL_HEADER32.BaseOfCode, dd 0 ; must be valid for W7 _2: add esp, 1 * 4 retn at IMAGE_OPTIONAL_HEADER32.ImageBase, dd IMAGEBASE at IMAGE_OPTIONAL_HEADER32.SectionAlignment, dd 4 ; also sets e_lfanew at IMAGE_OPTIONAL_HEADER32.FileAlignment, dd 4 ImportsAddressTable: msvcrt_iat: __imp__printf: dd hnprintf - IMAGEBASE dd 0 IMPORTSADDRESSTABLESIZE equ $ - ImportsAddressTable at IMAGE_OPTIONAL_HEADER32.MajorSubsystemVersion, dw 4 at IMAGE_OPTIONAL_HEADER32.SizeOfImage, dd SIZEOFIMAGE at IMAGE_OPTIONAL_HEADER32.SizeOfHeaders, dd SIZEOFIMAGE - 5 ; W8 enforce SizeOfHeaders <= EntryPoint at IMAGE_OPTIONAL_HEADER32.Subsystem, db IMAGE_SUBSYSTEM_WINDOWS_CUI db 0 ; one byte delta to avoid setting DllCharacteristics to AppContainer hnprintf: dw 0 db 'printf', 0 at IMAGE_OPTIONAL_HEADER32.NumberOfRvaAndSizes, dd 13 iend istruc IMAGE_DATA_DIRECTORY_13 at IMAGE_DATA_DIRECTORY_13.ImportsVA, dd Import_Descriptor - IMAGEBASE Import_Descriptor: istruc IMAGE_IMPORT_DESCRIPTOR at IMAGE_IMPORT_DESCRIPTOR.Name1 , dd msvcrt - IMAGEBASE at IMAGE_IMPORT_DESCRIPTOR.FirstThunk, dd msvcrt_iat - IMAGEBASE iend istruc IMAGE_IMPORT_DESCRIPTOR iend at IMAGE_DATA_DIRECTORY_13.DebugSize, dd 0 ; required for safety under XP at IMAGE_DATA_DIRECTORY_13.TLSVA, dd 0 ; required for safety under XP at IMAGE_DATA_DIRECTORY_13.IATVA, dd ImportsAddressTable - IMAGEBASE ; required under XP at IMAGE_DATA_DIRECTORY_13.IATSize, dd IMPORTSADDRESSTABLESIZE ; required under XP iend message db " * 268b universal tiny PE", 0ah, 0 times 268 - 260 db 0 EntryPoint: jmp realEntryPoint SIZEOFIMAGE equ 268 struc IMAGE_DATA_DIRECTORY_13 .ExportsVA resd 1 .ExportsSize resd 1 .ImportsVA resd 1 .ImportsSize resd 1 .ResourceVA resd 1 .ResourceSize resd 1 .Exception resd 2 .Security resd 2 .FixupsVA resd 1 .FixupsSize resd 1 .DebugVA resd 1 .DebugSize resd 1 .Description resd 2 .MIPS resd 2 .TLSVA resd 1 .TLSSize resd 1 .Load resd 2 .BoundImportsVA resd 1 .BoundImportsSize resd 1 .IATVA resd 1 .IATSize resd 1 endstruc
31.367521
128
0.677112
fd9b17023bb8f0ac257089acdf8544a1eb5eb98f
533
asm
Assembly
source/Cosmos.Core.DebugStub/SerialIO.asm
Geramy/Cosmos
38c699d42d5a9e53c8a902c866130b64c4f2eab3
[ "BSD-3-Clause" ]
207
2017-07-30T13:01:52.000Z
2022-03-25T14:33:53.000Z
source/Cosmos.Core.DebugStub/SerialIO.asm
Geramy/Cosmos
38c699d42d5a9e53c8a902c866130b64c4f2eab3
[ "BSD-3-Clause" ]
57
2017-08-13T13:58:13.000Z
2022-02-25T21:12:09.000Z
source/Cosmos.Core.DebugStub/SerialIO.asm
Geramy/Cosmos
38c699d42d5a9e53c8a902c866130b64c4f2eab3
[ "BSD-3-Clause" ]
62
2017-08-13T09:56:34.000Z
2022-03-29T15:53:16.000Z
; Generated at 6/14/2016 12:11:29 PM DebugStub_ComAddr dd 1016 %ifndef Exclude_IOPort_Based_Serial DebugStub_WriteRegister: push dword EDX add word DX, 0x3F8 out DX, AL pop dword EDX DebugStub_WriteRegister_Exit: mov dword [static_field__Cosmos_Core_INTs_mLastKnownAddress], DebugStub_WriteRegister_Exit Ret DebugStub_ReadRegister: push dword EDX add word DX, 0x3F8 in byte AL, DX pop dword EDX DebugStub_ReadRegister_Exit: mov dword [static_field__Cosmos_Core_INTs_mLastKnownAddress], DebugStub_ReadRegister_Exit Ret %endif
18.37931
90
0.846154
e7c4bbfa7b46e002e724e75f4fff82ba2c76b683
55,565
asm
Assembly
du.asm
younger15/xv6-public
1d32e292fac7f787f0bd05d3c37416398563ae6e
[ "MIT-0" ]
null
null
null
du.asm
younger15/xv6-public
1d32e292fac7f787f0bd05d3c37416398563ae6e
[ "MIT-0" ]
null
null
null
du.asm
younger15/xv6-public
1d32e292fac7f787f0bd05d3c37416398563ae6e
[ "MIT-0" ]
null
null
null
_du: file format elf32-i386 Disassembly of section .text: 00000000 <main>: #include "stat.h" #include "user.h" #include "fcntl.h" int main(int argc, char *argv[]) { 0: 8d 4c 24 04 lea 0x4(%esp),%ecx 4: 83 e4 f0 and $0xfffffff0,%esp 7: ff 71 fc pushl -0x4(%ecx) a: 55 push %ebp b: 89 e5 mov %esp,%ebp d: 57 push %edi e: 56 push %esi f: 53 push %ebx 10: 51 push %ecx 11: 81 ec 40 04 00 00 sub $0x440,%esp 17: 8b 41 04 mov 0x4(%ecx),%eax int fd = open("UserList", O_RDONLY); 1a: 6a 00 push $0x0 1c: 68 50 09 00 00 push $0x950 #include "stat.h" #include "user.h" #include "fcntl.h" int main(int argc, char *argv[]) { 21: 89 85 c4 fb ff ff mov %eax,-0x43c(%ebp) int fd = open("UserList", O_RDONLY); 27: e8 d6 04 00 00 call 502 <open> 2c: 89 c3 mov %eax,%ebx char c; char name[32]; int nameFound = 0; //char *names = nameList; char buf[1024]; int checkReadFile = read(fd, buf,sizeof buf); 2e: 8d 85 e8 fb ff ff lea -0x418(%ebp),%eax 34: 83 c4 0c add $0xc,%esp 37: 68 00 04 00 00 push $0x400 3c: 50 push %eax 3d: 53 push %ebx 3e: e8 97 04 00 00 call 4da <read> 43: 89 c6 mov %eax,%esi close(fd); 45: 89 1c 24 mov %ebx,(%esp) 48: e8 9d 04 00 00 call 4ea <close> if(checkReadFile < 0) 4d: 83 c4 10 add $0x10,%esp 50: 85 f6 test %esi,%esi 52: 0f 88 fd 01 00 00 js 255 <main+0x255> { printf(1,"Can't find user list\n"); } else { if (strcmp(argv[1],"Admin")==0) 58: 8b 85 c4 fb ff ff mov -0x43c(%ebp),%eax 5e: 83 ec 08 sub $0x8,%esp 61: 68 6f 09 00 00 push $0x96f 66: ff 70 04 pushl 0x4(%eax) 69: e8 42 02 00 00 call 2b0 <strcmp> 6e: 83 c4 10 add $0x10,%esp 71: 85 c0 test %eax,%eax 73: 0f 84 ef 01 00 00 je 268 <main+0x268> 79: 31 f6 xor %esi,%esi 7b: 31 d2 xor %edx,%edx } else { do { c = buf[i]; 7d: 0f b6 84 35 e8 fb ff movzbl -0x418(%ebp,%esi,1),%eax 84: ff i++; 85: 8d 7e 01 lea 0x1(%esi),%edi if (c == ':') 88: 3c 3a cmp $0x3a,%al 8a: 74 27 je b3 <main+0xb3> 8c: 8d 74 26 00 lea 0x0(%esi,%eiz,1),%esi j = 0; } else { name[j] = c; 90: 88 84 15 c8 fb ff ff mov %al,-0x438(%ebp,%edx,1) j++; 97: 83 c2 01 add $0x1,%edx } }while (c != '\0'); 9a: 84 c0 test %al,%al 9c: 0f 84 57 01 00 00 je 1f9 <main+0x1f9> a2: 89 fe mov %edi,%esi } else { do { c = buf[i]; a4: 0f b6 84 35 e8 fb ff movzbl -0x418(%ebp,%esi,1),%eax ab: ff i++; ac: 8d 7e 01 lea 0x1(%esi),%edi if (c == ':') af: 3c 3a cmp $0x3a,%al b1: 75 dd jne 90 <main+0x90> { char* p = argv[1]; b3: 8b 85 c4 fb ff ff mov -0x43c(%ebp),%eax char* q = name; while (j > 0 && *p && *p == *q) b9: 85 d2 test %edx,%edx { c = buf[i]; i++; if (c == ':') { char* p = argv[1]; bb: 8b 58 04 mov 0x4(%eax),%ebx char* q = name; while (j > 0 && *p && *p == *q) be: 74 54 je 114 <main+0x114> c0: 0f b6 03 movzbl (%ebx),%eax c3: 84 c0 test %al,%al c5: 0f 84 25 01 00 00 je 1f0 <main+0x1f0> cb: 3a 85 c8 fb ff ff cmp -0x438(%ebp),%al d1: 0f 85 19 01 00 00 jne 1f0 <main+0x1f0> d7: 8d 43 01 lea 0x1(%ebx),%eax da: 01 d3 add %edx,%ebx dc: 8d 95 c8 fb ff ff lea -0x438(%ebp),%edx e2: eb 1a jmp fe <main+0xfe> e4: 8d 74 26 00 lea 0x0(%esi,%eiz,1),%esi e8: 0f b6 08 movzbl (%eax),%ecx eb: 84 c9 test %cl,%cl ed: 0f 84 fd 00 00 00 je 1f0 <main+0x1f0> f3: 83 c0 01 add $0x1,%eax f6: 3a 0a cmp (%edx),%cl f8: 0f 85 f2 00 00 00 jne 1f0 <main+0x1f0> { p++; q++; fe: 83 c2 01 add $0x1,%edx i++; if (c == ':') { char* p = argv[1]; char* q = name; while (j > 0 && *p && *p == *q) 101: 39 d8 cmp %ebx,%eax 103: 75 e3 jne e8 <main+0xe8> 105: eb 0d jmp 114 <main+0x114> 107: 89 f6 mov %esi,%esi 109: 8d bc 27 00 00 00 00 lea 0x0(%edi,%eiz,1),%edi if (j == 0) { // name found nameFound = 1; i-=2; while (buf[i] != ':' && i > 0) // return to the last ':' 110: 85 f6 test %esi,%esi 112: 7e 0d jle 121 <main+0x121> } if (j == 0) { // name found nameFound = 1; i-=2; 114: 83 ee 01 sub $0x1,%esi while (buf[i] != ':' && i > 0) // return to the last ':' 117: 80 bc 35 e8 fb ff ff cmpb $0x3a,-0x418(%ebp,%esi,1) 11e: 3a 11f: 75 ef jne 110 <main+0x110> i--; i++; 121: 8d 56 01 lea 0x1(%esi),%edx 124: 8d 4e 02 lea 0x2(%esi),%ecx 127: 0f b6 84 15 e8 fb ff movzbl -0x418(%ebp,%edx,1),%eax 12e: ff while (buf[i] != ':') 12f: 3c 3a cmp $0x3a,%al 131: 74 30 je 163 <main+0x163> { int k = i; while (buf[k] != '\0') 133: 84 c0 test %al,%al 135: 0f 84 40 01 00 00 je 27b <main+0x27b> 13b: 8d 85 e8 fb ff ff lea -0x418(%ebp),%eax 141: 01 c8 add %ecx,%eax 143: 90 nop 144: 8d 74 26 00 lea 0x0(%esi,%eiz,1),%esi { buf[k] = buf[k+1]; 148: 0f b6 18 movzbl (%eax),%ebx 14b: 83 c0 01 add $0x1,%eax 14e: 88 58 fe mov %bl,-0x2(%eax) i--; i++; while (buf[i] != ':') { int k = i; while (buf[k] != '\0') 151: 80 78 ff 00 cmpb $0x0,-0x1(%eax) 155: 75 f1 jne 148 <main+0x148> 157: 0f b6 84 15 e8 fb ff movzbl -0x418(%ebp,%edx,1),%eax 15e: ff nameFound = 1; i-=2; while (buf[i] != ':' && i > 0) // return to the last ':' i--; i++; while (buf[i] != ':') 15f: 3c 3a cmp $0x3a,%al 161: 75 d0 jne 133 <main+0x133> 163: 8d 85 e8 fb ff ff lea -0x418(%ebp),%eax 169: 01 c1 add %eax,%ecx 16b: 89 cb mov %ecx,%ebx 16d: 8d 76 00 lea 0x0(%esi),%esi } int k = i; // delete ':' while (buf[k] != '\0') { buf[k] = buf[k+1]; 170: 0f b6 03 movzbl (%ebx),%eax 173: 83 c3 01 add $0x1,%ebx 176: 88 43 fe mov %al,-0x2(%ebx) } } int k = i; // delete ':' while (buf[k] != '\0') 179: 80 7b ff 00 cmpb $0x0,-0x1(%ebx) 17d: 75 f1 jne 170 <main+0x170> 17f: 0f b6 84 15 e8 fb ff movzbl -0x418(%ebp,%edx,1),%eax 186: ff { buf[k] = buf[k+1]; k++; } while (buf[i] != ':') 187: 3c 3a cmp $0x3a,%al 189: 74 28 je 1b3 <main+0x1b3> { int k = i; while (buf[k] != '\0') 18b: 84 c0 test %al,%al 18d: 0f 84 ea 00 00 00 je 27d <main+0x27d> 193: 89 c8 mov %ecx,%eax 195: 8d 76 00 lea 0x0(%esi),%esi { buf[k] = buf[k+1]; 198: 0f b6 18 movzbl (%eax),%ebx 19b: 83 c0 01 add $0x1,%eax 19e: 88 58 fe mov %bl,-0x2(%eax) k++; } while (buf[i] != ':') { int k = i; while (buf[k] != '\0') 1a1: 80 78 ff 00 cmpb $0x0,-0x1(%eax) 1a5: 75 f1 jne 198 <main+0x198> 1a7: 0f b6 84 15 e8 fb ff movzbl -0x418(%ebp,%edx,1),%eax 1ae: ff while (buf[k] != '\0') { buf[k] = buf[k+1]; k++; } while (buf[i] != ':') 1af: 3c 3a cmp $0x3a,%al 1b1: 75 d8 jne 18b <main+0x18b> } i--; // delete ':' k = i; while (buf[k] != '\0') 1b3: 80 bc 35 e8 fb ff ff cmpb $0x0,-0x418(%ebp,%esi,1) 1ba: 00 1bb: 74 1a je 1d7 <main+0x1d7> 1bd: 8d 85 e8 fb ff ff lea -0x418(%ebp),%eax 1c3: 01 c2 add %eax,%edx 1c5: 8d 76 00 lea 0x0(%esi),%esi { buf[k] = buf[k+1]; 1c8: 0f b6 02 movzbl (%edx),%eax 1cb: 83 c2 01 add $0x1,%edx 1ce: 88 42 fe mov %al,-0x2(%edx) } i--; // delete ':' k = i; while (buf[k] != '\0') 1d1: 80 7a ff 00 cmpb $0x0,-0x1(%edx) 1d5: 75 f1 jne 1c8 <main+0x1c8> j++; } }while (c != '\0'); if (nameFound == 1) printf(1,"User deleted\n"); 1d7: 52 push %edx 1d8: 52 push %edx 1d9: 68 8a 09 00 00 push $0x98a 1de: 6a 01 push $0x1 1e0: e8 4b 04 00 00 call 630 <printf> 1e5: 83 c4 10 add $0x10,%esp 1e8: eb 20 jmp 20a <main+0x20a> 1ea: 8d b6 00 00 00 00 lea 0x0(%esi),%esi 1f0: 31 d2 xor %edx,%edx 1f2: 89 fe mov %edi,%esi 1f4: e9 ab fe ff ff jmp a4 <main+0xa4> else printf(1,"User name not found\n"); 1f9: 50 push %eax 1fa: 50 push %eax 1fb: 68 98 09 00 00 push $0x998 200: 6a 01 push $0x1 202: e8 29 04 00 00 call 630 <printf> 207: 83 c4 10 add $0x10,%esp } } fd = open("UserList", O_RDWR); 20a: 83 ec 08 sub $0x8,%esp 20d: 6a 02 push $0x2 20f: 68 50 09 00 00 push $0x950 214: e8 e9 02 00 00 call 502 <open> if(fd >= 0) 219: 83 c4 10 add $0x10,%esp 21c: 85 c0 test %eax,%eax else printf(1,"User name not found\n"); } } fd = open("UserList", O_RDWR); 21e: 89 c3 mov %eax,%ebx if(fd >= 0) 220: 78 2e js 250 <main+0x250> { write(fd,buf,strlen(buf)+1); 222: 8d 85 e8 fb ff ff lea -0x418(%ebp),%eax 228: 83 ec 0c sub $0xc,%esp 22b: 50 push %eax 22c: e8 cf 00 00 00 call 300 <strlen> 231: 83 c4 0c add $0xc,%esp 234: 83 c0 01 add $0x1,%eax 237: 50 push %eax 238: 8d 85 e8 fb ff ff lea -0x418(%ebp),%eax 23e: 50 push %eax 23f: 53 push %ebx 240: e8 9d 02 00 00 call 4e2 <write> close(fd); 245: 89 1c 24 mov %ebx,(%esp) 248: e8 9d 02 00 00 call 4ea <close> 24d: 83 c4 10 add $0x10,%esp } exit(); 250: e8 6d 02 00 00 call 4c2 <exit> char buf[1024]; int checkReadFile = read(fd, buf,sizeof buf); close(fd); if(checkReadFile < 0) { printf(1,"Can't find user list\n"); 255: 53 push %ebx 256: 53 push %ebx 257: 68 59 09 00 00 push $0x959 25c: 6a 01 push $0x1 25e: e8 cd 03 00 00 call 630 <printf> 263: 83 c4 10 add $0x10,%esp 266: eb a2 jmp 20a <main+0x20a> } else { if (strcmp(argv[1],"Admin")==0) { printf(1,"Cannot delete Admin\n"); 268: 51 push %ecx 269: 51 push %ecx 26a: 68 75 09 00 00 push $0x975 26f: 6a 01 push $0x1 271: e8 ba 03 00 00 call 630 <printf> 276: 83 c4 10 add $0x10,%esp 279: eb 8f jmp 20a <main+0x20a> 27b: eb fe jmp 27b <main+0x27b> 27d: eb fe jmp 27d <main+0x27d> 27f: 90 nop 00000280 <strcpy>: #include "user.h" #include "x86.h" char* strcpy(char *s, const char *t) { 280: 55 push %ebp 281: 89 e5 mov %esp,%ebp 283: 53 push %ebx 284: 8b 45 08 mov 0x8(%ebp),%eax 287: 8b 4d 0c mov 0xc(%ebp),%ecx char *os; os = s; while((*s++ = *t++) != 0) 28a: 89 c2 mov %eax,%edx 28c: 8d 74 26 00 lea 0x0(%esi,%eiz,1),%esi 290: 83 c1 01 add $0x1,%ecx 293: 0f b6 59 ff movzbl -0x1(%ecx),%ebx 297: 83 c2 01 add $0x1,%edx 29a: 84 db test %bl,%bl 29c: 88 5a ff mov %bl,-0x1(%edx) 29f: 75 ef jne 290 <strcpy+0x10> ; return os; } 2a1: 5b pop %ebx 2a2: 5d pop %ebp 2a3: c3 ret 2a4: 8d b6 00 00 00 00 lea 0x0(%esi),%esi 2aa: 8d bf 00 00 00 00 lea 0x0(%edi),%edi 000002b0 <strcmp>: int strcmp(const char *p, const char *q) { 2b0: 55 push %ebp 2b1: 89 e5 mov %esp,%ebp 2b3: 56 push %esi 2b4: 53 push %ebx 2b5: 8b 55 08 mov 0x8(%ebp),%edx 2b8: 8b 4d 0c mov 0xc(%ebp),%ecx while(*p && *p == *q) 2bb: 0f b6 02 movzbl (%edx),%eax 2be: 0f b6 19 movzbl (%ecx),%ebx 2c1: 84 c0 test %al,%al 2c3: 75 1e jne 2e3 <strcmp+0x33> 2c5: eb 29 jmp 2f0 <strcmp+0x40> 2c7: 89 f6 mov %esi,%esi 2c9: 8d bc 27 00 00 00 00 lea 0x0(%edi,%eiz,1),%edi p++, q++; 2d0: 83 c2 01 add $0x1,%edx } int strcmp(const char *p, const char *q) { while(*p && *p == *q) 2d3: 0f b6 02 movzbl (%edx),%eax p++, q++; 2d6: 8d 71 01 lea 0x1(%ecx),%esi } int strcmp(const char *p, const char *q) { while(*p && *p == *q) 2d9: 0f b6 59 01 movzbl 0x1(%ecx),%ebx 2dd: 84 c0 test %al,%al 2df: 74 0f je 2f0 <strcmp+0x40> 2e1: 89 f1 mov %esi,%ecx 2e3: 38 d8 cmp %bl,%al 2e5: 74 e9 je 2d0 <strcmp+0x20> p++, q++; return (uchar)*p - (uchar)*q; 2e7: 29 d8 sub %ebx,%eax } 2e9: 5b pop %ebx 2ea: 5e pop %esi 2eb: 5d pop %ebp 2ec: c3 ret 2ed: 8d 76 00 lea 0x0(%esi),%esi } int strcmp(const char *p, const char *q) { while(*p && *p == *q) 2f0: 31 c0 xor %eax,%eax p++, q++; return (uchar)*p - (uchar)*q; 2f2: 29 d8 sub %ebx,%eax } 2f4: 5b pop %ebx 2f5: 5e pop %esi 2f6: 5d pop %ebp 2f7: c3 ret 2f8: 90 nop 2f9: 8d b4 26 00 00 00 00 lea 0x0(%esi,%eiz,1),%esi 00000300 <strlen>: uint strlen(const char *s) { 300: 55 push %ebp 301: 89 e5 mov %esp,%ebp 303: 8b 4d 08 mov 0x8(%ebp),%ecx int n; for(n = 0; s[n]; n++) 306: 80 39 00 cmpb $0x0,(%ecx) 309: 74 12 je 31d <strlen+0x1d> 30b: 31 d2 xor %edx,%edx 30d: 8d 76 00 lea 0x0(%esi),%esi 310: 83 c2 01 add $0x1,%edx 313: 80 3c 11 00 cmpb $0x0,(%ecx,%edx,1) 317: 89 d0 mov %edx,%eax 319: 75 f5 jne 310 <strlen+0x10> ; return n; } 31b: 5d pop %ebp 31c: c3 ret uint strlen(const char *s) { int n; for(n = 0; s[n]; n++) 31d: 31 c0 xor %eax,%eax ; return n; } 31f: 5d pop %ebp 320: c3 ret 321: eb 0d jmp 330 <memset> 323: 90 nop 324: 90 nop 325: 90 nop 326: 90 nop 327: 90 nop 328: 90 nop 329: 90 nop 32a: 90 nop 32b: 90 nop 32c: 90 nop 32d: 90 nop 32e: 90 nop 32f: 90 nop 00000330 <memset>: void* memset(void *dst, int c, uint n) { 330: 55 push %ebp 331: 89 e5 mov %esp,%ebp 333: 57 push %edi 334: 8b 55 08 mov 0x8(%ebp),%edx } static inline void stosb(void *addr, int data, int cnt) { asm volatile("cld; rep stosb" : 337: 8b 4d 10 mov 0x10(%ebp),%ecx 33a: 8b 45 0c mov 0xc(%ebp),%eax 33d: 89 d7 mov %edx,%edi 33f: fc cld 340: f3 aa rep stos %al,%es:(%edi) stosb(dst, c, n); return dst; } 342: 89 d0 mov %edx,%eax 344: 5f pop %edi 345: 5d pop %ebp 346: c3 ret 347: 89 f6 mov %esi,%esi 349: 8d bc 27 00 00 00 00 lea 0x0(%edi,%eiz,1),%edi 00000350 <strchr>: char* strchr(const char *s, char c) { 350: 55 push %ebp 351: 89 e5 mov %esp,%ebp 353: 53 push %ebx 354: 8b 45 08 mov 0x8(%ebp),%eax 357: 8b 5d 0c mov 0xc(%ebp),%ebx for(; *s; s++) 35a: 0f b6 10 movzbl (%eax),%edx 35d: 84 d2 test %dl,%dl 35f: 74 1d je 37e <strchr+0x2e> if(*s == c) 361: 38 d3 cmp %dl,%bl 363: 89 d9 mov %ebx,%ecx 365: 75 0d jne 374 <strchr+0x24> 367: eb 17 jmp 380 <strchr+0x30> 369: 8d b4 26 00 00 00 00 lea 0x0(%esi,%eiz,1),%esi 370: 38 ca cmp %cl,%dl 372: 74 0c je 380 <strchr+0x30> } char* strchr(const char *s, char c) { for(; *s; s++) 374: 83 c0 01 add $0x1,%eax 377: 0f b6 10 movzbl (%eax),%edx 37a: 84 d2 test %dl,%dl 37c: 75 f2 jne 370 <strchr+0x20> if(*s == c) return (char*)s; return 0; 37e: 31 c0 xor %eax,%eax } 380: 5b pop %ebx 381: 5d pop %ebp 382: c3 ret 383: 8d b6 00 00 00 00 lea 0x0(%esi),%esi 389: 8d bc 27 00 00 00 00 lea 0x0(%edi,%eiz,1),%edi 00000390 <gets>: char* gets(char *buf, int max) { 390: 55 push %ebp 391: 89 e5 mov %esp,%ebp 393: 57 push %edi 394: 56 push %esi 395: 53 push %ebx int i, cc; char c; for(i=0; i+1 < max; ){ 396: 31 f6 xor %esi,%esi cc = read(0, &c, 1); 398: 8d 7d e7 lea -0x19(%ebp),%edi return 0; } char* gets(char *buf, int max) { 39b: 83 ec 1c sub $0x1c,%esp int i, cc; char c; for(i=0; i+1 < max; ){ 39e: eb 29 jmp 3c9 <gets+0x39> cc = read(0, &c, 1); 3a0: 83 ec 04 sub $0x4,%esp 3a3: 6a 01 push $0x1 3a5: 57 push %edi 3a6: 6a 00 push $0x0 3a8: e8 2d 01 00 00 call 4da <read> if(cc < 1) 3ad: 83 c4 10 add $0x10,%esp 3b0: 85 c0 test %eax,%eax 3b2: 7e 1d jle 3d1 <gets+0x41> break; buf[i++] = c; 3b4: 0f b6 45 e7 movzbl -0x19(%ebp),%eax 3b8: 8b 55 08 mov 0x8(%ebp),%edx 3bb: 89 de mov %ebx,%esi if(c == '\n' || c == '\r') 3bd: 3c 0a cmp $0xa,%al for(i=0; i+1 < max; ){ cc = read(0, &c, 1); if(cc < 1) break; buf[i++] = c; 3bf: 88 44 1a ff mov %al,-0x1(%edx,%ebx,1) if(c == '\n' || c == '\r') 3c3: 74 1b je 3e0 <gets+0x50> 3c5: 3c 0d cmp $0xd,%al 3c7: 74 17 je 3e0 <gets+0x50> gets(char *buf, int max) { int i, cc; char c; for(i=0; i+1 < max; ){ 3c9: 8d 5e 01 lea 0x1(%esi),%ebx 3cc: 3b 5d 0c cmp 0xc(%ebp),%ebx 3cf: 7c cf jl 3a0 <gets+0x10> break; buf[i++] = c; if(c == '\n' || c == '\r') break; } buf[i] = '\0'; 3d1: 8b 45 08 mov 0x8(%ebp),%eax 3d4: c6 04 30 00 movb $0x0,(%eax,%esi,1) return buf; } 3d8: 8d 65 f4 lea -0xc(%ebp),%esp 3db: 5b pop %ebx 3dc: 5e pop %esi 3dd: 5f pop %edi 3de: 5d pop %ebp 3df: c3 ret break; buf[i++] = c; if(c == '\n' || c == '\r') break; } buf[i] = '\0'; 3e0: 8b 45 08 mov 0x8(%ebp),%eax gets(char *buf, int max) { int i, cc; char c; for(i=0; i+1 < max; ){ 3e3: 89 de mov %ebx,%esi break; buf[i++] = c; if(c == '\n' || c == '\r') break; } buf[i] = '\0'; 3e5: c6 04 30 00 movb $0x0,(%eax,%esi,1) return buf; } 3e9: 8d 65 f4 lea -0xc(%ebp),%esp 3ec: 5b pop %ebx 3ed: 5e pop %esi 3ee: 5f pop %edi 3ef: 5d pop %ebp 3f0: c3 ret 3f1: eb 0d jmp 400 <stat> 3f3: 90 nop 3f4: 90 nop 3f5: 90 nop 3f6: 90 nop 3f7: 90 nop 3f8: 90 nop 3f9: 90 nop 3fa: 90 nop 3fb: 90 nop 3fc: 90 nop 3fd: 90 nop 3fe: 90 nop 3ff: 90 nop 00000400 <stat>: int stat(const char *n, struct stat *st) { 400: 55 push %ebp 401: 89 e5 mov %esp,%ebp 403: 56 push %esi 404: 53 push %ebx int fd; int r; fd = open(n, O_RDONLY); 405: 83 ec 08 sub $0x8,%esp 408: 6a 00 push $0x0 40a: ff 75 08 pushl 0x8(%ebp) 40d: e8 f0 00 00 00 call 502 <open> if(fd < 0) 412: 83 c4 10 add $0x10,%esp 415: 85 c0 test %eax,%eax 417: 78 27 js 440 <stat+0x40> return -1; r = fstat(fd, st); 419: 83 ec 08 sub $0x8,%esp 41c: ff 75 0c pushl 0xc(%ebp) 41f: 89 c3 mov %eax,%ebx 421: 50 push %eax 422: e8 f3 00 00 00 call 51a <fstat> 427: 89 c6 mov %eax,%esi close(fd); 429: 89 1c 24 mov %ebx,(%esp) 42c: e8 b9 00 00 00 call 4ea <close> return r; 431: 83 c4 10 add $0x10,%esp 434: 89 f0 mov %esi,%eax } 436: 8d 65 f8 lea -0x8(%ebp),%esp 439: 5b pop %ebx 43a: 5e pop %esi 43b: 5d pop %ebp 43c: c3 ret 43d: 8d 76 00 lea 0x0(%esi),%esi int fd; int r; fd = open(n, O_RDONLY); if(fd < 0) return -1; 440: b8 ff ff ff ff mov $0xffffffff,%eax 445: eb ef jmp 436 <stat+0x36> 447: 89 f6 mov %esi,%esi 449: 8d bc 27 00 00 00 00 lea 0x0(%edi,%eiz,1),%edi 00000450 <atoi>: return r; } int atoi(const char *s) { 450: 55 push %ebp 451: 89 e5 mov %esp,%ebp 453: 53 push %ebx 454: 8b 4d 08 mov 0x8(%ebp),%ecx int n; n = 0; while('0' <= *s && *s <= '9') 457: 0f be 11 movsbl (%ecx),%edx 45a: 8d 42 d0 lea -0x30(%edx),%eax 45d: 3c 09 cmp $0x9,%al 45f: b8 00 00 00 00 mov $0x0,%eax 464: 77 1f ja 485 <atoi+0x35> 466: 8d 76 00 lea 0x0(%esi),%esi 469: 8d bc 27 00 00 00 00 lea 0x0(%edi,%eiz,1),%edi n = n*10 + *s++ - '0'; 470: 8d 04 80 lea (%eax,%eax,4),%eax 473: 83 c1 01 add $0x1,%ecx 476: 8d 44 42 d0 lea -0x30(%edx,%eax,2),%eax atoi(const char *s) { int n; n = 0; while('0' <= *s && *s <= '9') 47a: 0f be 11 movsbl (%ecx),%edx 47d: 8d 5a d0 lea -0x30(%edx),%ebx 480: 80 fb 09 cmp $0x9,%bl 483: 76 eb jbe 470 <atoi+0x20> n = n*10 + *s++ - '0'; return n; } 485: 5b pop %ebx 486: 5d pop %ebp 487: c3 ret 488: 90 nop 489: 8d b4 26 00 00 00 00 lea 0x0(%esi,%eiz,1),%esi 00000490 <memmove>: void* memmove(void *vdst, const void *vsrc, int n) { 490: 55 push %ebp 491: 89 e5 mov %esp,%ebp 493: 56 push %esi 494: 53 push %ebx 495: 8b 5d 10 mov 0x10(%ebp),%ebx 498: 8b 45 08 mov 0x8(%ebp),%eax 49b: 8b 75 0c mov 0xc(%ebp),%esi char *dst; const char *src; dst = vdst; src = vsrc; while(n-- > 0) 49e: 85 db test %ebx,%ebx 4a0: 7e 14 jle 4b6 <memmove+0x26> 4a2: 31 d2 xor %edx,%edx 4a4: 8d 74 26 00 lea 0x0(%esi,%eiz,1),%esi *dst++ = *src++; 4a8: 0f b6 0c 16 movzbl (%esi,%edx,1),%ecx 4ac: 88 0c 10 mov %cl,(%eax,%edx,1) 4af: 83 c2 01 add $0x1,%edx char *dst; const char *src; dst = vdst; src = vsrc; while(n-- > 0) 4b2: 39 da cmp %ebx,%edx 4b4: 75 f2 jne 4a8 <memmove+0x18> *dst++ = *src++; return vdst; } 4b6: 5b pop %ebx 4b7: 5e pop %esi 4b8: 5d pop %ebp 4b9: c3 ret 000004ba <fork>: name: \ movl $SYS_ ## name, %eax; \ int $T_SYSCALL; \ ret SYSCALL(fork) 4ba: b8 01 00 00 00 mov $0x1,%eax 4bf: cd 40 int $0x40 4c1: c3 ret 000004c2 <exit>: SYSCALL(exit) 4c2: b8 02 00 00 00 mov $0x2,%eax 4c7: cd 40 int $0x40 4c9: c3 ret 000004ca <wait>: SYSCALL(wait) 4ca: b8 03 00 00 00 mov $0x3,%eax 4cf: cd 40 int $0x40 4d1: c3 ret 000004d2 <pipe>: SYSCALL(pipe) 4d2: b8 04 00 00 00 mov $0x4,%eax 4d7: cd 40 int $0x40 4d9: c3 ret 000004da <read>: SYSCALL(read) 4da: b8 05 00 00 00 mov $0x5,%eax 4df: cd 40 int $0x40 4e1: c3 ret 000004e2 <write>: SYSCALL(write) 4e2: b8 10 00 00 00 mov $0x10,%eax 4e7: cd 40 int $0x40 4e9: c3 ret 000004ea <close>: SYSCALL(close) 4ea: b8 15 00 00 00 mov $0x15,%eax 4ef: cd 40 int $0x40 4f1: c3 ret 000004f2 <kill>: SYSCALL(kill) 4f2: b8 06 00 00 00 mov $0x6,%eax 4f7: cd 40 int $0x40 4f9: c3 ret 000004fa <exec>: SYSCALL(exec) 4fa: b8 07 00 00 00 mov $0x7,%eax 4ff: cd 40 int $0x40 501: c3 ret 00000502 <open>: SYSCALL(open) 502: b8 0f 00 00 00 mov $0xf,%eax 507: cd 40 int $0x40 509: c3 ret 0000050a <mknod>: SYSCALL(mknod) 50a: b8 11 00 00 00 mov $0x11,%eax 50f: cd 40 int $0x40 511: c3 ret 00000512 <unlink>: SYSCALL(unlink) 512: b8 12 00 00 00 mov $0x12,%eax 517: cd 40 int $0x40 519: c3 ret 0000051a <fstat>: SYSCALL(fstat) 51a: b8 08 00 00 00 mov $0x8,%eax 51f: cd 40 int $0x40 521: c3 ret 00000522 <link>: SYSCALL(link) 522: b8 13 00 00 00 mov $0x13,%eax 527: cd 40 int $0x40 529: c3 ret 0000052a <mkdir>: SYSCALL(mkdir) 52a: b8 14 00 00 00 mov $0x14,%eax 52f: cd 40 int $0x40 531: c3 ret 00000532 <chdir>: SYSCALL(chdir) 532: b8 09 00 00 00 mov $0x9,%eax 537: cd 40 int $0x40 539: c3 ret 0000053a <dup>: SYSCALL(dup) 53a: b8 0a 00 00 00 mov $0xa,%eax 53f: cd 40 int $0x40 541: c3 ret 00000542 <getpid>: SYSCALL(getpid) 542: b8 0b 00 00 00 mov $0xb,%eax 547: cd 40 int $0x40 549: c3 ret 0000054a <sbrk>: SYSCALL(sbrk) 54a: b8 0c 00 00 00 mov $0xc,%eax 54f: cd 40 int $0x40 551: c3 ret 00000552 <sleep>: SYSCALL(sleep) 552: b8 0d 00 00 00 mov $0xd,%eax 557: cd 40 int $0x40 559: c3 ret 0000055a <uptime>: SYSCALL(uptime) 55a: b8 0e 00 00 00 mov $0xe,%eax 55f: cd 40 int $0x40 561: c3 ret 00000562 <cps>: SYSCALL(cps) 562: b8 16 00 00 00 mov $0x16,%eax 567: cd 40 int $0x40 569: c3 ret 0000056a <userTag>: SYSCALL(userTag) 56a: b8 17 00 00 00 mov $0x17,%eax 56f: cd 40 int $0x40 571: c3 ret 00000572 <changeUser>: SYSCALL(changeUser) 572: b8 18 00 00 00 mov $0x18,%eax 577: cd 40 int $0x40 579: c3 ret 0000057a <getUser>: SYSCALL(getUser) 57a: b8 19 00 00 00 mov $0x19,%eax 57f: cd 40 int $0x40 581: c3 ret 00000582 <changeOwner>: SYSCALL(changeOwner) 582: b8 1a 00 00 00 mov $0x1a,%eax 587: cd 40 int $0x40 589: c3 ret 58a: 66 90 xchg %ax,%ax 58c: 66 90 xchg %ax,%ax 58e: 66 90 xchg %ax,%ax 00000590 <printint>: write(fd, &c, 1); } static void printint(int fd, int xx, int base, int sgn) { 590: 55 push %ebp 591: 89 e5 mov %esp,%ebp 593: 57 push %edi 594: 56 push %esi 595: 53 push %ebx 596: 89 c6 mov %eax,%esi 598: 83 ec 3c sub $0x3c,%esp char buf[16]; int i, neg; uint x; neg = 0; if(sgn && xx < 0){ 59b: 8b 5d 08 mov 0x8(%ebp),%ebx 59e: 85 db test %ebx,%ebx 5a0: 74 7e je 620 <printint+0x90> 5a2: 89 d0 mov %edx,%eax 5a4: c1 e8 1f shr $0x1f,%eax 5a7: 84 c0 test %al,%al 5a9: 74 75 je 620 <printint+0x90> neg = 1; x = -xx; 5ab: 89 d0 mov %edx,%eax int i, neg; uint x; neg = 0; if(sgn && xx < 0){ neg = 1; 5ad: c7 45 c4 01 00 00 00 movl $0x1,-0x3c(%ebp) x = -xx; 5b4: f7 d8 neg %eax 5b6: 89 75 c0 mov %esi,-0x40(%ebp) } else { x = xx; } i = 0; 5b9: 31 ff xor %edi,%edi 5bb: 8d 5d d7 lea -0x29(%ebp),%ebx 5be: 89 ce mov %ecx,%esi 5c0: eb 08 jmp 5ca <printint+0x3a> 5c2: 8d b6 00 00 00 00 lea 0x0(%esi),%esi do{ buf[i++] = digits[x % base]; 5c8: 89 cf mov %ecx,%edi 5ca: 31 d2 xor %edx,%edx 5cc: 8d 4f 01 lea 0x1(%edi),%ecx 5cf: f7 f6 div %esi 5d1: 0f b6 92 b4 09 00 00 movzbl 0x9b4(%edx),%edx }while((x /= base) != 0); 5d8: 85 c0 test %eax,%eax x = xx; } i = 0; do{ buf[i++] = digits[x % base]; 5da: 88 14 0b mov %dl,(%ebx,%ecx,1) }while((x /= base) != 0); 5dd: 75 e9 jne 5c8 <printint+0x38> if(neg) 5df: 8b 45 c4 mov -0x3c(%ebp),%eax 5e2: 8b 75 c0 mov -0x40(%ebp),%esi 5e5: 85 c0 test %eax,%eax 5e7: 74 08 je 5f1 <printint+0x61> buf[i++] = '-'; 5e9: c6 44 0d d8 2d movb $0x2d,-0x28(%ebp,%ecx,1) 5ee: 8d 4f 02 lea 0x2(%edi),%ecx 5f1: 8d 7c 0d d7 lea -0x29(%ebp,%ecx,1),%edi 5f5: 8d 76 00 lea 0x0(%esi),%esi 5f8: 0f b6 07 movzbl (%edi),%eax #include "user.h" static void putc(int fd, char c) { write(fd, &c, 1); 5fb: 83 ec 04 sub $0x4,%esp 5fe: 83 ef 01 sub $0x1,%edi 601: 6a 01 push $0x1 603: 53 push %ebx 604: 56 push %esi 605: 88 45 d7 mov %al,-0x29(%ebp) 608: e8 d5 fe ff ff call 4e2 <write> buf[i++] = digits[x % base]; }while((x /= base) != 0); if(neg) buf[i++] = '-'; while(--i >= 0) 60d: 83 c4 10 add $0x10,%esp 610: 39 df cmp %ebx,%edi 612: 75 e4 jne 5f8 <printint+0x68> putc(fd, buf[i]); } 614: 8d 65 f4 lea -0xc(%ebp),%esp 617: 5b pop %ebx 618: 5e pop %esi 619: 5f pop %edi 61a: 5d pop %ebp 61b: c3 ret 61c: 8d 74 26 00 lea 0x0(%esi,%eiz,1),%esi neg = 0; if(sgn && xx < 0){ neg = 1; x = -xx; } else { x = xx; 620: 89 d0 mov %edx,%eax static char digits[] = "0123456789ABCDEF"; char buf[16]; int i, neg; uint x; neg = 0; 622: c7 45 c4 00 00 00 00 movl $0x0,-0x3c(%ebp) 629: eb 8b jmp 5b6 <printint+0x26> 62b: 90 nop 62c: 8d 74 26 00 lea 0x0(%esi,%eiz,1),%esi 00000630 <printf>: } // Print to the given fd. Only understands %d, %x, %p, %s. void printf(int fd, const char *fmt, ...) { 630: 55 push %ebp 631: 89 e5 mov %esp,%ebp 633: 57 push %edi 634: 56 push %esi 635: 53 push %ebx int c, i, state; uint *ap; state = 0; ap = (uint*)(void*)&fmt + 1; for(i = 0; fmt[i]; i++){ 636: 8d 45 10 lea 0x10(%ebp),%eax } // Print to the given fd. Only understands %d, %x, %p, %s. void printf(int fd, const char *fmt, ...) { 639: 83 ec 2c sub $0x2c,%esp int c, i, state; uint *ap; state = 0; ap = (uint*)(void*)&fmt + 1; for(i = 0; fmt[i]; i++){ 63c: 8b 75 0c mov 0xc(%ebp),%esi } // Print to the given fd. Only understands %d, %x, %p, %s. void printf(int fd, const char *fmt, ...) { 63f: 8b 7d 08 mov 0x8(%ebp),%edi int c, i, state; uint *ap; state = 0; ap = (uint*)(void*)&fmt + 1; for(i = 0; fmt[i]; i++){ 642: 89 45 d0 mov %eax,-0x30(%ebp) 645: 0f b6 1e movzbl (%esi),%ebx 648: 83 c6 01 add $0x1,%esi 64b: 84 db test %bl,%bl 64d: 0f 84 b0 00 00 00 je 703 <printf+0xd3> 653: 31 d2 xor %edx,%edx 655: eb 39 jmp 690 <printf+0x60> 657: 89 f6 mov %esi,%esi 659: 8d bc 27 00 00 00 00 lea 0x0(%edi,%eiz,1),%edi c = fmt[i] & 0xff; if(state == 0){ if(c == '%'){ 660: 83 f8 25 cmp $0x25,%eax 663: 89 55 d4 mov %edx,-0x2c(%ebp) state = '%'; 666: ba 25 00 00 00 mov $0x25,%edx state = 0; ap = (uint*)(void*)&fmt + 1; for(i = 0; fmt[i]; i++){ c = fmt[i] & 0xff; if(state == 0){ if(c == '%'){ 66b: 74 18 je 685 <printf+0x55> #include "user.h" static void putc(int fd, char c) { write(fd, &c, 1); 66d: 8d 45 e2 lea -0x1e(%ebp),%eax 670: 83 ec 04 sub $0x4,%esp 673: 88 5d e2 mov %bl,-0x1e(%ebp) 676: 6a 01 push $0x1 678: 50 push %eax 679: 57 push %edi 67a: e8 63 fe ff ff call 4e2 <write> 67f: 8b 55 d4 mov -0x2c(%ebp),%edx 682: 83 c4 10 add $0x10,%esp 685: 83 c6 01 add $0x1,%esi int c, i, state; uint *ap; state = 0; ap = (uint*)(void*)&fmt + 1; for(i = 0; fmt[i]; i++){ 688: 0f b6 5e ff movzbl -0x1(%esi),%ebx 68c: 84 db test %bl,%bl 68e: 74 73 je 703 <printf+0xd3> c = fmt[i] & 0xff; if(state == 0){ 690: 85 d2 test %edx,%edx uint *ap; state = 0; ap = (uint*)(void*)&fmt + 1; for(i = 0; fmt[i]; i++){ c = fmt[i] & 0xff; 692: 0f be cb movsbl %bl,%ecx 695: 0f b6 c3 movzbl %bl,%eax if(state == 0){ 698: 74 c6 je 660 <printf+0x30> if(c == '%'){ state = '%'; } else { putc(fd, c); } } else if(state == '%'){ 69a: 83 fa 25 cmp $0x25,%edx 69d: 75 e6 jne 685 <printf+0x55> if(c == 'd'){ 69f: 83 f8 64 cmp $0x64,%eax 6a2: 0f 84 f8 00 00 00 je 7a0 <printf+0x170> printint(fd, *ap, 10, 1); ap++; } else if(c == 'x' || c == 'p'){ 6a8: 81 e1 f7 00 00 00 and $0xf7,%ecx 6ae: 83 f9 70 cmp $0x70,%ecx 6b1: 74 5d je 710 <printf+0xe0> printint(fd, *ap, 16, 0); ap++; } else if(c == 's'){ 6b3: 83 f8 73 cmp $0x73,%eax 6b6: 0f 84 84 00 00 00 je 740 <printf+0x110> s = "(null)"; while(*s != 0){ putc(fd, *s); s++; } } else if(c == 'c'){ 6bc: 83 f8 63 cmp $0x63,%eax 6bf: 0f 84 ea 00 00 00 je 7af <printf+0x17f> putc(fd, *ap); ap++; } else if(c == '%'){ 6c5: 83 f8 25 cmp $0x25,%eax 6c8: 0f 84 c2 00 00 00 je 790 <printf+0x160> #include "user.h" static void putc(int fd, char c) { write(fd, &c, 1); 6ce: 8d 45 e7 lea -0x19(%ebp),%eax 6d1: 83 ec 04 sub $0x4,%esp 6d4: c6 45 e7 25 movb $0x25,-0x19(%ebp) 6d8: 6a 01 push $0x1 6da: 50 push %eax 6db: 57 push %edi 6dc: e8 01 fe ff ff call 4e2 <write> 6e1: 83 c4 0c add $0xc,%esp 6e4: 8d 45 e6 lea -0x1a(%ebp),%eax 6e7: 88 5d e6 mov %bl,-0x1a(%ebp) 6ea: 6a 01 push $0x1 6ec: 50 push %eax 6ed: 57 push %edi 6ee: 83 c6 01 add $0x1,%esi 6f1: e8 ec fd ff ff call 4e2 <write> int c, i, state; uint *ap; state = 0; ap = (uint*)(void*)&fmt + 1; for(i = 0; fmt[i]; i++){ 6f6: 0f b6 5e ff movzbl -0x1(%esi),%ebx #include "user.h" static void putc(int fd, char c) { write(fd, &c, 1); 6fa: 83 c4 10 add $0x10,%esp } else { // Unknown % sequence. Print it to draw attention. putc(fd, '%'); putc(fd, c); } state = 0; 6fd: 31 d2 xor %edx,%edx int c, i, state; uint *ap; state = 0; ap = (uint*)(void*)&fmt + 1; for(i = 0; fmt[i]; i++){ 6ff: 84 db test %bl,%bl 701: 75 8d jne 690 <printf+0x60> putc(fd, c); } state = 0; } } } 703: 8d 65 f4 lea -0xc(%ebp),%esp 706: 5b pop %ebx 707: 5e pop %esi 708: 5f pop %edi 709: 5d pop %ebp 70a: c3 ret 70b: 90 nop 70c: 8d 74 26 00 lea 0x0(%esi,%eiz,1),%esi } else if(state == '%'){ if(c == 'd'){ printint(fd, *ap, 10, 1); ap++; } else if(c == 'x' || c == 'p'){ printint(fd, *ap, 16, 0); 710: 83 ec 0c sub $0xc,%esp 713: b9 10 00 00 00 mov $0x10,%ecx 718: 6a 00 push $0x0 71a: 8b 5d d0 mov -0x30(%ebp),%ebx 71d: 89 f8 mov %edi,%eax 71f: 8b 13 mov (%ebx),%edx 721: e8 6a fe ff ff call 590 <printint> ap++; 726: 89 d8 mov %ebx,%eax 728: 83 c4 10 add $0x10,%esp } else { // Unknown % sequence. Print it to draw attention. putc(fd, '%'); putc(fd, c); } state = 0; 72b: 31 d2 xor %edx,%edx if(c == 'd'){ printint(fd, *ap, 10, 1); ap++; } else if(c == 'x' || c == 'p'){ printint(fd, *ap, 16, 0); ap++; 72d: 83 c0 04 add $0x4,%eax 730: 89 45 d0 mov %eax,-0x30(%ebp) 733: e9 4d ff ff ff jmp 685 <printf+0x55> 738: 90 nop 739: 8d b4 26 00 00 00 00 lea 0x0(%esi,%eiz,1),%esi } else if(c == 's'){ s = (char*)*ap; 740: 8b 45 d0 mov -0x30(%ebp),%eax 743: 8b 18 mov (%eax),%ebx ap++; 745: 83 c0 04 add $0x4,%eax 748: 89 45 d0 mov %eax,-0x30(%ebp) if(s == 0) s = "(null)"; 74b: b8 ad 09 00 00 mov $0x9ad,%eax 750: 85 db test %ebx,%ebx 752: 0f 44 d8 cmove %eax,%ebx while(*s != 0){ 755: 0f b6 03 movzbl (%ebx),%eax 758: 84 c0 test %al,%al 75a: 74 23 je 77f <printf+0x14f> 75c: 8d 74 26 00 lea 0x0(%esi,%eiz,1),%esi 760: 88 45 e3 mov %al,-0x1d(%ebp) #include "user.h" static void putc(int fd, char c) { write(fd, &c, 1); 763: 8d 45 e3 lea -0x1d(%ebp),%eax 766: 83 ec 04 sub $0x4,%esp 769: 6a 01 push $0x1 ap++; if(s == 0) s = "(null)"; while(*s != 0){ putc(fd, *s); s++; 76b: 83 c3 01 add $0x1,%ebx #include "user.h" static void putc(int fd, char c) { write(fd, &c, 1); 76e: 50 push %eax 76f: 57 push %edi 770: e8 6d fd ff ff call 4e2 <write> } else if(c == 's'){ s = (char*)*ap; ap++; if(s == 0) s = "(null)"; while(*s != 0){ 775: 0f b6 03 movzbl (%ebx),%eax 778: 83 c4 10 add $0x10,%esp 77b: 84 c0 test %al,%al 77d: 75 e1 jne 760 <printf+0x130> } else { // Unknown % sequence. Print it to draw attention. putc(fd, '%'); putc(fd, c); } state = 0; 77f: 31 d2 xor %edx,%edx 781: e9 ff fe ff ff jmp 685 <printf+0x55> 786: 8d 76 00 lea 0x0(%esi),%esi 789: 8d bc 27 00 00 00 00 lea 0x0(%edi,%eiz,1),%edi #include "user.h" static void putc(int fd, char c) { write(fd, &c, 1); 790: 83 ec 04 sub $0x4,%esp 793: 88 5d e5 mov %bl,-0x1b(%ebp) 796: 8d 45 e5 lea -0x1b(%ebp),%eax 799: 6a 01 push $0x1 79b: e9 4c ff ff ff jmp 6ec <printf+0xbc> } else { putc(fd, c); } } else if(state == '%'){ if(c == 'd'){ printint(fd, *ap, 10, 1); 7a0: 83 ec 0c sub $0xc,%esp 7a3: b9 0a 00 00 00 mov $0xa,%ecx 7a8: 6a 01 push $0x1 7aa: e9 6b ff ff ff jmp 71a <printf+0xea> 7af: 8b 5d d0 mov -0x30(%ebp),%ebx #include "user.h" static void putc(int fd, char c) { write(fd, &c, 1); 7b2: 83 ec 04 sub $0x4,%esp 7b5: 8b 03 mov (%ebx),%eax 7b7: 6a 01 push $0x1 7b9: 88 45 e4 mov %al,-0x1c(%ebp) 7bc: 8d 45 e4 lea -0x1c(%ebp),%eax 7bf: 50 push %eax 7c0: 57 push %edi 7c1: e8 1c fd ff ff call 4e2 <write> 7c6: e9 5b ff ff ff jmp 726 <printf+0xf6> 7cb: 66 90 xchg %ax,%ax 7cd: 66 90 xchg %ax,%ax 7cf: 90 nop 000007d0 <free>: static Header base; static Header *freep; void free(void *ap) { 7d0: 55 push %ebp Header *bp, *p; bp = (Header*)ap - 1; for(p = freep; !(bp > p && bp < p->s.ptr); p = p->s.ptr) 7d1: a1 58 0c 00 00 mov 0xc58,%eax static Header base; static Header *freep; void free(void *ap) { 7d6: 89 e5 mov %esp,%ebp 7d8: 57 push %edi 7d9: 56 push %esi 7da: 53 push %ebx 7db: 8b 5d 08 mov 0x8(%ebp),%ebx Header *bp, *p; bp = (Header*)ap - 1; for(p = freep; !(bp > p && bp < p->s.ptr); p = p->s.ptr) if(p >= p->s.ptr && (bp > p || bp < p->s.ptr)) 7de: 8b 10 mov (%eax),%edx void free(void *ap) { Header *bp, *p; bp = (Header*)ap - 1; 7e0: 8d 4b f8 lea -0x8(%ebx),%ecx for(p = freep; !(bp > p && bp < p->s.ptr); p = p->s.ptr) 7e3: 39 c8 cmp %ecx,%eax 7e5: 73 19 jae 800 <free+0x30> 7e7: 89 f6 mov %esi,%esi 7e9: 8d bc 27 00 00 00 00 lea 0x0(%edi,%eiz,1),%edi 7f0: 39 d1 cmp %edx,%ecx 7f2: 72 1c jb 810 <free+0x40> if(p >= p->s.ptr && (bp > p || bp < p->s.ptr)) 7f4: 39 d0 cmp %edx,%eax 7f6: 73 18 jae 810 <free+0x40> static Header base; static Header *freep; void free(void *ap) { 7f8: 89 d0 mov %edx,%eax Header *bp, *p; bp = (Header*)ap - 1; for(p = freep; !(bp > p && bp < p->s.ptr); p = p->s.ptr) 7fa: 39 c8 cmp %ecx,%eax if(p >= p->s.ptr && (bp > p || bp < p->s.ptr)) 7fc: 8b 10 mov (%eax),%edx free(void *ap) { Header *bp, *p; bp = (Header*)ap - 1; for(p = freep; !(bp > p && bp < p->s.ptr); p = p->s.ptr) 7fe: 72 f0 jb 7f0 <free+0x20> if(p >= p->s.ptr && (bp > p || bp < p->s.ptr)) 800: 39 d0 cmp %edx,%eax 802: 72 f4 jb 7f8 <free+0x28> 804: 39 d1 cmp %edx,%ecx 806: 73 f0 jae 7f8 <free+0x28> 808: 90 nop 809: 8d b4 26 00 00 00 00 lea 0x0(%esi,%eiz,1),%esi break; if(bp + bp->s.size == p->s.ptr){ 810: 8b 73 fc mov -0x4(%ebx),%esi 813: 8d 3c f1 lea (%ecx,%esi,8),%edi 816: 39 d7 cmp %edx,%edi 818: 74 19 je 833 <free+0x63> bp->s.size += p->s.ptr->s.size; bp->s.ptr = p->s.ptr->s.ptr; } else bp->s.ptr = p->s.ptr; 81a: 89 53 f8 mov %edx,-0x8(%ebx) if(p + p->s.size == bp){ 81d: 8b 50 04 mov 0x4(%eax),%edx 820: 8d 34 d0 lea (%eax,%edx,8),%esi 823: 39 f1 cmp %esi,%ecx 825: 74 23 je 84a <free+0x7a> p->s.size += bp->s.size; p->s.ptr = bp->s.ptr; } else p->s.ptr = bp; 827: 89 08 mov %ecx,(%eax) freep = p; 829: a3 58 0c 00 00 mov %eax,0xc58 } 82e: 5b pop %ebx 82f: 5e pop %esi 830: 5f pop %edi 831: 5d pop %ebp 832: c3 ret bp = (Header*)ap - 1; for(p = freep; !(bp > p && bp < p->s.ptr); p = p->s.ptr) if(p >= p->s.ptr && (bp > p || bp < p->s.ptr)) break; if(bp + bp->s.size == p->s.ptr){ bp->s.size += p->s.ptr->s.size; 833: 03 72 04 add 0x4(%edx),%esi 836: 89 73 fc mov %esi,-0x4(%ebx) bp->s.ptr = p->s.ptr->s.ptr; 839: 8b 10 mov (%eax),%edx 83b: 8b 12 mov (%edx),%edx 83d: 89 53 f8 mov %edx,-0x8(%ebx) } else bp->s.ptr = p->s.ptr; if(p + p->s.size == bp){ 840: 8b 50 04 mov 0x4(%eax),%edx 843: 8d 34 d0 lea (%eax,%edx,8),%esi 846: 39 f1 cmp %esi,%ecx 848: 75 dd jne 827 <free+0x57> p->s.size += bp->s.size; 84a: 03 53 fc add -0x4(%ebx),%edx p->s.ptr = bp->s.ptr; } else p->s.ptr = bp; freep = p; 84d: a3 58 0c 00 00 mov %eax,0xc58 bp->s.size += p->s.ptr->s.size; bp->s.ptr = p->s.ptr->s.ptr; } else bp->s.ptr = p->s.ptr; if(p + p->s.size == bp){ p->s.size += bp->s.size; 852: 89 50 04 mov %edx,0x4(%eax) p->s.ptr = bp->s.ptr; 855: 8b 53 f8 mov -0x8(%ebx),%edx 858: 89 10 mov %edx,(%eax) } else p->s.ptr = bp; freep = p; } 85a: 5b pop %ebx 85b: 5e pop %esi 85c: 5f pop %edi 85d: 5d pop %ebp 85e: c3 ret 85f: 90 nop 00000860 <malloc>: return freep; } void* malloc(uint nbytes) { 860: 55 push %ebp 861: 89 e5 mov %esp,%ebp 863: 57 push %edi 864: 56 push %esi 865: 53 push %ebx 866: 83 ec 0c sub $0xc,%esp Header *p, *prevp; uint nunits; nunits = (nbytes + sizeof(Header) - 1)/sizeof(Header) + 1; 869: 8b 45 08 mov 0x8(%ebp),%eax if((prevp = freep) == 0){ 86c: 8b 15 58 0c 00 00 mov 0xc58,%edx malloc(uint nbytes) { Header *p, *prevp; uint nunits; nunits = (nbytes + sizeof(Header) - 1)/sizeof(Header) + 1; 872: 8d 78 07 lea 0x7(%eax),%edi 875: c1 ef 03 shr $0x3,%edi 878: 83 c7 01 add $0x1,%edi if((prevp = freep) == 0){ 87b: 85 d2 test %edx,%edx 87d: 0f 84 a3 00 00 00 je 926 <malloc+0xc6> 883: 8b 02 mov (%edx),%eax 885: 8b 48 04 mov 0x4(%eax),%ecx base.s.ptr = freep = prevp = &base; base.s.size = 0; } for(p = prevp->s.ptr; ; prevp = p, p = p->s.ptr){ if(p->s.size >= nunits){ 888: 39 cf cmp %ecx,%edi 88a: 76 74 jbe 900 <malloc+0xa0> 88c: 81 ff 00 10 00 00 cmp $0x1000,%edi 892: be 00 10 00 00 mov $0x1000,%esi 897: 8d 1c fd 00 00 00 00 lea 0x0(,%edi,8),%ebx 89e: 0f 43 f7 cmovae %edi,%esi 8a1: ba 00 80 00 00 mov $0x8000,%edx 8a6: 81 ff ff 0f 00 00 cmp $0xfff,%edi 8ac: 0f 46 da cmovbe %edx,%ebx 8af: eb 10 jmp 8c1 <malloc+0x61> 8b1: 8d b4 26 00 00 00 00 lea 0x0(%esi,%eiz,1),%esi nunits = (nbytes + sizeof(Header) - 1)/sizeof(Header) + 1; if((prevp = freep) == 0){ base.s.ptr = freep = prevp = &base; base.s.size = 0; } for(p = prevp->s.ptr; ; prevp = p, p = p->s.ptr){ 8b8: 8b 02 mov (%edx),%eax if(p->s.size >= nunits){ 8ba: 8b 48 04 mov 0x4(%eax),%ecx 8bd: 39 cf cmp %ecx,%edi 8bf: 76 3f jbe 900 <malloc+0xa0> p->s.size = nunits; } freep = prevp; return (void*)(p + 1); } if(p == freep) 8c1: 39 05 58 0c 00 00 cmp %eax,0xc58 8c7: 89 c2 mov %eax,%edx 8c9: 75 ed jne 8b8 <malloc+0x58> char *p; Header *hp; if(nu < 4096) nu = 4096; p = sbrk(nu * sizeof(Header)); 8cb: 83 ec 0c sub $0xc,%esp 8ce: 53 push %ebx 8cf: e8 76 fc ff ff call 54a <sbrk> if(p == (char*)-1) 8d4: 83 c4 10 add $0x10,%esp 8d7: 83 f8 ff cmp $0xffffffff,%eax 8da: 74 1c je 8f8 <malloc+0x98> return 0; hp = (Header*)p; hp->s.size = nu; 8dc: 89 70 04 mov %esi,0x4(%eax) free((void*)(hp + 1)); 8df: 83 ec 0c sub $0xc,%esp 8e2: 83 c0 08 add $0x8,%eax 8e5: 50 push %eax 8e6: e8 e5 fe ff ff call 7d0 <free> return freep; 8eb: 8b 15 58 0c 00 00 mov 0xc58,%edx } freep = prevp; return (void*)(p + 1); } if(p == freep) if((p = morecore(nunits)) == 0) 8f1: 83 c4 10 add $0x10,%esp 8f4: 85 d2 test %edx,%edx 8f6: 75 c0 jne 8b8 <malloc+0x58> return 0; 8f8: 31 c0 xor %eax,%eax 8fa: eb 1c jmp 918 <malloc+0xb8> 8fc: 8d 74 26 00 lea 0x0(%esi,%eiz,1),%esi base.s.ptr = freep = prevp = &base; base.s.size = 0; } for(p = prevp->s.ptr; ; prevp = p, p = p->s.ptr){ if(p->s.size >= nunits){ if(p->s.size == nunits) 900: 39 cf cmp %ecx,%edi 902: 74 1c je 920 <malloc+0xc0> prevp->s.ptr = p->s.ptr; else { p->s.size -= nunits; 904: 29 f9 sub %edi,%ecx 906: 89 48 04 mov %ecx,0x4(%eax) p += p->s.size; 909: 8d 04 c8 lea (%eax,%ecx,8),%eax p->s.size = nunits; 90c: 89 78 04 mov %edi,0x4(%eax) } freep = prevp; 90f: 89 15 58 0c 00 00 mov %edx,0xc58 return (void*)(p + 1); 915: 83 c0 08 add $0x8,%eax } if(p == freep) if((p = morecore(nunits)) == 0) return 0; } } 918: 8d 65 f4 lea -0xc(%ebp),%esp 91b: 5b pop %ebx 91c: 5e pop %esi 91d: 5f pop %edi 91e: 5d pop %ebp 91f: c3 ret base.s.size = 0; } for(p = prevp->s.ptr; ; prevp = p, p = p->s.ptr){ if(p->s.size >= nunits){ if(p->s.size == nunits) prevp->s.ptr = p->s.ptr; 920: 8b 08 mov (%eax),%ecx 922: 89 0a mov %ecx,(%edx) 924: eb e9 jmp 90f <malloc+0xaf> Header *p, *prevp; uint nunits; nunits = (nbytes + sizeof(Header) - 1)/sizeof(Header) + 1; if((prevp = freep) == 0){ base.s.ptr = freep = prevp = &base; 926: c7 05 58 0c 00 00 5c movl $0xc5c,0xc58 92d: 0c 00 00 930: c7 05 5c 0c 00 00 5c movl $0xc5c,0xc5c 937: 0c 00 00 base.s.size = 0; 93a: b8 5c 0c 00 00 mov $0xc5c,%eax 93f: c7 05 60 0c 00 00 00 movl $0x0,0xc60 946: 00 00 00 949: e9 3e ff ff ff jmp 88c <malloc+0x2c>
29.986508
63
0.414686
0842985ba8af2666bf72c12f1fb11774a9ca7ac9
201
asm
Assembly
libsrc/_DEVELOPMENT/adt/w_array/c/sdcc_iy/w_array_empty_fastcall.asm
meesokim/z88dk
5763c7778f19a71d936b3200374059d267066bb2
[ "ClArtistic" ]
null
null
null
libsrc/_DEVELOPMENT/adt/w_array/c/sdcc_iy/w_array_empty_fastcall.asm
meesokim/z88dk
5763c7778f19a71d936b3200374059d267066bb2
[ "ClArtistic" ]
null
null
null
libsrc/_DEVELOPMENT/adt/w_array/c/sdcc_iy/w_array_empty_fastcall.asm
meesokim/z88dk
5763c7778f19a71d936b3200374059d267066bb2
[ "ClArtistic" ]
null
null
null
; int w_array_empty_fastcall(b_array_t *a) SECTION code_adt_w_array PUBLIC _w_array_empty_fastcall defc _w_array_empty_fastcall = asm_w_array_empty INCLUDE "adt/w_array/z80/asm_w_array_empty.asm"
18.272727
48
0.850746
c00299ebcc5374c01aa3dd3b86332bb3370040fc
2,379
asm
Assembly
programs/oeis/100/A100146.asm
karttu/loda
9c3b0fc57b810302220c044a9d17db733c76a598
[ "Apache-2.0" ]
1
2021-03-15T11:38:20.000Z
2021-03-15T11:38:20.000Z
programs/oeis/100/A100146.asm
karttu/loda
9c3b0fc57b810302220c044a9d17db733c76a598
[ "Apache-2.0" ]
null
null
null
programs/oeis/100/A100146.asm
karttu/loda
9c3b0fc57b810302220c044a9d17db733c76a598
[ "Apache-2.0" ]
null
null
null
; A100146: Structured great rhombicubeoctahedral numbers. ; 1,48,221,600,1265,2296,3773,5776,8385,11680,15741,20648,26481,33320,41245,50336,60673,72336,85405,99960,116081,133848,153341,174640,197825,222976,250173,279496,311025,344840,381021,419648,460801,504560,551005,600216,652273,707256,765245,826320,890561,958048,1028861,1103080,1180785,1262056,1346973,1435616,1528065,1624400,1724701,1829048,1937521,2050200,2167165,2288496,2414273,2544576,2679485,2819080,2963441,3112648,3266781,3425920,3590145,3759536,3934173,4114136,4299505,4490360,4686781,4888848,5096641,5310240,5529725,5755176,5986673,6224296,6468125,6718240,6974721,7237648,7507101,7783160,8065905,8355416,8651773,8955056,9265345,9582720,9907261,10239048,10578161,10924680,11278685,11640256,12009473,12386416,12771165,13163800,13564401,13973048,14389821,14814800,15248065,15689696,16139773,16598376,17065585,17541480,18026141,18519648,19022081,19533520,20054045,20583736,21122673,21670936,22228605,22795760,23372481,23958848,24554941,25160840,25776625,26402376,27038173,27684096,28340225,29006640,29683421,30370648,31068401,31776760,32495805,33225616,33966273,34717856,35480445,36254120,37038961,37835048,38642461,39461280,40291585,41133456,41986973,42852216,43729265,44618200,45519101,46432048,47357121,48294400,49243965,50205896,51180273,52167176,53166685,54178880,55203841,56241648,57292381,58356120,59432945,60522936,61626173,62742736,63872705,65016160,66173181,67343848,68528241,69726440,70938525,72164576,73404673,74658896,75927325,77210040,78507121,79818648,81144701,82485360,83840705,85210816,86595773,87995656,89410545,90840520,92285661,93746048,95221761,96712880,98219485,99741656,101279473,102833016,104402365,105987600,107588801,109206048,110839421,112489000,114154865,115837096,117535773,119250976,120982785,122731280,124496541,126278648,128077681,129893720,131726845,133577136,135444673,137329536,139231805,141151560,143088881,145043848,147016541,149007040,151015425,153041776,155086173,157148696,159229425,161328440,163445821,165581648,167736001,169908960,172100605,174311016,176540273,178788456,181055645,183341920,185647361,187972048,190316061,192679480,195062385,197464856,199886973,202328816,204790465,207272000 mov $1,$0 mov $5,$0 mul $0,2 mul $1,$0 add $1,1 mul $1,5 mov $4,$0 mul $4,2 mul $1,$4 div $1,3 add $1,1 mov $2,$5 mul $2,4 add $1,$2 mov $3,$5 mul $3,$5 mov $2,$3 mul $2,23 add $1,$2
103.434783
2,136
0.8533
a5fda4a565c3b9a07120d67ccd799bc12973c027
6,564
asm
Assembly
Transynther/x86/_processed/NONE/_xt_sm_/i7-7700_9_0x48.log_21829_1032.asm
ljhsiun2/medusa
67d769b8a2fb42c538f10287abaf0e6dbb463f0c
[ "MIT" ]
9
2020-08-13T19:41:58.000Z
2022-03-30T12:22:51.000Z
Transynther/x86/_processed/NONE/_xt_sm_/i7-7700_9_0x48.log_21829_1032.asm
ljhsiun2/medusa
67d769b8a2fb42c538f10287abaf0e6dbb463f0c
[ "MIT" ]
1
2021-04-29T06:29:35.000Z
2021-05-13T21:02:30.000Z
Transynther/x86/_processed/NONE/_xt_sm_/i7-7700_9_0x48.log_21829_1032.asm
ljhsiun2/medusa
67d769b8a2fb42c538f10287abaf0e6dbb463f0c
[ "MIT" ]
3
2020-07-14T17:07:07.000Z
2022-03-21T01:12:22.000Z
.global s_prepare_buffers s_prepare_buffers: push %r12 push %r13 push %r14 push %r8 push %rbx push %rcx push %rdi push %rsi lea addresses_normal_ht+0x5763, %r13 nop nop nop nop nop sub $18535, %rbx and $0xffffffffffffffc0, %r13 movaps (%r13), %xmm6 vpextrq $0, %xmm6, %r14 nop nop nop nop inc %r8 lea addresses_normal_ht+0x1a387, %rsi lea addresses_WC_ht+0x1153b, %rdi nop nop nop sub %r12, %r12 mov $20, %rcx rep movsq sub $37047, %rcx lea addresses_WC_ht+0x1991b, %rbx nop nop nop nop xor $58674, %r14 mov (%rbx), %edi and %rsi, %rsi lea addresses_A_ht+0x1bd3b, %r8 nop nop nop nop sub %rsi, %rsi movl $0x61626364, (%r8) nop nop add $13011, %r12 pop %rsi pop %rdi pop %rcx pop %rbx pop %r8 pop %r14 pop %r13 pop %r12 ret .global s_faulty_load s_faulty_load: push %r11 push %r9 push %rax push %rbp push %rbx push %rcx push %rsi // Load lea addresses_US+0xd3b, %rbx nop nop nop xor $54775, %rbp mov (%rbx), %rcx nop nop nop nop add %rsi, %rsi // Store lea addresses_UC+0x1eee7, %r9 nop nop nop add $13251, %r11 mov $0x5152535455565758, %rbx movq %rbx, %xmm6 movups %xmm6, (%r9) nop nop nop nop nop cmp $42193, %rax // Store lea addresses_PSE+0x1113b, %r9 nop nop nop nop and $59965, %r11 mov $0x5152535455565758, %rbp movq %rbp, %xmm3 vmovups %ymm3, (%r9) nop nop xor $48597, %rbx // Store mov $0x497000000000093b, %r11 cmp %rbp, %rbp mov $0x5152535455565758, %rcx movq %rcx, %xmm3 vmovups %ymm3, (%r11) nop nop nop nop cmp %rsi, %rsi // Store lea addresses_WT+0x493b, %rax nop nop nop nop nop sub $5757, %rbp movb $0x51, (%rax) // Exception!!! mov (0), %rbp nop nop add $26945, %rsi // Store lea addresses_US+0xb53b, %rcx nop nop nop nop nop and $41081, %rax movl $0x51525354, (%rcx) nop nop nop nop nop and $63648, %r9 // Faulty Load lea addresses_PSE+0x1113b, %rax nop nop nop nop nop sub $6575, %rbp mov (%rax), %rbx lea oracles, %r9 and $0xff, %rbx shlq $12, %rbx mov (%r9,%rbx,1), %rbx pop %rsi pop %rcx pop %rbx pop %rbp pop %rax pop %r9 pop %r11 ret /* <gen_faulty_load> [REF] {'OP': 'LOAD', 'src': {'type': 'addresses_PSE', 'AVXalign': True, 'congruent': 0, 'size': 32, 'same': False, 'NT': False}} {'OP': 'LOAD', 'src': {'type': 'addresses_US', 'AVXalign': False, 'congruent': 9, 'size': 8, 'same': False, 'NT': False}} {'OP': 'STOR', 'dst': {'type': 'addresses_UC', 'AVXalign': False, 'congruent': 0, 'size': 16, 'same': False, 'NT': False}} {'OP': 'STOR', 'dst': {'type': 'addresses_PSE', 'AVXalign': False, 'congruent': 0, 'size': 32, 'same': True, 'NT': False}} {'OP': 'STOR', 'dst': {'type': 'addresses_NC', 'AVXalign': False, 'congruent': 11, 'size': 32, 'same': False, 'NT': False}} {'OP': 'STOR', 'dst': {'type': 'addresses_WT', 'AVXalign': False, 'congruent': 10, 'size': 1, 'same': False, 'NT': False}} {'OP': 'STOR', 'dst': {'type': 'addresses_US', 'AVXalign': False, 'congruent': 6, 'size': 4, 'same': False, 'NT': False}} [Faulty Load] {'OP': 'LOAD', 'src': {'type': 'addresses_PSE', 'AVXalign': False, 'congruent': 0, 'size': 8, 'same': True, 'NT': False}} <gen_prepare_buffer> {'OP': 'LOAD', 'src': {'type': 'addresses_normal_ht', 'AVXalign': True, 'congruent': 2, 'size': 16, 'same': True, 'NT': False}} {'OP': 'REPM', 'src': {'type': 'addresses_normal_ht', 'congruent': 1, 'same': False}, 'dst': {'type': 'addresses_WC_ht', 'congruent': 10, 'same': False}} {'OP': 'LOAD', 'src': {'type': 'addresses_WC_ht', 'AVXalign': False, 'congruent': 5, 'size': 4, 'same': False, 'NT': False}} {'OP': 'STOR', 'dst': {'type': 'addresses_A_ht', 'AVXalign': False, 'congruent': 7, 'size': 4, 'same': False, 'NT': False}} {'58': 21829} 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 */
32.49505
2,999
0.655698
8241e876d7e9cc8043d766fa84afbf0ce57f71cb
4,514
asm
Assembly
80386EX.asm
JohnAdriaan/80386EX
3601d5fb46279657336475dbb68a6f0ec3245ecf
[ "Unlicense" ]
null
null
null
80386EX.asm
JohnAdriaan/80386EX
3601d5fb46279657336475dbb68a6f0ec3245ecf
[ "Unlicense" ]
null
null
null
80386EX.asm
JohnAdriaan/80386EX
3601d5fb46279657336475dbb68a6f0ec3245ecf
[ "Unlicense" ]
1
2019-12-09T05:04:32.000Z
2019-12-09T05:04:32.000Z
; ; 80386EX.asm ; ;=============================================================================== ; This file is a boot ROM for the SBC-386EX from RetroBrew Computers: ; https://www.RetroBrewcComputers.org/doku.php?id=boards:sbc:sbc-386ex:rev2.0 ; ; It has been written to be assembled with the Netwide Assembler NASM, which ; is a free download (http://www.nasm.us/) and will run on a number of different ; development platforms - Windows, Linux and OS-X. ; ; The NASM command line to assemble this source depends on the output format: ; Binary format: nasm.exe -l80386EX.lst 80386EX.asm ; Intel Hex format: nasm.exe -fith -l80386EX.lst -o80386EX.hex 80386EX.asm ; ; Unlike many projects, this one is not a series of modules that need to be ; independently compiled/assembled. Instead, this one file `%include`s all other ; files to provide a single image that is produced by the assembler. ; ; However, modularity is not lost: in fact, most files `%include` their own ; sub-files to make one cohesive whole. The project file hierarchy is designed ; to make it easy to know where to go: ; `x86` : Definitions for the basic x86 CPU ; `Dev` : Definitions for devices ; 'Demo' : Let's see what we can do with Protected Mode ; 'Boot' : Boot code ;=============================================================================== SECTALIGN OFF ; No implicit ALIGN => SECTALIGN effects CPU 386 ; These are the boot-time definitions %define Boot.BaudRate 115_200 %define Boot.Protocol Dev.UART.Word8 | Dev.UART.ParityNone | Dev.UART.Stop1 Screen.Width EQU 90 Screen.Height EQU 59 Screen.Size EQU Screen.Width * Screen.Height * 2 Font.Height EQU 8 ; These are some version identifiers %define Name "80386EX" %substr Name.Stamp %[Name] 3, 5 %substr Version.Year __DATE__ 3, 2 %define Version.Author "John Adriaan" %define Version.Demo "386 Demonstrator" %define Version.Boot "'386EX Boot ROM" %define Version.Copyright 169, "2014-", %[Version.Year] %define Version.Major 0 %define Version.Minor 1 %define Version.Build 0 %defstr Version.String %[Version.Major].%[Version.Minor].%[Version.Build] %defstr Version.Stamp v%[Version.Major]%[Version.Minor] ;******************************************************************************* ; Define .map file output. Map files are your friend! They can help you work out ; whether the assembler understands what you thought you told it... [map all 80386EX.map] %assign Demo.Size 0 ; Size of Demo part. See */Sizes.inc below %assign Boot.Size 0 ; Size of Boot part. See /*Sizes.inc below %assign Image.Size 0 ; Whole Image size. See */Sizes.inc below ;=============================================================================== ; The following are just definitions. Lots and lots of definitions... ; I hate "magic" numbers. Only 0 and 1 are numbers; the rest need labels! ; And comments. Lots and lots of comments... %include "x86/x86.inc" ; Definitions for x86 CPU ;=============================================================================== %include "x86/EX/386EX.inc" ; Definitions for 80386EX CPU ;=============================================================================== %include "Dev/Dev.inc" ; Definitions for other Devices ;=============================================================================== %include "Dev/SBC-386EX/SBC-386EX.inc" ; Definitions for this board ;=============================================================================== USE32 %include "Demo/Demo.inc" ; Demo to show Protected Mode features %include "Demo/Sizes.inc" ;=============================================================================== SEGMENT EPROM %include "EPROM.inc" ; Padding for unused EPROM ;=============================================================================== USE16 ; Boot in 16-bit Real Mode %include "Boot/Boot.inc" ; Real Mode bootstrap SEGMENT Boot.Reset ALIGN 8, DB 0FFh DB Name.Stamp, Version.Stamp %include "Boot/Sizes.inc"
43.825243
87
0.515286
9c183ecf277036ef53d3ed08bb6d86e6faae471d
303
asm
Assembly
programs/oeis/067/A067403.asm
neoneye/loda
afe9559fb53ee12e3040da54bd6aa47283e0d9ec
[ "Apache-2.0" ]
22
2018-02-06T19:19:31.000Z
2022-01-17T21:53:31.000Z
programs/oeis/067/A067403.asm
neoneye/loda
afe9559fb53ee12e3040da54bd6aa47283e0d9ec
[ "Apache-2.0" ]
41
2021-02-22T19:00:34.000Z
2021-08-28T10:47:47.000Z
programs/oeis/067/A067403.asm
neoneye/loda
afe9559fb53ee12e3040da54bd6aa47283e0d9ec
[ "Apache-2.0" ]
5
2021-02-24T21:14:16.000Z
2021-08-09T19:48:05.000Z
; A067403: Third column of triangle A067402. ; 1,5,45,405,3645,32805,295245,2657205,23914845,215233605,1937102445,17433922005,156905298045,1412147682405,12709329141645,114383962274805,1029455660473245,9265100944259205,83385908498332845 mov $1,9 pow $1,$0 mul $1,5 div $1,36 mul $1,4 add $1,1 mov $0,$1
27.545455
190
0.79538
fa183413125fd344bb6d8842653ef8561e79b6cc
102
asm
Assembly
libsrc/_DEVELOPMENT/math/float/math32/lm32/c/sdcc/tanh_fastcall.asm
jpoikela/z88dk
7108b2d7e3a98a77de99b30c9a7c9199da9c75cb
[ "ClArtistic" ]
640
2017-01-14T23:33:45.000Z
2022-03-30T11:28:42.000Z
libsrc/_DEVELOPMENT/math/float/math32/lm32/c/sdcc/tanh_fastcall.asm
jpoikela/z88dk
7108b2d7e3a98a77de99b30c9a7c9199da9c75cb
[ "ClArtistic" ]
1,600
2017-01-15T16:12:02.000Z
2022-03-31T12:11:12.000Z
libsrc/_DEVELOPMENT/math/float/math32/lm32/c/sdcc/tanh_fastcall.asm
jpoikela/z88dk
7108b2d7e3a98a77de99b30c9a7c9199da9c75cb
[ "ClArtistic" ]
215
2017-01-17T10:43:03.000Z
2022-03-23T17:25:02.000Z
SECTION code_fp_math32 PUBLIC _tanh_fastcall EXTERN _m32_tanhf defc _tanh_fastcall = _m32_tanhf
14.571429
33
0.833333
68a802aab9a3cf04524d214f0700313ae8c3ac27
10,662
asm
Assembly
render.asm
PROSMSoft/mode-6
97a2c5ef65fee674746a225aa0113f70f8966407
[ "MIT" ]
2
2021-08-19T13:59:18.000Z
2021-11-09T22:14:16.000Z
render.asm
connosoft/mode-6
97a2c5ef65fee674746a225aa0113f70f8966407
[ "MIT" ]
null
null
null
render.asm
connosoft/mode-6
97a2c5ef65fee674746a225aa0113f70f8966407
[ "MIT" ]
null
null
null
; ================================================================================================== ; === RENDER CURRENT VIEW ; ================================================================================================== m6_render: ; This routine draws the 3D view of the map into the viewport buffer. It takes around 1.5 - 2 frames ; to execute. Interrupts can be left enabled, UNLESS the CPU is in interrupt mode 1, in which case ; interrupts must be disabled, since this routine uses the IY register. ; Handle animation offset ld a,(m6_render_core_tile_smc+1) add a,$20 ; Advance to next frame of tileset ld (m6_render_core_tile_smc+1),a ; Initialise rendering variables ld hl,m6_render_iseg ld (m6_render_width),hl ; Store initial segment width ld hl,(m6_player_x) ; Get X coord of player ld de,m6_render_ox add hl,de ; Add left side offset ld (m6_render_x),hl ; Store rendering X value ld c,h ; Make copy of MSB for map pointer calc. ld hl,(m6_player_y) ; Get Y coord of player ld de,m6_render_oy add hl,de ; Add offset for bottom of screen ld (m6_render_y),hl ; Store rendering Y value ld a,13 ld (m6_render_dy),a ; Store initial delta Y value ld iyh,m6_edgetab/256 ; Set high byte of edge table pointer xor a ld (m6_render_row),a ; Initialise loop counter ; Calculate map pointer ld l,a ld a,h ; Retrieve Y value and 31 ld h,a rr h rr l rr h rr l ld a,c ; Retrieve X value and 63 ; Limit to acceptable range (0-63) add a,l ld l,a ld a,m6_map/256 add a,h ld h,a ld (m6_render_map),hl exx ld hl,m6_gfxbuffer-1 exx m6_render_newline: ; We have reached a new line, so let's set up the registers for the next loop ld a,(m6_render_row) inc a ; Increment loop counter cp 41 ; All rows rendered? ret nc ; ...then exit the renderer ld (m6_render_row),a ld l,a ; Make copy of row number ld a,(m6_render_dy) ; Get delta Y inc a ; Increment delta Y ld (m6_render_dy),a ; Store new delta Y in memory m6_render_newline_l1: ; Keep delta Y in the shadow accumulator for now ex af,af' ld a,l exx ; LINE SET ================================= push hl ; Save buffer address ; Now calculate graphics page ld l,a and 3 add a,m6_tiledata/256 ld ixh,a ; Calculate page for this line of graphics ; Add offset for the delta table ld a,l add a,0+(m6_centretab-1)%256 ld l,a adc a,0+(m6_centretab-1)/256 sub l ld h,a ; Form address to centre table ld e,(hl) ; Get delta from memory ld d,0 ; Extend to 16-bit (could've optimised by ; using 8 to 16 trick a few lines above) ld hl,(m6_render_x) ld a,h ; For later comparison add hl,de ; Add delta ld (m6_render_x),hl cp h ; Change? call nz,m6_render_map_left ; Adjust map pointer if so ; Now let's process our Y coord using our delta Y from the shadow accumulator ex af,af' ld hl,(m6_render_y) add a,l ld l,a call c,m6_render_map_up ; Adjust map pointer on overflow to MSB ld (m6_render_y),a ; Store LSB ; Prepare the line set pop hl ; Restore buffer address inc hl ; Move up a line ld (hl),d ; Zero out left-hand column ld de,$02ff exx ; MAP SET ================================== ; Now retrieve width ld hl,(m6_render_width) ld de,m6_render_dw add hl,de ex de,hl ld (m6_render_width),de ; Multiply the high byte of the width by the fractional component of X using the quarter-square ; multiplication technique. This routine has been adapted from an article in issue 92 of the ; "MSX Computer and Club Webmagazine" push de ; Make a copy of width ld a,(m6_render_x) ; Load LSB of camera position srl a srl a ; Truncate to 6 bits ld e,a ; Get inverted fractional part sub d ; Work out (a-b) ld h,m6_multab/256 ld l,a ; Form address to quarter-square table ld c,(hl) inc h ld b,(hl) ; Load ((a-b)^2)/4 into BC ld a,e add a,d ; Work out (a+b) ld l,a ld e,(hl) dec h ld l,(hl) ld h,e ; Load ((a+b)^2)/4 into HL ; N.B. Ordinarily, OR A would be required to prevent a carry flag mishap. However, the carry was ; reset by the ADD A,D instruction a few lines ago sbc hl,bc ; Result = ((a+b)^2)/4 - ((a-b)^2)/4 add hl,hl add hl,hl ; Scale back up to account for truncation ; Now add an extra bit of accuracy pop de ; Restore segment width ld a,(m6_render_x) bit 1,a jr z,m6_render_newline_l2 ld a,l add a,d ld l,a adc a,h sub l ld h,a m6_render_newline_l2: ; Initialise the other registers ld bc,(m6_render_map) ; Get current map address ld a,(bc) ; Get tile dec c ; Move to next tile - first tile guraranteed ; to be a match ld (m6_render_core_comparison_smc+1),a ; Set current run for first tile of row ; Now prepare the map set. We must calculate the partial width m6_render_core: ; This is the core rendering loop. Here, we keep checking map tiles until we hit a different tile. ; Then, we draw the segment representing that run of map tiles. ld a,(bc) ; Get map byte m6_render_core_comparison_smc: cp 0 ; Current byte? (self-modifying code) jr nz,m6_render_core_l2 ; Exit loop if not m6_render_core_l1: ; Bytes match, so add width to right edge. dec c ; Advance map pointer add hl,de ; Add width to segment jp nc,m6_render_core ; Jump back if no overflow ; The edge counter has overflowed, so we must have hit the end of this row. We need ; to draw the last segment, and then we can move up a row. ld h,255 ; Clip right edge to screen boundary m6_render_core_l2: ; Now we must get the pattern byte and draw the segment in question ld a,(m6_render_core_comparison_smc+1) ; Get run m6_render_core_tile_smc: add a,0 ; Add animation index (self-modifying code) ld ixl,a ; Store in IXL ld a,h ; Copy right edge to A exx ; LINE SET ================================= ld c,a and 7 ; Keep bit-wise position ld iyl,a ; Form address to edge table ld a,c rrca rrca rrca and 31 ; Keep byte-wise portion ld b,a inc b ; This will set the carry flag for lines inc b ; with no run of bytes in the middle sub d ; Subtract left edge ld d,b ; Copy new edge to left edge jp c,m6_render_core_edge ; Jump ahead for edge handling ; We have worked out the width of the central run in bytes, so now to adjust the ; upcoming relative jump for the filling code add a,a ; Double run length cpl add a,63 ; Equivalent to subtracting from 64 ld (m6_render_core_jump_smc+1),a ; Store offset ld c,(ix+0) ; Load texture byte ld a,e ; Get old mask and c ; AND against texture byte or (hl) ; OR to the buffer ld (hl),a ; Store back in buffer m6_render_core_jump_smc: ; This part is the filling stage, which copies the raw line graphic into the buffer jr $ ; (self-modifying code) rept 32 inc l ; Next byte of buffer ld (hl),c ; Copy pattern byte into buffer endm inc l m6_render_core_l3: ld a,(iy+0) ; Get new edge mask ld e,a cpl ; Invert mask and c ; AND against graphic ld (hl),a ; Load into buffer m6_render_core_endline: ; We have now plotted our line, so do some clean up work for the next one exx ; MAP SET ================================== ld a,(bc) ; Grab tile ld (m6_render_core_comparison_smc+1),a ; Store new tile into comparison ld a,255 cp h ; End of screen? jp nz,m6_render_core_l1 ; Not overflowed, so loop back jp m6_render_newline ; Now for next line of buffer m6_render_core_edge: ; This branch handles lines made up of only two edges (16 - 9px) inc a ; Just a small edge case? jr nz,m6_render_core_edge_single ; This must be a double edge situation. ld c,(ix+0) ; Load texture byte ld a,e ; Get old mask and c ; AND against texture byte or (hl) ; OR to the buffer ld (hl),a ; Store back in buffer inc l m6_render_core_edge_left: ld a,(iy+0) ; Get new edge mask ld e,a cpl ; Invert mask and c ; AND against graphic ld (hl),a ; Load into buffer jp m6_render_core_endline m6_render_core_edge_single: ; This must be a single edge situation ld a,c ld c,(ix+0) ; Load texture byte inc a ; Check X coordinate of right edge jr nz,m6_render_core_edge_left ; Jump behind if byte is on left side ld a,e ; Get old mask and c ; AND against texture byte or (hl) ; OR to the buffer ld (hl),a ; Store back in buffer jp m6_render_core_endline m6_render_map_up: ; The Y addition has overflowed, so we must adjust the map pointer inc h ld (m6_render_y),hl ld bc,(m6_render_map) ; Get map pointer ld a,c add a,64 ; Move to next row of map pointer ld c,a adc a,b sub c cp 8+(m6_map/256) ; Out of bounds? jr nz,m6_render_map_up_l1 ld a,m6_map/256 ; Reset line counter m6_render_map_up_l1: ld b,a ld (m6_render_map),bc ; Store map pointer ld a,l ret m6_render_map_left: ; The X addition has overflowed, so we must adjust the map pointer ld bc,(m6_render_map) ; Get map pointer inc c ld (m6_render_map),bc ; Store map pointer ret ; ================================================================================================== ; === RENDERING VARIABLES ; ================================================================================================== m6_render_x: dw 0 m6_render_y: dw 0 m6_render_dy: dw 0 m6_render_row: db 0 m6_render_map: dw 0 m6_render_width: dw 0 ; ================================================================================================== ; === RENDERING EQUATES ; ================================================================================================== m6_render_oy: equ 0-265 m6_render_ox: equ 650 m6_render_dw: equ 0-174 m6_render_iseg: equ 13107 ; ================================================================================================== ; === RENDERING DATA ; ================================================================================================== m6_centretab: db 0, 9, 9, 9, 9, 10, 10, 10 db 10, 11, 11, 11, 12, 12, 13, 13 db 13, 14, 14, 15, 15, 16, 17, 17 db 18, 19, 19, 20, 21, 22, 23, 24 db 25, 26, 28, 29, 30, 32, 34, 36
28.738544
101
0.59426
eb786fcaa4a2081ff21cc2674ab35ec769a0b8aa
705
asm
Assembly
oeis/061/A061778.asm
neoneye/loda-programs
84790877f8e6c2e821b183d2e334d612045d29c0
[ "Apache-2.0" ]
11
2021-08-22T19:44:55.000Z
2022-03-20T16:47:57.000Z
oeis/061/A061778.asm
neoneye/loda-programs
84790877f8e6c2e821b183d2e334d612045d29c0
[ "Apache-2.0" ]
9
2021-08-29T13:15:54.000Z
2022-03-09T19:52:31.000Z
oeis/061/A061778.asm
neoneye/loda-programs
84790877f8e6c2e821b183d2e334d612045d29c0
[ "Apache-2.0" ]
3
2021-08-22T20:56:47.000Z
2021-09-29T06:26:12.000Z
; A061778: a(n) = Product_{j=0..floor(n/2)} C(n,j). ; Submitted by Jon Maiga ; 1,2,3,24,50,1800,5145,878080,3429216,2857680000,15219319500,63117561830400,457937132487120,9577928124440387712,94609025993497640625,10077943267571584204800000,135476575389769051389952000,74054886893191804566576837427200,1354434926051634531310373234715648,3822038592032831128918160803430400000000,95088157279379964899100893076216768000000,1391938996758770867922655936144556115037409280000,47099416200121700585548115075687735913279107955600,3590983920855120541222242030906271549731128033655197270016 add $0,1 mov $1,1 mov $2,10 mov $4,$0 lpb $0 sub $0,2 mov $3,$4 bin $3,$1 add $1,1 mul $2,$3 lpe mov $0,$2 div $0,10
39.166667
499
0.831206
b77a77c1d76786b77c06e96b4a4670a5007f096f
7,610
asm
Assembly
Transynther/x86/_processed/NONE/_xt_/i3-7100_9_0x84_notsx.log_21829_1504.asm
ljhsiun2/medusa
67d769b8a2fb42c538f10287abaf0e6dbb463f0c
[ "MIT" ]
9
2020-08-13T19:41:58.000Z
2022-03-30T12:22:51.000Z
Transynther/x86/_processed/NONE/_xt_/i3-7100_9_0x84_notsx.log_21829_1504.asm
ljhsiun2/medusa
67d769b8a2fb42c538f10287abaf0e6dbb463f0c
[ "MIT" ]
1
2021-04-29T06:29:35.000Z
2021-05-13T21:02:30.000Z
Transynther/x86/_processed/NONE/_xt_/i3-7100_9_0x84_notsx.log_21829_1504.asm
ljhsiun2/medusa
67d769b8a2fb42c538f10287abaf0e6dbb463f0c
[ "MIT" ]
3
2020-07-14T17:07:07.000Z
2022-03-21T01:12:22.000Z
.global s_prepare_buffers s_prepare_buffers: push %r10 push %r13 push %r14 push %r15 push %r8 push %r9 push %rbp push %rcx push %rdi push %rsi lea addresses_A_ht+0x3a9a, %r9 nop nop nop nop xor %r13, %r13 vmovups (%r9), %ymm7 vextracti128 $1, %ymm7, %xmm7 vpextrq $0, %xmm7, %rbp nop nop add $38738, %r10 lea addresses_WT_ht+0xd8c2, %r14 nop sub $58073, %r8 mov $0x6162636465666768, %rbp movq %rbp, %xmm1 vmovups %ymm1, (%r14) nop nop nop add %r14, %r14 lea addresses_normal_ht+0x2cc2, %r8 nop xor %r15, %r15 movw $0x6162, (%r8) nop nop nop nop sub %r9, %r9 lea addresses_A_ht+0x150c2, %r14 nop nop nop nop nop inc %r13 movl $0x61626364, (%r14) nop nop nop cmp $10895, %r15 lea addresses_D_ht+0xf2c2, %rsi lea addresses_normal_ht+0x133a2, %rdi clflush (%rsi) nop cmp $3409, %r15 mov $76, %rcx rep movsq xor %rsi, %rsi lea addresses_WT_ht+0x69c2, %r10 cmp %r13, %r13 mov (%r10), %r8w nop nop nop nop dec %r15 lea addresses_D_ht+0x14fc9, %rbp nop nop nop nop xor %rsi, %rsi mov $0x6162636465666768, %rdi movq %rdi, (%rbp) nop nop nop nop add %r15, %r15 lea addresses_A_ht+0x10025, %r13 nop nop nop nop lfence movb $0x61, (%r13) nop nop nop nop nop xor %r10, %r10 lea addresses_normal_ht+0x7c7a, %r10 and $3688, %rcx and $0xffffffffffffffc0, %r10 movntdqa (%r10), %xmm1 vpextrq $0, %xmm1, %r14 nop nop nop nop sub %rdi, %rdi lea addresses_normal_ht+0x17cc2, %rsi lea addresses_WC_ht+0xa942, %rdi nop nop nop dec %r9 mov $33, %rcx rep movsb nop nop nop nop nop xor $49999, %r10 lea addresses_D_ht+0x10a42, %r9 nop nop add $61952, %r10 vmovups (%r9), %ymm1 vextracti128 $0, %ymm1, %xmm1 vpextrq $1, %xmm1, %r14 nop nop nop nop nop dec %rbp lea addresses_D_ht+0x32be, %rcx sub $42281, %rdi vmovups (%rcx), %ymm2 vextracti128 $0, %ymm2, %xmm2 vpextrq $0, %xmm2, %r14 nop nop add $9, %rsi lea addresses_UC_ht+0x124c2, %r9 clflush (%r9) nop and $18847, %r10 movl $0x61626364, (%r9) nop nop nop nop nop and %rdi, %rdi pop %rsi pop %rdi pop %rcx pop %rbp pop %r9 pop %r8 pop %r15 pop %r14 pop %r13 pop %r10 ret .global s_faulty_load s_faulty_load: push %r10 push %r13 push %r15 push %rax push %rdx push %rsi // Store lea addresses_WC+0x5102, %rsi nop nop nop nop nop and %r13, %r13 mov $0x5152535455565758, %r10 movq %r10, (%rsi) nop nop nop and %r15, %r15 // Faulty Load lea addresses_D+0x18cc2, %rax nop nop nop nop nop xor $64940, %rsi mov (%rax), %r10d lea oracles, %r15 and $0xff, %r10 shlq $12, %r10 mov (%r15,%r10,1), %r10 pop %rsi pop %rdx pop %rax pop %r15 pop %r13 pop %r10 ret /* <gen_faulty_load> [REF] {'src': {'type': 'addresses_D', 'same': False, 'size': 16, 'congruent': 0, 'NT': False, 'AVXalign': True}, 'OP': 'LOAD'} {'dst': {'type': 'addresses_WC', 'same': False, 'size': 8, 'congruent': 6, 'NT': False, 'AVXalign': False}, 'OP': 'STOR'} [Faulty Load] {'src': {'type': 'addresses_D', 'same': True, 'size': 4, 'congruent': 0, 'NT': False, 'AVXalign': False}, 'OP': 'LOAD'} <gen_prepare_buffer> {'src': {'type': 'addresses_A_ht', 'same': False, 'size': 32, 'congruent': 2, 'NT': False, 'AVXalign': False}, 'OP': 'LOAD'} {'dst': {'type': 'addresses_WT_ht', 'same': False, 'size': 32, 'congruent': 5, 'NT': False, 'AVXalign': False}, 'OP': 'STOR'} {'dst': {'type': 'addresses_normal_ht', 'same': True, 'size': 2, 'congruent': 9, 'NT': False, 'AVXalign': False}, 'OP': 'STOR'} {'dst': {'type': 'addresses_A_ht', 'same': False, 'size': 4, 'congruent': 10, 'NT': False, 'AVXalign': False}, 'OP': 'STOR'} {'src': {'type': 'addresses_D_ht', 'congruent': 9, 'same': False}, 'dst': {'type': 'addresses_normal_ht', 'congruent': 5, 'same': False}, 'OP': 'REPM'} {'src': {'type': 'addresses_WT_ht', 'same': True, 'size': 2, 'congruent': 8, 'NT': False, 'AVXalign': False}, 'OP': 'LOAD'} {'dst': {'type': 'addresses_D_ht', 'same': False, 'size': 8, 'congruent': 0, 'NT': False, 'AVXalign': False}, 'OP': 'STOR'} {'dst': {'type': 'addresses_A_ht', 'same': False, 'size': 1, 'congruent': 0, 'NT': False, 'AVXalign': True}, 'OP': 'STOR'} {'src': {'type': 'addresses_normal_ht', 'same': True, 'size': 16, 'congruent': 1, 'NT': True, 'AVXalign': False}, 'OP': 'LOAD'} {'src': {'type': 'addresses_normal_ht', 'congruent': 10, 'same': False}, 'dst': {'type': 'addresses_WC_ht', 'congruent': 4, 'same': True}, 'OP': 'REPM'} {'src': {'type': 'addresses_D_ht', 'same': False, 'size': 32, 'congruent': 5, 'NT': False, 'AVXalign': False}, 'OP': 'LOAD'} {'src': {'type': 'addresses_D_ht', 'same': False, 'size': 32, 'congruent': 2, 'NT': False, 'AVXalign': False}, 'OP': 'LOAD'} {'dst': {'type': 'addresses_UC_ht', 'same': True, 'size': 4, 'congruent': 11, 'NT': False, 'AVXalign': False}, 'OP': 'STOR'} {'36': 21829} 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 */
32.382979
2,999
0.65703
b4e3ce5f496608d63a0a56b13a93692e1c1c750a
374
asm
Assembly
oeis/020/A020784.asm
neoneye/loda-programs
84790877f8e6c2e821b183d2e334d612045d29c0
[ "Apache-2.0" ]
11
2021-08-22T19:44:55.000Z
2022-03-20T16:47:57.000Z
oeis/020/A020784.asm
neoneye/loda-programs
84790877f8e6c2e821b183d2e334d612045d29c0
[ "Apache-2.0" ]
9
2021-08-29T13:15:54.000Z
2022-03-09T19:52:31.000Z
oeis/020/A020784.asm
neoneye/loda-programs
84790877f8e6c2e821b183d2e334d612045d29c0
[ "Apache-2.0" ]
3
2021-08-22T20:56:47.000Z
2021-09-29T06:26:12.000Z
; A020784: Decimal expansion of 1/sqrt(27). ; Submitted by Jamie Morken(s4) ; 1,9,2,4,5,0,0,8,9,7,2,9,8,7,5,2,5,4,8,3,6,3,8,2,9,2,6,8,3,3,9,8,5,8,1,8,5,4,9,2,0,0,5,8,3,7,5,6,7,0,8,9,5,8,6,7,2,8,6,7,4,4,2,1,6,1,3,2,5,8,9,0,7,6,7,6,4,4,4,4,8,5,6,4,5,7,1,7,9,8,5,2,8,5,8,3,1,7,5,0 add $0,1 seq $0,11549 ; Decimal expansion of sqrt(3) truncated to n places. div $0,9 mod $0,10
41.555556
201
0.593583
35c31d80dd8ac568717a0fb85dea2d1dbe449103
144
asm
Assembly
asm-src/print-number.asm
pzel/lc3-tutorial
121d226040035dfad6f7febbffbd007be02ee8d8
[ "MIT" ]
null
null
null
asm-src/print-number.asm
pzel/lc3-tutorial
121d226040035dfad6f7febbffbd007be02ee8d8
[ "MIT" ]
null
null
null
asm-src/print-number.asm
pzel/lc3-tutorial
121d226040035dfad6f7febbffbd007be02ee8d8
[ "MIT" ]
null
null
null
.ORIG x3000 AND R0, R0, #0 ADD R0, R0, #10 ADD R0, R0, #10 ADD R0, R0, #10 ADD R0, R0, #10 ADD R0, R0, #8 ; R0 is now 10#48 == '0' OUT HALT .END
13.090909
24
0.576389
4f7708e85211872ebd236571a8945ea9ac2be7c9
29
asm
Assembly
tests/inchexstr/8.asm
NullMember/customasm
6e34d6432583a41278e6b3596f1817ae82149531
[ "Apache-2.0" ]
414
2016-10-14T22:39:20.000Z
2022-03-30T07:52:44.000Z
tests/inchexstr/8.asm
NullMember/customasm
6e34d6432583a41278e6b3596f1817ae82149531
[ "Apache-2.0" ]
100
2018-03-22T16:12:24.000Z
2022-03-26T09:19:23.000Z
tests/inchexstr/8.asm
NullMember/customasm
6e34d6432583a41278e6b3596f1817ae82149531
[ "Apache-2.0" ]
47
2017-06-29T15:12:13.000Z
2022-03-10T04:50:51.000Z
#d inchexstr() ; error: wrong
29
29
0.689655
8ef5728ac3577b89fb7b7671b17c63762dee17d9
379
asm
Assembly
oeis/038/A038732.asm
neoneye/loda-programs
84790877f8e6c2e821b183d2e334d612045d29c0
[ "Apache-2.0" ]
11
2021-08-22T19:44:55.000Z
2022-03-20T16:47:57.000Z
oeis/038/A038732.asm
neoneye/loda-programs
84790877f8e6c2e821b183d2e334d612045d29c0
[ "Apache-2.0" ]
9
2021-08-29T13:15:54.000Z
2022-03-09T19:52:31.000Z
oeis/038/A038732.asm
neoneye/loda-programs
84790877f8e6c2e821b183d2e334d612045d29c0
[ "Apache-2.0" ]
3
2021-08-22T20:56:47.000Z
2021-09-29T06:26:12.000Z
; A038732: T(n,n-3), array T as in A038730. ; Submitted by Jamie Morken(w2) ; 1,8,38,141,455,1350,3805,10395,27875,73945,194961,512303,1343768,3521381,9223435,24152800,63239810,165572615,433485350,1134892290,2971202146,7778726798,20364993198,53316270346,139583838315 mov $1,1 lpb $0 mov $2,$3 add $2,$0 add $2,6 bin $2,$0 sub $0,1 add $1,$2 add $3,2 lpe mov $0,$1
23.6875
190
0.707124
c5c5292d3cffc95a18c25f3027a649091111df7d
327
asm
Assembly
programs/oeis/265/A265948.asm
karttu/loda
9c3b0fc57b810302220c044a9d17db733c76a598
[ "Apache-2.0" ]
1
2021-03-15T11:38:20.000Z
2021-03-15T11:38:20.000Z
programs/oeis/265/A265948.asm
karttu/loda
9c3b0fc57b810302220c044a9d17db733c76a598
[ "Apache-2.0" ]
null
null
null
programs/oeis/265/A265948.asm
karttu/loda
9c3b0fc57b810302220c044a9d17db733c76a598
[ "Apache-2.0" ]
null
null
null
; A265948: Numbers whose name in German contains the letter Ö (O with Umlaut). ; 12,112,212,312,412,512,612,712,812,912,1012,1112,1212,1312,1412,1512,1612,1712,1812,1912,2012,2112,2212,2312,2412,2512,2612,2712,2812,2912,3012,3112,3212,3312,3412,3512,3612,3712,3812,3912,4012,4112,4212,4312,4412 mov $1,$0 mul $1,100 add $1,12
46.714286
215
0.755352
74bf9b59fa8ff39aff33dd6501ea7de87e9d28a1
445
asm
Assembly
oeis/108/A108368.asm
neoneye/loda-programs
84790877f8e6c2e821b183d2e334d612045d29c0
[ "Apache-2.0" ]
11
2021-08-22T19:44:55.000Z
2022-03-20T16:47:57.000Z
oeis/108/A108368.asm
neoneye/loda-programs
84790877f8e6c2e821b183d2e334d612045d29c0
[ "Apache-2.0" ]
9
2021-08-29T13:15:54.000Z
2022-03-09T19:52:31.000Z
oeis/108/A108368.asm
neoneye/loda-programs
84790877f8e6c2e821b183d2e334d612045d29c0
[ "Apache-2.0" ]
3
2021-08-22T20:56:47.000Z
2021-09-29T06:26:12.000Z
; A108368: Coefficients of x/(1-3*x-3*x^2-x^3). ; Submitted by Jon Maiga ; 0,1,3,12,46,177,681,2620,10080,38781,149203,574032,2208486,8496757,32689761,125768040,483870160,1861604361,7162191603,27555258052,106013953326,407869825737,1569206595241,6037243216260,23227219260240,89362594024741,343806683071203 lpb $0 sub $0,1 add $1,1 add $3,$2 add $2,$3 mov $4,$3 mov $3,$2 add $4,$2 mov $2,$1 mov $1,$4 add $2,$3 lpe mov $0,$2
24.722222
231
0.705618
33959b3a0963e1880af51fdd715094be0a476740
328
asm
Assembly
22.asm
yuwanzeon/human-resource-machine-solutions
c95641bf409ed3419f7e71eafac0fcdabecb7204
[ "MIT" ]
1
2016-12-29T06:55:26.000Z
2016-12-29T06:55:26.000Z
22.asm
yuwanzeon/human-resource-machine-solutions
c95641bf409ed3419f7e71eafac0fcdabecb7204
[ "MIT" ]
null
null
null
22.asm
yuwanzeon/human-resource-machine-solutions
c95641bf409ed3419f7e71eafac0fcdabecb7204
[ "MIT" ]
null
null
null
-- HUMAN RESOURCE MACHINE PROGRAM -- BUMPUP 9 a: INBOX COPYTO 3 COPYFROM 9 COPYTO 0 COPYTO 1 OUTBOX b: c: COPYFROM 0 ADD 1 COPYTO 2 COPYFROM 1 COPYTO 0 OUTBOX COPYFROM 2 COPYTO 1 SUB 3 JUMPZ b JUMPN c JUMP a
12.148148
36
0.478659
e840edee388aa42ec1fc1da1d1a11fa2374e333e
5,513
asm
Assembly
Transynther/x86/_processed/NONE/_ht_st_zr_un_/i7-7700_9_0x48.log_21829_1075.asm
ljhsiun2/medusa
67d769b8a2fb42c538f10287abaf0e6dbb463f0c
[ "MIT" ]
9
2020-08-13T19:41:58.000Z
2022-03-30T12:22:51.000Z
Transynther/x86/_processed/NONE/_ht_st_zr_un_/i7-7700_9_0x48.log_21829_1075.asm
ljhsiun2/medusa
67d769b8a2fb42c538f10287abaf0e6dbb463f0c
[ "MIT" ]
1
2021-04-29T06:29:35.000Z
2021-05-13T21:02:30.000Z
Transynther/x86/_processed/NONE/_ht_st_zr_un_/i7-7700_9_0x48.log_21829_1075.asm
ljhsiun2/medusa
67d769b8a2fb42c538f10287abaf0e6dbb463f0c
[ "MIT" ]
3
2020-07-14T17:07:07.000Z
2022-03-21T01:12:22.000Z
.global s_prepare_buffers s_prepare_buffers: push %r13 push %r14 push %r15 push %r8 push %r9 push %rbp push %rcx push %rdi push %rsi lea addresses_D_ht+0x11e3f, %r8 sub %r9, %r9 movl $0x61626364, (%r8) nop and $20063, %r8 lea addresses_WT_ht+0x561f, %r15 nop xor %r9, %r9 movb $0x61, (%r15) nop nop nop nop and $30108, %r8 lea addresses_UC_ht+0x1c43f, %rsi nop nop nop and $26367, %r8 movl $0x61626364, (%rsi) nop xor %r13, %r13 lea addresses_D_ht+0x1bf, %r9 nop nop nop nop nop inc %r14 mov $0x6162636465666768, %rbp movq %rbp, %xmm5 and $0xffffffffffffffc0, %r9 movaps %xmm5, (%r9) xor $2278, %r14 lea addresses_D_ht+0x13c7f, %rsi lea addresses_WT_ht+0x1eb97, %rdi nop nop nop nop nop add %r14, %r14 mov $103, %rcx rep movsb nop nop xor $12750, %r15 pop %rsi pop %rdi pop %rcx pop %rbp pop %r9 pop %r8 pop %r15 pop %r14 pop %r13 ret .global s_faulty_load s_faulty_load: push %r11 push %r13 push %r8 push %rbp push %rcx push %rdi push %rdx // Store lea addresses_D+0x14a3f, %rdi cmp $9079, %r8 mov $0x5152535455565758, %r13 movq %r13, %xmm6 movaps %xmm6, (%rdi) nop nop cmp $21743, %r13 // Faulty Load lea addresses_UC+0x93bf, %rcx nop nop xor $50722, %r11 mov (%rcx), %ebp lea oracles, %r8 and $0xff, %rbp shlq $12, %rbp mov (%r8,%rbp,1), %rbp pop %rdx pop %rdi pop %rcx pop %rbp pop %r8 pop %r13 pop %r11 ret /* <gen_faulty_load> [REF] {'OP': 'LOAD', 'src': {'type': 'addresses_UC', 'AVXalign': False, 'congruent': 0, 'size': 2, 'same': False, 'NT': False}} {'OP': 'STOR', 'dst': {'type': 'addresses_D', 'AVXalign': True, 'congruent': 6, 'size': 16, 'same': False, 'NT': True}} [Faulty Load] {'OP': 'LOAD', 'src': {'type': 'addresses_UC', 'AVXalign': False, 'congruent': 0, 'size': 4, 'same': True, 'NT': False}} <gen_prepare_buffer> {'OP': 'STOR', 'dst': {'type': 'addresses_D_ht', 'AVXalign': False, 'congruent': 7, 'size': 4, 'same': False, 'NT': False}} {'OP': 'STOR', 'dst': {'type': 'addresses_WT_ht', 'AVXalign': False, 'congruent': 2, 'size': 1, 'same': False, 'NT': False}} {'OP': 'STOR', 'dst': {'type': 'addresses_UC_ht', 'AVXalign': False, 'congruent': 7, 'size': 4, 'same': False, 'NT': False}} {'OP': 'STOR', 'dst': {'type': 'addresses_D_ht', 'AVXalign': True, 'congruent': 9, 'size': 16, 'same': False, 'NT': False}} {'OP': 'REPM', 'src': {'type': 'addresses_D_ht', 'congruent': 6, 'same': False}, 'dst': {'type': 'addresses_WT_ht', 'congruent': 1, 'same': False}} {'53': 270, 'ae': 1, '79': 20, 'ff': 11139, 'f0': 242, '00': 134, '3c': 1, '01': 6415, '10': 169, '5f': 5, '46': 3433} 00 ff 46 ff ff 10 ff 01 ff 01 46 ff ff 01 ff 01 46 ff ff 46 ff 01 ff 01 ff 01 ff 01 ff 01 ff 01 ff 01 ff 01 46 ff 53 ff ff 01 ff 01 ff 01 46 ff ff 01 46 ff ff ff 01 ff 01 ff 01 ff 46 ff 01 46 ff ff 01 ff 46 ff 46 ff 01 ff 01 ff 01 ff 01 ff 01 46 ff ff 46 ff ff 01 ff 01 46 ff ff ff f0 46 53 ff ff 01 ff 46 ff 01 46 ff 46 46 ff ff ff 01 ff ff 01 ff ff 01 ff 01 ff 01 ff 01 ff 01 ff 01 ff 01 ff 01 ff 01 ff 01 ff 01 46 ff ff 01 ff 01 ff 01 ff 01 ff 01 ff 01 ff 01 ff 01 ff 01 46 ff ff 01 ff 01 ff ff 01 46 ff ff 01 ff 01 ff 01 ff 01 46 ff 46 ff ff 01 46 ff ff ff 01 ff 01 ff 01 46 ff ff ff 01 46 46 ff ff 53 ff 46 46 ff ff 46 ff 46 ff ff 46 ff 01 ff ff 46 ff f0 ff 01 46 ff ff 01 ff 01 ff 01 46 ff ff 01 ff 01 ff 46 ff ff ff 01 ff 01 ff 01 46 ff ff 01 ff 46 ff ff 46 ff 01 ff 01 ff 01 ff 01 46 ff 46 ff ff 01 ff 01 ff 46 ff ff 01 ff 46 ff 01 46 46 46 ff ff ff ff 46 ff 01 ff 01 ff 01 ff ff 01 ff 01 ff 01 46 ff ff ff ff 01 ff 01 ff 01 46 46 ff ff 46 ff ff 01 ff 01 ff 10 46 46 ff ff ff 01 ff 46 46 ff 46 ff 46 ff ff 01 ff 46 46 46 46 ff 46 ff ff ff 46 ff ff 01 ff 01 ff 01 ff 01 ff 01 ff 01 46 ff ff 01 53 ff 00 ff 01 46 ff ff ff ff 01 ff 01 ff 01 ff 01 ff 01 ff 01 ff 01 ff 01 ff 01 ff 01 46 46 ff 46 ff 46 ff ff ff 01 ff 01 ff 46 46 46 46 ff 46 46 46 ff ff 53 ff ff ff 46 ff ff 01 ff 01 ff 01 ff 01 ff 01 46 ff ff 46 ff ff 46 46 ff ff 01 ff 01 ff 01 ff 01 ff 01 ff f0 ff 01 46 ff ff 01 ff 01 ff 01 46 46 46 ff ff 46 ff ff 46 ff ff 01 ff 01 ff 01 ff 01 46 ff ff 01 ff ff 01 ff 01 ff 01 ff 01 46 ff ff 01 ff 01 46 ff 46 ff 53 ff 46 ff ff 01 ff ff 01 46 ff ff f0 53 46 ff ff ff 01 ff 01 ff ff 01 ff 01 ff 01 46 ff 01 ff 01 46 ff ff 01 ff 01 ff 01 46 ff ff 01 46 ff ff 46 ff 01 ff 01 46 ff ff ff 01 ff f0 ff 01 ff 01 46 ff ff 01 ff 01 46 ff ff 01 ff 01 ff 01 ff 01 ff 01 ff 01 ff 01 46 ff ff 01 46 ff ff 01 ff 01 ff 01 ff 01 46 ff ff 01 ff 01 ff 01 ff 46 ff 01 ff ff 01 ff ff 01 46 ff 01 46 46 00 46 ff ff ff 01 46 46 ff ff ff 01 ff 01 ff 01 ff 01 53 46 ff ff ff ff 01 ff ff 01 ff 01 46 46 ff ff 01 46 ff 46 ff ff 01 ff 01 ff 01 ff 01 46 46 ff ff ff 01 ff 01 ff 01 ff 01 ff 01 ff 01 ff ff 01 ff 10 ff 01 ff 01 ff f0 ff 01 ff 01 ff 01 ff 01 ff 01 ff 01 ff 10 ff ff 01 ff 01 ff 01 ff 01 ff ff 01 ff 01 46 53 ff ff 01 ff 01 ff 01 ff 01 ff 01 ff f0 ff 01 ff 01 ff 01 46 ff ff 01 ff 01 ff 46 ff 01 46 ff ff 01 ff ff 01 ff 01 ff 01 ff ff 01 ff 01 ff 01 ff 01 46 46 ff ff ff 01 ff 01 ff 01 ff 01 ff 01 46 ff 53 ff ff 01 ff 01 ff 01 ff 01 ff 46 ff 01 ff 01 46 46 ff ff ff 01 ff 01 ff 01 ff 01 ff 01 ff 46 ff 01 ff 01 ff ff 01 ff 01 46 ff ff 01 ff 01 ff 01 ff ff ff 53 ff 01 46 ff 46 ff 01 ff 01 ff 46 ff 01 ff 01 ff 01 46 ff ff 46 ff 01 ff f0 ff 01 ff 01 ff f0 46 ff 01 ff 01 ff 01 ff 46 46 46 ff ff ff 01 ff 01 46 46 46 ff 01 ff ff 46 ff 46 ff ff ff 01 46 ff ff 01 ff ff 01 46 ff ff 01 46 ff ff 01 ff 46 ff 01 ff 01 ff 01 ff 01 46 ff 46 ff 53 ff ff f0 46 ff 46 53 46 ff 46 46 ff ff ff 46 ff ff 01 46 46 ff ff ff 46 46 ff ff ff 46 ff 01 46 ff ff ff 01 46 ff 46 ff ff 01 ff 01 ff ff 01 ff 01 ff 01 46 ff 01 ff 01 */
44.104
2,999
0.654272
7e7e2142bd1547d1292e6b671a0fb4c48d8462f7
6,212
asm
Assembly
Transynther/x86/_processed/NONE/_xt_/i3-7100_9_0x84_notsx.log_21829_1038.asm
ljhsiun2/medusa
67d769b8a2fb42c538f10287abaf0e6dbb463f0c
[ "MIT" ]
9
2020-08-13T19:41:58.000Z
2022-03-30T12:22:51.000Z
Transynther/x86/_processed/NONE/_xt_/i3-7100_9_0x84_notsx.log_21829_1038.asm
ljhsiun2/medusa
67d769b8a2fb42c538f10287abaf0e6dbb463f0c
[ "MIT" ]
1
2021-04-29T06:29:35.000Z
2021-05-13T21:02:30.000Z
Transynther/x86/_processed/NONE/_xt_/i3-7100_9_0x84_notsx.log_21829_1038.asm
ljhsiun2/medusa
67d769b8a2fb42c538f10287abaf0e6dbb463f0c
[ "MIT" ]
3
2020-07-14T17:07:07.000Z
2022-03-21T01:12:22.000Z
.global s_prepare_buffers s_prepare_buffers: push %r10 push %r11 push %r15 push %r8 push %r9 push %rax push %rcx push %rdi push %rsi lea addresses_A_ht+0x7048, %r8 add %r9, %r9 movb (%r8), %r10b nop nop nop nop nop and $58720, %rax lea addresses_A_ht+0x165ae, %r15 nop nop nop nop nop add %rsi, %rsi movw $0x6162, (%r15) dec %r8 lea addresses_WC_ht+0x6748, %r11 nop nop xor $1333, %rsi mov $0x6162636465666768, %r15 movq %r15, (%r11) sub $29624, %r9 lea addresses_WT_ht+0xe448, %rsi lea addresses_D_ht+0xd94, %rdi sub %rax, %rax mov $113, %rcx rep movsb nop nop and $34883, %r8 lea addresses_D_ht+0xa448, %rsi lea addresses_normal_ht+0x10a48, %rdi nop nop nop nop sub %r15, %r15 mov $109, %rcx rep movsq nop dec %r15 lea addresses_normal_ht+0xb248, %rsi lea addresses_A_ht+0x189c8, %rdi nop nop nop nop inc %r9 mov $116, %rcx rep movsq nop nop inc %r15 lea addresses_WT_ht+0xcda8, %rsi lea addresses_D_ht+0x13b30, %rdi nop nop nop nop nop add $12775, %r10 mov $23, %rcx rep movsq nop add $25144, %r15 lea addresses_WC_ht+0x16348, %r10 nop dec %r11 mov (%r10), %eax nop nop nop nop inc %r11 pop %rsi pop %rdi pop %rcx pop %rax pop %r9 pop %r8 pop %r15 pop %r11 pop %r10 ret .global s_faulty_load s_faulty_load: push %r12 push %r13 push %r8 push %r9 push %rbp push %rcx push %rsi // Load lea addresses_WC+0x1c7c8, %rbp nop nop nop sub $8826, %r13 vmovups (%rbp), %ymm6 vextracti128 $1, %ymm6, %xmm6 vpextrq $0, %xmm6, %rcx nop nop nop add %r12, %r12 // Faulty Load lea addresses_D+0x13c48, %rbp nop nop inc %r8 movb (%rbp), %r9b lea oracles, %rbp and $0xff, %r9 shlq $12, %r9 mov (%rbp,%r9,1), %r9 pop %rsi pop %rcx pop %rbp pop %r9 pop %r8 pop %r13 pop %r12 ret /* <gen_faulty_load> [REF] {'src': {'type': 'addresses_D', 'same': False, 'size': 16, 'congruent': 0, 'NT': False, 'AVXalign': False}, 'OP': 'LOAD'} {'src': {'type': 'addresses_WC', 'same': False, 'size': 32, 'congruent': 7, 'NT': False, 'AVXalign': False}, 'OP': 'LOAD'} [Faulty Load] {'src': {'type': 'addresses_D', 'same': True, 'size': 1, 'congruent': 0, 'NT': False, 'AVXalign': False}, 'OP': 'LOAD'} <gen_prepare_buffer> {'src': {'type': 'addresses_A_ht', 'same': False, 'size': 1, 'congruent': 10, 'NT': False, 'AVXalign': False}, 'OP': 'LOAD'} {'dst': {'type': 'addresses_A_ht', 'same': False, 'size': 2, 'congruent': 1, 'NT': False, 'AVXalign': False}, 'OP': 'STOR'} {'dst': {'type': 'addresses_WC_ht', 'same': False, 'size': 8, 'congruent': 7, 'NT': False, 'AVXalign': False}, 'OP': 'STOR'} {'src': {'type': 'addresses_WT_ht', 'congruent': 11, 'same': False}, 'dst': {'type': 'addresses_D_ht', 'congruent': 2, 'same': False}, 'OP': 'REPM'} {'src': {'type': 'addresses_D_ht', 'congruent': 10, 'same': False}, 'dst': {'type': 'addresses_normal_ht', 'congruent': 9, 'same': False}, 'OP': 'REPM'} {'src': {'type': 'addresses_normal_ht', 'congruent': 7, 'same': False}, 'dst': {'type': 'addresses_A_ht', 'congruent': 6, 'same': False}, 'OP': 'REPM'} {'src': {'type': 'addresses_WT_ht', 'congruent': 4, 'same': True}, 'dst': {'type': 'addresses_D_ht', 'congruent': 0, 'same': False}, 'OP': 'REPM'} {'src': {'type': 'addresses_WC_ht', 'same': False, 'size': 4, 'congruent': 8, 'NT': True, 'AVXalign': False}, 'OP': 'LOAD'} {'36': 21829} 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 */
38.345679
2,999
0.658886
3fcd2c9559dd70cfd54b6863304b574c11ab7c14
1,412
asm
Assembly
Transynther/x86/_processed/NONE/_zr_/i7-7700_9_0xca.log_30_1035.asm
ljhsiun2/medusa
67d769b8a2fb42c538f10287abaf0e6dbb463f0c
[ "MIT" ]
9
2020-08-13T19:41:58.000Z
2022-03-30T12:22:51.000Z
Transynther/x86/_processed/NONE/_zr_/i7-7700_9_0xca.log_30_1035.asm
ljhsiun2/medusa
67d769b8a2fb42c538f10287abaf0e6dbb463f0c
[ "MIT" ]
1
2021-04-29T06:29:35.000Z
2021-05-13T21:02:30.000Z
Transynther/x86/_processed/NONE/_zr_/i7-7700_9_0xca.log_30_1035.asm
ljhsiun2/medusa
67d769b8a2fb42c538f10287abaf0e6dbb463f0c
[ "MIT" ]
3
2020-07-14T17:07:07.000Z
2022-03-21T01:12:22.000Z
.global s_prepare_buffers s_prepare_buffers: push %r12 push %r14 push %r15 push %r9 push %rbp push %rsi lea addresses_normal_ht+0xde1e, %r14 clflush (%r14) nop nop nop nop dec %r12 mov (%r14), %rbp nop and %r15, %r15 lea addresses_D_ht+0x126ce, %rsi clflush (%rsi) nop nop nop cmp $29752, %r15 mov (%rsi), %r9w nop nop nop cmp $21207, %r14 pop %rsi pop %rbp pop %r9 pop %r15 pop %r14 pop %r12 ret .global s_faulty_load s_faulty_load: push %r11 push %rcx push %rdi push %rdx push %rsi // Faulty Load lea addresses_UC+0x15d8e, %rcx and %r11, %r11 vmovups (%rcx), %ymm2 vextracti128 $0, %ymm2, %xmm2 vpextrq $0, %xmm2, %rsi lea oracles, %r11 and $0xff, %rsi shlq $12, %rsi mov (%r11,%rsi,1), %rsi pop %rsi pop %rdx pop %rdi pop %rcx pop %r11 ret /* <gen_faulty_load> [REF] {'src': {'congruent': 0, 'AVXalign': False, 'same': False, 'size': 4, 'NT': False, 'type': 'addresses_UC'}, 'OP': 'LOAD'} [Faulty Load] {'src': {'congruent': 0, 'AVXalign': False, 'same': True, 'size': 32, 'NT': False, 'type': 'addresses_UC'}, 'OP': 'LOAD'} <gen_prepare_buffer> {'src': {'congruent': 3, 'AVXalign': True, 'same': False, 'size': 8, 'NT': False, 'type': 'addresses_normal_ht'}, 'OP': 'LOAD'} {'src': {'congruent': 3, 'AVXalign': False, 'same': False, 'size': 2, 'NT': False, 'type': 'addresses_D_ht'}, 'OP': 'LOAD'} {'00': 30} 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 */
18.826667
127
0.650142
55cf1f72aced63bff9089fd874d36ecf1e8ffbca
991
asm
Assembly
seminar1/boot.asm
JakobBerggren/kth-ID1206
f43b8257e6bcf1995fd124eadcd497f4b3583160
[ "Apache-2.0" ]
null
null
null
seminar1/boot.asm
JakobBerggren/kth-ID1206
f43b8257e6bcf1995fd124eadcd497f4b3583160
[ "Apache-2.0" ]
null
null
null
seminar1/boot.asm
JakobBerggren/kth-ID1206
f43b8257e6bcf1995fd124eadcd497f4b3583160
[ "Apache-2.0" ]
1
2020-12-02T09:28:45.000Z
2020-12-02T09:28:45.000Z
bits 16 start: mov ax, 0x07C0 ; 0x07c00 is where we are add ax, 0x20 ; add 0x20 (when shifted 512) mov ss, ax ; set the stack segment mov sp, 0x1000 ; set the stack pointer mov ax, 0x07c0 ; set data segment... mov ds, ax ; more about this later mov si, msg ; pointer to the message in SI mov ah, 0x0E ; print char BIOS procedure .next: lodsb ; next byte to AL, increment SI cmp al, 0 ; if the byte is zero je .done ; jump do done int 0x10 ; invoke the BIOS system call jmp .next ; loop .done: jmp $ ; loop forever msg: db 'SEND NUDES', 0 ; the string we want to print times 510-($-$$) db 0 ; fill dw 0xAA55 ; master boot record signature
35.392857
63
0.454087
d971a226a376cae2d08b21e12d1c462273571a00
547
asm
Assembly
oeis/286/A286051.asm
neoneye/loda-programs
84790877f8e6c2e821b183d2e334d612045d29c0
[ "Apache-2.0" ]
11
2021-08-22T19:44:55.000Z
2022-03-20T16:47:57.000Z
oeis/286/A286051.asm
neoneye/loda-programs
84790877f8e6c2e821b183d2e334d612045d29c0
[ "Apache-2.0" ]
9
2021-08-29T13:15:54.000Z
2022-03-09T19:52:31.000Z
oeis/286/A286051.asm
neoneye/loda-programs
84790877f8e6c2e821b183d2e334d612045d29c0
[ "Apache-2.0" ]
3
2021-08-22T20:56:47.000Z
2021-09-29T06:26:12.000Z
; A286051: Positions of 1 in A286049; complement of A286050. ; Submitted by Christian Krause ; 2,3,6,8,10,11,14,16,18,19,22,24,26,28,29,32,34,35,38,40,42,43,46,48,50,51,54,56,57,60,62,64,66,67,70,72,74,75,78,80,82,83,86,88,90,92,93,96,98,99,102,104,106,108,109,112,114,116,117,120,122,124,125,128,130,131,134,136,138,139,142,144,146,147,150,152,154,156,157,160,162,163,166,168,170,171,174,176,178,179,182,184,185,188,190,192,194,195,198,200 mul $0,2 mov $1,$0 seq $1,286044 ; {011->0}-transform of the Thue-Morse word A010060. sub $0,$1 add $0,2
54.7
347
0.707495
f9eeb213e1b3150625d75f0d00c52550546ea1a7
614
asm
Assembly
uti/clwsp.asm
olifink/smsqe
c546d882b26566a46d71820d1539bed9ea8af108
[ "BSD-2-Clause" ]
null
null
null
uti/clwsp.asm
olifink/smsqe
c546d882b26566a46d71820d1539bed9ea8af108
[ "BSD-2-Clause" ]
null
null
null
uti/clwsp.asm
olifink/smsqe
c546d882b26566a46d71820d1539bed9ea8af108
[ "BSD-2-Clause" ]
null
null
null
; Clear workspace of current job section utility xdef ut_clwsp ;+++ ; Clear workspace of current job and set main pointer to it. ; ; Entry Exit ; a4 base of data area rel (a6) smashed ; a6 base of job absolute pointer to data area ;--- ut_clwsp lea (a6,a4.l),a6 ; main pointer move.l a6,a4 ; clear workspace ... clr_wspc clr.w (a4)+ cmp.l a4,a7 ; job's stack reached? bgt.s clr_wspc rts end
26.695652
77
0.456026
027305374faf82651c1ca52d218afde537960c22
2,302
asm
Assembly
programs/oeis/100/A100150.asm
jmorken/loda
99c09d2641e858b074f6344a352d13bc55601571
[ "Apache-2.0" ]
1
2021-03-15T11:38:20.000Z
2021-03-15T11:38:20.000Z
programs/oeis/100/A100150.asm
jmorken/loda
99c09d2641e858b074f6344a352d13bc55601571
[ "Apache-2.0" ]
null
null
null
programs/oeis/100/A100150.asm
jmorken/loda
99c09d2641e858b074f6344a352d13bc55601571
[ "Apache-2.0" ]
null
null
null
; A100150: Structured snub cubic numbers. ; 1,24,107,288,605,1096,1799,2752,3993,5560,7491,9824,12597,15848,19615,23936,28849,34392,40603,47520,55181,63624,72887,83008,94025,105976,118899,132832,147813,163880,181071,199424,218977,239768,261835,285216,309949,336072,363623,392640,423161,455224,488867,524128,561045,599656,639999,682112,726033,771800,819451,869024,920557,974088,1029655,1087296,1147049,1208952,1273043,1339360,1407941,1478824,1552047,1627648,1705665,1786136,1869099,1954592,2042653,2133320,2226631,2322624,2421337,2522808,2627075,2734176,2844149,2957032,3072863,3191680,3313521,3438424,3566427,3697568,3831885,3969416,4110199,4254272,4401673,4552440,4706611,4864224,5025317,5189928,5358095,5529856,5705249,5884312,6067083,6253600,6443901,6638024,6836007,7037888,7243705,7453496,7667299,7885152,8107093,8333160,8563391,8797824,9036497,9279448,9526715,9778336,10034349,10294792,10559703,10829120,11103081,11381624,11664787,11952608,12245125,12542376,12844399,13151232,13462913,13779480,14100971,14427424,14758877,15095368,15436935,15783616,16135449,16492472,16854723,17222240,17595061,17973224,18356767,18745728,19140145,19540056,19945499,20356512,20773133,21195400,21623351,22057024,22496457,22941688,23392755,23849696,24312549,24781352,25256143,25736960,26223841,26716824,27215947,27721248,28232765,28750536,29274599,29804992,30341753,30884920,31434531,31990624,32553237,33122408,33698175,34280576,34869649,35465432,36067963,36677280,37293421,37916424,38546327,39183168,39826985,40477816,41135699,41800672,42472773,43152040,43838511,44532224,45233217,45941528,46657195,47380256,48110749,48848712,49594183,50347200,51107801,51876024,52651907,53435488,54226805,55025896,55832799,56647552,57470193,58300760,59139291,59985824,60840397,61703048,62573815,63452736,64339849,65235192,66138803,67050720,67970981,68899624,69836687,70782208,71736225,72698776,73669899,74649632,75638013,76635080,77640871,78655424,79678777,80710968,81752035,82802016,83860949,84928872,86005823,87091840,88186961,89291224,90404667,91527328,92659245,93800456,94950999,96110912,97280233,98459000 mov $1,8 mov $2,$0 mov $4,$0 mul $0,2 mov $5,3 lpb $2 add $5,$3 lpb $5 add $1,$0 sub $5,1 lpe add $0,1 add $1,1 sub $2,1 mov $3,3 add $3,$0 mov $5,4 lpe lpb $4 add $1,16 sub $4,1 lpe sub $1,7
85.259259
2,036
0.836229
dd23c6d56a69912f047b176b026aadcc834d0c69
501
asm
Assembly
oeis/186/A186682.asm
neoneye/loda-programs
84790877f8e6c2e821b183d2e334d612045d29c0
[ "Apache-2.0" ]
11
2021-08-22T19:44:55.000Z
2022-03-20T16:47:57.000Z
oeis/186/A186682.asm
neoneye/loda-programs
84790877f8e6c2e821b183d2e334d612045d29c0
[ "Apache-2.0" ]
9
2021-08-29T13:15:54.000Z
2022-03-09T19:52:31.000Z
oeis/186/A186682.asm
neoneye/loda-programs
84790877f8e6c2e821b183d2e334d612045d29c0
[ "Apache-2.0" ]
3
2021-08-22T20:56:47.000Z
2021-09-29T06:26:12.000Z
; A186682: Total number of positive integers below 10^n requiring 18 positive biquadrates in their representation as sum of biquadrates. ; 0,2,19,24,24,24,24,24,24,24,24,24,24,24,24,24,24,24,24,24,24,24,24,24,24,24,24,24,24,24,24,24,24,24,24,24,24,24,24,24,24,24,24,24,24,24,24,24,24,24,24,24,24,24,24,24,24,24,24,24,24,24,24,24,24 mov $3,$0 mov $6,$0 lpb $3 mov $0,$6 sub $3,1 sub $0,$3 mov $2,$0 mul $0,3 pow $2,2 mov $5,$0 add $5,1 bin $5,$2 div $5,2 add $4,$5 lpe mov $0,$4
25.05
194
0.634731
cb39d7c56cf37e96e4cd576d8cd54e339ccbde03
650
asm
Assembly
cards/bn5/ModCards/136-A043 GyroMan.asm
RockmanEXEZone/MMBN-Mod-Card-Kit
d591ddca5566dbb323dc19c11e69410fa4073d1b
[ "Unlicense" ]
10
2017-12-05T14:25:38.000Z
2022-02-21T04:28:00.000Z
cards/bn5/ModCards/136-A043 GyroMan.asm
RockmanEXEZone/MMBN-Mod-Card-Kit
d591ddca5566dbb323dc19c11e69410fa4073d1b
[ "Unlicense" ]
null
null
null
cards/bn5/ModCards/136-A043 GyroMan.asm
RockmanEXEZone/MMBN-Mod-Card-Kit
d591ddca5566dbb323dc19c11e69410fa4073d1b
[ "Unlicense" ]
null
null
null
.include "defaults_mod.asm" table_file_jp equ "exe5-utf8.tbl" table_file_en equ "bn5-utf8.tbl" game_code_len equ 3 game_code equ 0x4252424A // BRBJ game_code_2 equ 0x42524245 // BRBE game_code_3 equ 0x42524250 // BRBP card_type equ 1 card_id equ 43 card_no equ "043" card_sub equ "Mod Card 043" card_sub_x equ 64 card_desc_len equ 2 card_desc_1 equ "GyroMan" card_desc_2 equ "45MB" card_desc_3 equ "" card_name_jp_full equ "ジャイロマン" card_name_jp_game equ "ジャイロマン" card_name_en_full equ "GyroMan" card_name_en_game equ "GyroMan" card_address equ "" card_address_id equ 0 card_bug equ 0 card_wrote_en equ "" card_wrote_jp equ ""
24.074074
35
0.772308
38c88dd9274a06dd66ce9f92f1266b2bb9c1d824
606
asm
Assembly
PIC/naive_multiplication.asm
StxGuy/EmbeddedSystems
6d9bc8b295724d361ea1d82e701e6530f74e2300
[ "MIT" ]
null
null
null
PIC/naive_multiplication.asm
StxGuy/EmbeddedSystems
6d9bc8b295724d361ea1d82e701e6530f74e2300
[ "MIT" ]
null
null
null
PIC/naive_multiplication.asm
StxGuy/EmbeddedSystems
6d9bc8b295724d361ea1d82e701e6530f74e2300
[ "MIT" ]
null
null
null
;------------------------------; ; NAIVE MULTIPLICATION FOR PIC ; ; ; ; Por: Prof. Carlo Requiao ; ; 12/Ago/2020 ; ;------------------------------; list p = 16f877a ; Specify processor include <p16f877a.inc> ; Include mapping org 0x00 ; Program starts at 0x00 goto INICIO cnt equ 0x20 base equ 0x21 dest equ 0x22 INICIO: banksel 0x00 ; Select Bank #0 movlw 0x05 ; cnt = 5 movwf cnt movlw 0x03 ; base = 3 movwf base clrf dest ; dest = 0 LOOP: movf base,0 ; dest += base addwf dest,1 decfsz cnt goto LOOP END
19.548387
42
0.523102
f755795368f6060306ec44167eb04a1bb1c3ee62
655
asm
Assembly
oeis/051/A051170.asm
neoneye/loda-programs
84790877f8e6c2e821b183d2e334d612045d29c0
[ "Apache-2.0" ]
11
2021-08-22T19:44:55.000Z
2022-03-20T16:47:57.000Z
oeis/051/A051170.asm
neoneye/loda-programs
84790877f8e6c2e821b183d2e334d612045d29c0
[ "Apache-2.0" ]
9
2021-08-29T13:15:54.000Z
2022-03-09T19:52:31.000Z
oeis/051/A051170.asm
neoneye/loda-programs
84790877f8e6c2e821b183d2e334d612045d29c0
[ "Apache-2.0" ]
3
2021-08-22T20:56:47.000Z
2021-09-29T06:26:12.000Z
; A051170: T(n,5), array T as in A051168; a count of Lyndon words; aperiodic necklaces with 5 black beads and n-5 white beads. ; 0,1,3,7,14,25,42,66,99,143,200,273,364,476,612,775,969,1197,1463,1771,2125,2530,2990,3510,4095,4750,5481,6293,7192,8184,9275,10472,11781,13209,14763,16450,18278,20254,22386,24682,27150,29799,32637,35673,38916,42375,46060,49980,54145,58565,63250,68211,73458,79002,84854,91025,97527,104371,111569,119133,127075,135408,144144,153296,162877,172900,183379,194327,205758,217686,230125,243090,256595,270655,285285,300500,316316,332748,349812,367524,385900,404957,424711,445179,466378,488325,511038,534534 add $0,4 bin $0,4 div $0,5
93.571429
499
0.792366
b1e9a2ad122209677b7e0cea3f8f99071dde01d5
464
asm
Assembly
programs/oeis/247/A247618.asm
karttu/loda
9c3b0fc57b810302220c044a9d17db733c76a598
[ "Apache-2.0" ]
1
2021-03-15T11:38:20.000Z
2021-03-15T11:38:20.000Z
programs/oeis/247/A247618.asm
karttu/loda
9c3b0fc57b810302220c044a9d17db733c76a598
[ "Apache-2.0" ]
null
null
null
programs/oeis/247/A247618.asm
karttu/loda
9c3b0fc57b810302220c044a9d17db733c76a598
[ "Apache-2.0" ]
null
null
null
; A247618: Start with a single square; at n-th generation add a square at each expandable vertex; a(n) is the sum of all label values at n-th generation. (See comment for construction rules.) ; 1,5,17,45,105,229,481,989,2009,4053,8145,16333,32713,65477,131009,262077,524217,1048501,2097073,4194221,8388521,16777125,33554337,67108765,134217625,268435349,536870801,1073741709,2147483529,4294967173,8589934465 add $0,1 mov $1,2 pow $1,$0 sub $1,$0 mul $1,4 sub $1,3
46.4
214
0.773707
cd066437a92e5c721b77b9e73cc397e14b4d1ff3
667
asm
Assembly
oeis/020/A020847.asm
neoneye/loda-programs
84790877f8e6c2e821b183d2e334d612045d29c0
[ "Apache-2.0" ]
11
2021-08-22T19:44:55.000Z
2022-03-20T16:47:57.000Z
oeis/020/A020847.asm
neoneye/loda-programs
84790877f8e6c2e821b183d2e334d612045d29c0
[ "Apache-2.0" ]
9
2021-08-29T13:15:54.000Z
2022-03-09T19:52:31.000Z
oeis/020/A020847.asm
neoneye/loda-programs
84790877f8e6c2e821b183d2e334d612045d29c0
[ "Apache-2.0" ]
3
2021-08-22T20:56:47.000Z
2021-09-29T06:26:12.000Z
; A020847: Decimal expansion of 1/sqrt(90) = sqrt(10)/30. ; Submitted by Jamie Morken(s1) ; 1,0,5,4,0,9,2,5,5,3,3,8,9,4,5,9,7,7,7,3,3,2,9,6,4,5,1,4,8,1,0,9,0,6,1,7,7,9,0,6,5,1,8,3,7,9,7,7,5,0,7,2,2,7,5,6,1,9,1,6,8,2,8,4,2,6,4,1,9,8,1,4,6,2,1,3,0,7,9,4,0,7,1,1,4,7,4,9,3,6,9,4,5,9,7,6,6,7,6,5 mov $1,1 mov $2,1 mov $3,$0 add $3,8 mov $4,$0 add $4,2 mul $4,2 mov $7,10 pow $7,$4 mov $9,10 lpb $3 mov $4,$2 pow $4,2 mul $4,40 mov $5,$1 pow $5,2 add $4,$5 mov $6,$1 mov $1,$4 mul $6,$2 mul $6,2 mov $2,$6 mov $8,$4 div $8,$7 max $8,2 div $1,$8 div $2,$8 sub $3,2 lpe div $1,6 mov $3,$9 pow $3,$0 div $2,$3 div $1,$2 mod $1,$9 mov $0,$1
16.268293
201
0.515742
3f3efbca95fc52e684a6a21d4a18090cc3f8f6af
7,268
asm
Assembly
Transynther/x86/_processed/NONE/_xt_/i3-7100_9_0x84_notsx.log_21829_1880.asm
ljhsiun2/medusa
67d769b8a2fb42c538f10287abaf0e6dbb463f0c
[ "MIT" ]
9
2020-08-13T19:41:58.000Z
2022-03-30T12:22:51.000Z
Transynther/x86/_processed/NONE/_xt_/i3-7100_9_0x84_notsx.log_21829_1880.asm
ljhsiun2/medusa
67d769b8a2fb42c538f10287abaf0e6dbb463f0c
[ "MIT" ]
1
2021-04-29T06:29:35.000Z
2021-05-13T21:02:30.000Z
Transynther/x86/_processed/NONE/_xt_/i3-7100_9_0x84_notsx.log_21829_1880.asm
ljhsiun2/medusa
67d769b8a2fb42c538f10287abaf0e6dbb463f0c
[ "MIT" ]
3
2020-07-14T17:07:07.000Z
2022-03-21T01:12:22.000Z
.global s_prepare_buffers s_prepare_buffers: push %r13 push %r15 push %r9 push %rbp push %rcx push %rdi push %rdx push %rsi lea addresses_D_ht+0x18e5, %rdx nop nop nop nop nop and %r9, %r9 movl $0x61626364, (%rdx) nop nop nop nop inc %r15 lea addresses_WT_ht+0x17d21, %rbp nop nop nop and $45390, %r9 mov $0x6162636465666768, %r13 movq %r13, %xmm4 movups %xmm4, (%rbp) nop nop nop inc %r13 lea addresses_A_ht+0x1e0e5, %r15 nop nop nop cmp $51325, %rsi mov $0x6162636465666768, %rdx movq %rdx, %xmm5 vmovups %ymm5, (%r15) nop nop nop nop add $9820, %r13 lea addresses_WC_ht+0x76e5, %rdx nop nop dec %r9 mov (%rdx), %ebp nop nop add %rdi, %rdi lea addresses_D_ht+0x14d19, %r13 add $39899, %r15 mov $0x6162636465666768, %rsi movq %rsi, %xmm2 vmovups %ymm2, (%r13) nop nop sub %r13, %r13 lea addresses_WT_ht+0x1175, %rsi lea addresses_A_ht+0x3ff6, %rdi nop nop nop nop nop xor $59847, %r9 mov $8, %rcx rep movsw nop nop nop nop nop add $60130, %r15 lea addresses_WT_ht+0xd6e5, %rcx nop nop nop xor %rbp, %rbp movb (%rcx), %r15b nop nop and %r13, %r13 lea addresses_UC_ht+0x119dd, %r15 and %rbp, %rbp mov (%r15), %r9w nop nop nop nop nop xor %r15, %r15 lea addresses_WC_ht+0x181a3, %rsi lea addresses_D_ht+0x4875, %rdi cmp $37895, %r13 mov $64, %rcx rep movsl and $63709, %rdx pop %rsi pop %rdx pop %rdi pop %rcx pop %rbp pop %r9 pop %r15 pop %r13 ret .global s_faulty_load s_faulty_load: push %r10 push %r15 push %r8 push %r9 push %rbp push %rcx push %rdi push %rsi // Store lea addresses_PSE+0xede5, %r15 nop nop nop nop xor %r8, %r8 mov $0x5152535455565758, %r9 movq %r9, %xmm4 vmovups %ymm4, (%r15) nop sub %r10, %r10 // REPMOV lea addresses_RW+0x1c6e5, %rsi lea addresses_RW+0x119e5, %rdi nop nop dec %rbp mov $51, %rcx rep movsb nop nop xor %r10, %r10 // Store mov $0x165, %r15 clflush (%r15) cmp %rsi, %rsi movl $0x51525354, (%r15) nop nop nop dec %r9 // Store lea addresses_WT+0xda65, %rcx nop nop nop nop nop and $45141, %rdi movl $0x51525354, (%rcx) // Exception!!! nop mov (0), %rdi nop nop nop nop nop sub $47374, %rdi // Faulty Load lea addresses_D+0x1eae5, %rsi nop nop nop inc %rcx mov (%rsi), %rdi lea oracles, %r15 and $0xff, %rdi shlq $12, %rdi mov (%r15,%rdi,1), %rdi pop %rsi pop %rdi pop %rcx pop %rbp pop %r9 pop %r8 pop %r15 pop %r10 ret /* <gen_faulty_load> [REF] {'src': {'type': 'addresses_D', 'same': False, 'size': 16, 'congruent': 0, 'NT': False, 'AVXalign': True}, 'OP': 'LOAD'} {'dst': {'type': 'addresses_PSE', 'same': False, 'size': 32, 'congruent': 8, 'NT': False, 'AVXalign': False}, 'OP': 'STOR'} {'src': {'type': 'addresses_RW', 'congruent': 9, 'same': False}, 'dst': {'type': 'addresses_RW', 'congruent': 6, 'same': False}, 'OP': 'REPM'} {'dst': {'type': 'addresses_P', 'same': False, 'size': 4, 'congruent': 6, 'NT': False, 'AVXalign': False}, 'OP': 'STOR'} {'dst': {'type': 'addresses_WT', 'same': False, 'size': 4, 'congruent': 7, 'NT': True, 'AVXalign': False}, 'OP': 'STOR'} [Faulty Load] {'src': {'type': 'addresses_D', 'same': True, 'size': 8, 'congruent': 0, 'NT': False, 'AVXalign': False}, 'OP': 'LOAD'} <gen_prepare_buffer> {'dst': {'type': 'addresses_D_ht', 'same': False, 'size': 4, 'congruent': 8, 'NT': False, 'AVXalign': False}, 'OP': 'STOR'} {'dst': {'type': 'addresses_WT_ht', 'same': False, 'size': 16, 'congruent': 1, 'NT': False, 'AVXalign': False}, 'OP': 'STOR'} {'dst': {'type': 'addresses_A_ht', 'same': False, 'size': 32, 'congruent': 8, 'NT': False, 'AVXalign': False}, 'OP': 'STOR'} {'src': {'type': 'addresses_WC_ht', 'same': False, 'size': 4, 'congruent': 10, 'NT': False, 'AVXalign': False}, 'OP': 'LOAD'} {'dst': {'type': 'addresses_D_ht', 'same': False, 'size': 32, 'congruent': 2, 'NT': False, 'AVXalign': False}, 'OP': 'STOR'} {'src': {'type': 'addresses_WT_ht', 'congruent': 2, 'same': False}, 'dst': {'type': 'addresses_A_ht', 'congruent': 0, 'same': False}, 'OP': 'REPM'} {'src': {'type': 'addresses_WT_ht', 'same': False, 'size': 1, 'congruent': 8, 'NT': False, 'AVXalign': False}, 'OP': 'LOAD'} {'src': {'type': 'addresses_UC_ht', 'same': False, 'size': 2, 'congruent': 3, 'NT': False, 'AVXalign': False}, 'OP': 'LOAD'} {'src': {'type': 'addresses_WC_ht', 'congruent': 0, 'same': True}, 'dst': {'type': 'addresses_D_ht', 'congruent': 2, 'same': False}, 'OP': 'REPM'} {'36': 21829} 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 */
32.302222
2,999
0.654238
833cac174190f966acf03213893b170c2175ddb5
3,005
asm
Assembly
src/l4/a/x86/c/system/asm/iframe.asm
archibate/h2os
04bf2a16519969eeb605ec97d8cb04d16da93ee9
[ "MIT" ]
1
2020-07-06T02:44:00.000Z
2020-07-06T02:44:00.000Z
src/l4/a/x86/c/system/asm/iframe.asm
archibate/h2os
04bf2a16519969eeb605ec97d8cb04d16da93ee9
[ "MIT" ]
null
null
null
src/l4/a/x86/c/system/asm/iframe.asm
archibate/h2os
04bf2a16519969eeb605ec97d8cb04d16da93ee9
[ "MIT" ]
null
null
null
bits 32 section .text globl utcb_exiter globl iframe_exiter global movusr_iframe_exiter globl idle_exiter %ifndef _MINGW extrn hwintr %else extern @hwintr@4 hwintr equ @hwintr@4 %endif SEFrameSize equ 4*5 ; N: sizeof(struct seframe): keep sync with l4/object/seframe.h IFrameSize equ 4*19 ; N: sizeof(struct iframe): keep sync with l4/object/iframe.h KernUTCBAddr equ 0x3fd000 ; N: keep sync with l4/system/kbase.h intr_from_idle: mov ecx, idle_stack mov esp, KernUTCBAddr;+4 ;push utcb_exiter;;??TOPT jmp hwintr introute: cmp esp, idle_stktop-4*5 je intr_from_idle push ds push es push fs push gs pushad mov eax, ss mov ds, eax mov es, eax mov ecx, esp sub esp, SEFrameSize call hwintr utcb_exiter: add esp, SEFrameSize movusr_iframe_exiter: iframe_exiter: popad pop gs pop fs pop es pop ds add esp, 4*2 ; intr_num & error_code iretd idle_exiter: mov eax, [KernUTCBAddr + IFrameSize + SEFrameSize] mov [KernUTCBAddr], eax mov esp, idle_stktop sti hlt ud2 section .bss idle_stack: resb IFrameSize-4*2 idle_stktop: resb 4*2 section .data globl __intrents __intrents: %macro NC 1 section .data dd ent%1 section .text ent%1: push 0 push %1 jmp introute %endmacro %macro EC 1 section .data dd ent%1 section .text ent%1: push %1 jmp introute %endmacro ; NC&ECs {{{ NC 0 NC 1 NC 2 NC 3 NC 4 NC 5 NC 6 NC 7 EC 8 NC 9 EC 10 EC 11 EC 12 EC 13 EC 14 NC 15 NC 16 NC 17 NC 18 NC 19 NC 20 NC 21 NC 22 NC 23 NC 24 NC 25 NC 26 NC 27 NC 28 NC 29 NC 30 NC 31 NC 32 NC 33 NC 34 NC 35 NC 36 NC 37 NC 38 NC 39 NC 40 NC 41 NC 42 NC 43 NC 44 NC 45 NC 46 NC 47 NC 48 NC 49 NC 50 NC 51 NC 52 NC 53 NC 54 NC 55 NC 56 NC 57 NC 58 NC 59 NC 60 NC 61 NC 62 NC 63 NC 64 NC 65 NC 66 NC 67 NC 68 NC 69 NC 70 NC 71 NC 72 NC 73 NC 74 NC 75 NC 76 NC 77 NC 78 NC 79 NC 80 NC 81 NC 82 NC 83 NC 84 NC 85 NC 86 NC 87 NC 88 NC 89 NC 90 NC 91 NC 92 NC 93 NC 94 NC 95 NC 96 NC 97 NC 98 NC 99 NC 100 NC 101 NC 102 NC 103 NC 104 NC 105 NC 106 NC 107 NC 108 NC 109 NC 110 NC 111 NC 112 NC 113 NC 114 NC 115 NC 116 NC 117 NC 118 NC 119 NC 120 NC 121 NC 122 NC 123 NC 124 NC 125 NC 126 NC 127 NC 128 NC 129 NC 130 NC 131 NC 132 NC 133 NC 134 NC 135 NC 136 NC 137 NC 138 NC 139 NC 140 NC 141 NC 142 NC 143 NC 144 NC 145 NC 146 NC 147 NC 148 NC 149 NC 150 NC 151 NC 152 NC 153 NC 154 NC 155 NC 156 NC 157 NC 158 NC 159 NC 160 NC 161 NC 162 NC 163 NC 164 NC 165 NC 166 NC 167 NC 168 NC 169 NC 170 NC 171 NC 172 NC 173 NC 174 NC 175 NC 176 NC 177 NC 178 NC 179 NC 180 NC 181 NC 182 NC 183 NC 184 NC 185 NC 186 NC 187 NC 188 NC 189 NC 190 NC 191 NC 192 NC 193 NC 194 NC 195 NC 196 NC 197 NC 198 NC 199 NC 200 NC 201 NC 202 NC 203 NC 204 NC 205 NC 206 NC 207 NC 208 NC 209 NC 210 NC 211 NC 212 NC 213 NC 214 NC 215 NC 216 NC 217 NC 218 NC 219 NC 220 NC 221 NC 222 NC 223 NC 224 NC 225 NC 226 NC 227 NC 228 NC 229 NC 230 NC 231 NC 232 NC 233 NC 234 NC 235 NC 236 NC 237 NC 238 NC 239 NC 240 NC 241 NC 242 NC 243 NC 244 NC 245 NC 246 NC 247 NC 248 NC 249 NC 250 NC 251 NC 252 NC 253 NC 254 NC 255 ; }}}
8.684971
83
0.714809
7c62ab2962142629b4c2f718ea74af0e12d011f0
512
asm
Assembly
oeis/271/A271893.asm
neoneye/loda-programs
84790877f8e6c2e821b183d2e334d612045d29c0
[ "Apache-2.0" ]
11
2021-08-22T19:44:55.000Z
2022-03-20T16:47:57.000Z
oeis/271/A271893.asm
neoneye/loda-programs
84790877f8e6c2e821b183d2e334d612045d29c0
[ "Apache-2.0" ]
9
2021-08-29T13:15:54.000Z
2022-03-09T19:52:31.000Z
oeis/271/A271893.asm
neoneye/loda-programs
84790877f8e6c2e821b183d2e334d612045d29c0
[ "Apache-2.0" ]
3
2021-08-22T20:56:47.000Z
2021-09-29T06:26:12.000Z
; A271893: Expansion of (2*x+1)*(1-x) / ( 1-2*x-4*x^2+6*x^3 ). ; Submitted by Christian Krause ; 1,3,8,22,58,156,412,1100,2912,7752,20552,54640,144976,385200,1022464,2715872,7210400,19149504,50845376,135026368,358537216,952107648,2528205952,6713619200,17827416320,47340073728,125708097536,333811992064,886415931904,2353831246848,6250454268928,16597737933824 mov $1,2 mov $2,1 mov $4,1 lpb $0 sub $0,1 mov $3,$2 mul $2,2 sub $4,$1 sub $2,$4 add $3,$4 mov $4,$1 add $1,$3 mul $1,2 lpe mov $0,$2
25.6
262
0.701172
19d88a6db86c11007b214490039d4ca4cee239d4
274
asm
Assembly
programs/oeis/134/A134201.asm
karttu/loda
9c3b0fc57b810302220c044a9d17db733c76a598
[ "Apache-2.0" ]
null
null
null
programs/oeis/134/A134201.asm
karttu/loda
9c3b0fc57b810302220c044a9d17db733c76a598
[ "Apache-2.0" ]
null
null
null
programs/oeis/134/A134201.asm
karttu/loda
9c3b0fc57b810302220c044a9d17db733c76a598
[ "Apache-2.0" ]
null
null
null
; A134201: Number of rigid hypergroups of order n. ; 1,2,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6 mul $0,5 sub $0,1 mov $1,5 mod $1,$0 add $1,1
30.444444
175
0.551095
a8d7b3bdedf22ce6b2fd22240e79cbdf896470e8
538
asm
Assembly
oeis/117/A117919.asm
neoneye/loda-programs
84790877f8e6c2e821b183d2e334d612045d29c0
[ "Apache-2.0" ]
11
2021-08-22T19:44:55.000Z
2022-03-20T16:47:57.000Z
oeis/117/A117919.asm
neoneye/loda-programs
84790877f8e6c2e821b183d2e334d612045d29c0
[ "Apache-2.0" ]
9
2021-08-29T13:15:54.000Z
2022-03-09T19:52:31.000Z
oeis/117/A117919.asm
neoneye/loda-programs
84790877f8e6c2e821b183d2e334d612045d29c0
[ "Apache-2.0" ]
3
2021-08-22T20:56:47.000Z
2021-09-29T06:26:12.000Z
; A117919: Triangle read by rows: T(n, k) = 2^floor((k-1)/2)*binomial(n-1, k-1). ; Submitted by Jamie Morken(s1) ; 1,1,1,1,2,2,1,3,6,2,1,4,12,8,4,1,5,20,20,20,4,1,6,30,40,60,24,8,1,7,42,70,140,84,56,8,1,8,56,112,280,224,224,64,16,1,9,72,168,504,504,672,288,144,16,1,10,90,240,840,1008,1680,960,720,160,32,1,11,110,330,1320,1848,3696,2640,2640,880,352,32,1,12,132,440,1980,3168,7392,6336,7920,3520,2112,384,64,1,13,156,572,2860,5148,13728,13728,20592 lpb $0 add $1,1 sub $0,$1 lpe bin $1,$0 lpb $0 sub $0,2 mul $1,2 lpe mov $0,$1
35.866667
336
0.654275
7bea00dd793cc1865dbd4356d8a0e804882b0e16
1,070
asm
Assembly
tests/z80/op_IX_BIT_DDCB_no_lua.asm
cizo2000/sjasmplus
615d7c0e09a44aa2a923095fc9ed6dca6ecae4a4
[ "BSD-3-Clause" ]
220
2016-10-22T19:44:39.000Z
2022-03-29T20:57:04.000Z
tests/z80/op_IX_BIT_DDCB_no_lua.asm
ped7g/sjasmplus
487635c8057cd5594c372d9b70bc00a3f3a1ecc4
[ "BSD-3-Clause" ]
153
2018-05-07T10:31:23.000Z
2022-03-30T04:35:59.000Z
tests/z80/op_IX_BIT_DDCB_no_lua.asm
ped7g/sjasmplus
487635c8057cd5594c372d9b70bc00a3f3a1ecc4
[ "BSD-3-Clause" ]
51
2016-05-12T21:27:36.000Z
2022-03-27T15:16:16.000Z
OUTPUT "op_IX_BIT_DDCB_no_lua.bin" ;;; generate shift instructions: #DDCBFF00 .. #DDCBFF3F ("ix-1" = FF index byte) DEFARRAY instructions rlc, rrc, rl, rr, sla, sra, sli, srl DEFARRAY registers <(ix-1),b>, <(ix-1),c>, <(ix-1),d>, <(ix-1),e>, <(ix-1),h>, <(ix-1),l>, <(ix-1)>, <(ix-1),a> INS_I=0 DUP 8 REG_I=0 DUP 8 instructions[INS_I] registers[REG_I] REG_I=REG_I+1 EDUP INS_I=INS_I+1 EDUP ;;; generate `bit` instructions: #DDCBFF46 .. #DDCBFF7E (two: {#x6, #xE}) REG_BIT=0 DUP 8 bit REG_BIT,(ix-1) REG_BIT=REG_BIT+1 EDUP ;;; generate `res` + `set` instructions: #DDCB1180 .. #DDCB11FF ("ix+17" = 11 index byte) DEFARRAY instructions2 res, set DEFARRAY registers2 <(ix+17),b>, <(ix+17),c>, <(ix+17),d>, <(ix+17),e>, <(ix+17),h>, <(ix+17),l>, <(ix+17)>, <(ix+17),a> INS_I=0 DUP 2 REG_BIT=0 DUP 8 REG_I=0 DUP 8 instructions2[INS_I] REG_BIT,registers2[REG_I] REG_I=REG_I+1 EDUP REG_BIT=REG_BIT+1 EDUP INS_I=INS_I+1 EDUP
26.097561
124
0.568224
9be2f842ecae5d747dd5163a04b20e78ee3dc1c6
6,979
asm
Assembly
Library/Spreadsheet/Spreadsheet/spreadsheetCellEdit.asm
steakknife/pcgeos
95edd7fad36df400aba9bab1d56e154fc126044a
[ "Apache-2.0" ]
504
2018-11-18T03:35:53.000Z
2022-03-29T01:02:51.000Z
Library/Spreadsheet/Spreadsheet/spreadsheetCellEdit.asm
steakknife/pcgeos
95edd7fad36df400aba9bab1d56e154fc126044a
[ "Apache-2.0" ]
96
2018-11-19T21:06:50.000Z
2022-03-06T10:26:48.000Z
Library/Spreadsheet/Spreadsheet/spreadsheetCellEdit.asm
steakknife/pcgeos
95edd7fad36df400aba9bab1d56e154fc126044a
[ "Apache-2.0" ]
73
2018-11-19T20:46:53.000Z
2022-03-29T00:59:26.000Z
COMMENT @%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% Copyright (c) GeoWorks 1991 -- All Rights Reserved PROJECT: PC GEOS MODULE: FILE: spreadsheetCellRangeEdit.asm AUTHOR: John Wedgwood, Feb 11, 1991 METHODS: Name Description ---- ----------- REVISION HISTORY: Name Date Description ---- ---- ----------- John 2/11/91 Initial revision DESCRIPTION: $Id: spreadsheetCellEdit.asm,v 1.1 97/04/07 11:14:17 newdeal Exp $ %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%@ EditCode segment resource COMMENT @%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% SpreadsheetParseRangeReference %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% SYNOPSIS: Parse text into a range reference, if possible CALLED BY: MSG_SPREADSHEET_PARSE_RANGE_REFERENCE PASS: *ds:si - instance data ds:di - *ds:si es - seg addr of SpreadsheetClass ax - the message ss:bp - ptr SpreadsheetFormatParseRangeParams ss:bp.SFPRP_text - text (NULL terminated) RETURN: carry - set for error: al - ParserScannerEvaluatorError else: ss:bp.SFPRP_range - CellRange DESTROYED: bx, si, di, ds, es (method handler) PSEUDO CODE/STRATEGY: KNOWN BUGS/SIDE EFFECTS/IDEAS: REVISION HISTORY: Name Date Description ---- ---- ----------- gene 8/17/92 Initial version %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%@ SpreadsheetParseRangeReference method dynamic SpreadsheetClass, MSG_SPREADSHEET_PARSE_RANGE_REFERENCE mov si, di mov dx, ss lea di, ss:[bp].SFPRP_text ;dx:di <- ptr to text push bp call ConvertToCellOrRange mov bx, bp pop bp mov ss:[bp].SFPRP_range.CR_start.CR_row, ax mov ss:[bp].SFPRP_range.CR_start.CR_column, cx mov ss:[bp].SFPRP_range.CR_end.CR_row, dx mov ss:[bp].SFPRP_range.CR_end.CR_column, bx ret SpreadsheetParseRangeReference endm COMMENT @%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% SpreadsheetFormatRangeReference %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% SYNOPSIS: Format a range reference CALLED BY: MSG_SPREADSHEET_FORMAT_RANGE_REFERENCE PASS: *ds:si - instance data ds:di - *ds:si es - seg addr of SpreadsheetClass ax - the message ss:bp - ptr to SpreadsheetFormatParseRangeParams ss:bp.SFPRP_range - CellRange to format RETURN: ss:bp.SFPRP_text - formatted text (NULL-terminated) DESTROYED: bx, si, di, ds, es (method handler) PSEUDO CODE/STRATEGY: KNOWN BUGS/SIDE EFFECTS/IDEAS: REVISION HISTORY: Name Date Description ---- ---- ----------- gene 8/18/92 Initial version %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%@ SpreadsheetFormatRangeReference method dynamic SpreadsheetClass, MSG_SPREADSHEET_FORMAT_RANGE_REFERENCE segmov es, ss lea di, ss:[bp].SFPRP_text ;es:di <- ptr to buffer mov ax, ss:[bp].SFPRP_range.CR_start.CR_row mov cx, ss:[bp].SFPRP_range.CR_start.CR_column mov dx, ss:[bp].SFPRP_range.CR_end.CR_row mov bx, ss:[bp].SFPRP_range.CR_end.CR_column call ParserFormatRangeReference ret SpreadsheetFormatRangeReference endm COMMENT @%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% ConvertToCellOrRange %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% SYNOPSIS: Convert text into either a cell or a range CALLED BY: GenCellRangeEditGetData, GotoCell PASS: dx:di = Pointer to the text (NULL terminated) ds:si = Instance data of the current spreadsheet RETURN: carry set if the text is neither a cell or range al = Error code (ah, cx, dx, bp destroyed) carry clear otherwise: ax,cx = Row/Column of first cell in range dx,bp = Row/Column of last cell in range DESTROYED: nothing PSEUDO CODE/STRATEGY: KNOWN BUGS/SIDE EFFECTS/IDEAS: REVISION HISTORY: Name Date Description ---- ---- ----------- jcw 2/11/91 Initial version %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%@ ConvertParams union CP_parseParams SpreadsheetParserParameters <> CP_evalParams SpreadsheetEvalParameters <> ConvertParams ends ConvertToCellOrRange proc near class SpreadsheetClass params local ConvertParams SBCS< parseBuffer local 256 dup (char) > DBCS< parseBuffer local 256 dup (wchar) > push di uses bx, es, ds, si .enter ; ; Initialize the frame ; mov ss:params.CP_parseParams.SPP_text.segment, dx mov ss:params.CP_parseParams.SPP_text.offset, di mov ss:params.CP_parseParams.SPP_expression.segment, ss lea ax, ss:parseBuffer mov ss:params.CP_parseParams.SPP_expression.offset, ax mov ss:params.CP_parseParams.SPP_exprLength, length parseBuffer mov ss:params.CP_parseParams.SPP_parserParams.PP_flags, \ mask PF_CELLS or \ mask PF_NAMES ; ; Load up the instance pointer into *ds:si. It's going to be very ; useful... ; mov si, ds:[si].SSI_chunk ; *ds:si <- instance ptr push bp ; Save frame ptr lea bp, ss:params ; ss:bp <- ptr to parameters mov ax, MSG_SPREADSHEET_PARSE_EXPRESSION call ObjCallInstanceNoLock ; Parse the expression pop bp ; Restore frame ptr cmp al, -1 ; Check for an error jne quitError ; Quit on error ; ; The expression parsed, now we need to evaluate it. ; mov ss:params.CP_evalParams.SEP_expression.segment, ss lea ax, ss:parseBuffer mov ss:params.CP_evalParams.SEP_expression.offset, ax push bp ; Save frame ptr lea bp, ss:params ; ss:bp <- ptr to parameters mov ax, MSG_SPREADSHEET_EVAL_EXPRESSION mov cl, mask EF_KEEP_LAST_CELL call ObjCallInstanceNoLock ; Evaluate the expression pop bp ; Restore frame ptr cmp al, -1 ; Check for an error jne quitError ; Quit on error ; ; Make sure that the result is a range. ; test ss:params.CP_evalParams.SEP_result.ASE_type, mask ESAT_RANGE jnz grabRange ; ; Error: Neither a cell nor a range. ; mov al, PSEE_RESULT_SHOULD_BE_CELL_OR_RANGE jmp quitError ; Branch to signal an error grabRange: mov ax, ss:params.CP_evalParams.SEP_result.ASE_data.\ ESAD_range.ERD_firstCell.CR_row mov cx, ss:params.CP_evalParams.SEP_result.ASE_data.\ ESAD_range.ERD_firstCell.CR_column mov dx, ss:params.CP_evalParams.SEP_result.ASE_data.\ ESAD_range.ERD_lastCell.CR_row mov di, ss:params.CP_evalParams.SEP_result.ASE_data.\ ESAD_range.ERD_lastCell.CR_column andnf ax, mask CRC_VALUE ; Only want the values andnf cx, mask CRC_VALUE ; not the flags andnf dx, mask CRC_VALUE andnf di, mask CRC_VALUE clc ; Signal: no error quit: .leave mov bp, di ; Return lastCell.column in bp pop di ret quitError: stc ; Signal: error jmp quit ; Branch to quit ConvertToCellOrRange endp EditCode ends
28.720165
79
0.627311
d75c302f6cd4214529889920e7d9e8ba24c656fd
62
asm
Assembly
tests/optimizer/E018.asm
neoneye/loda
afe9559fb53ee12e3040da54bd6aa47283e0d9ec
[ "Apache-2.0" ]
22
2018-02-06T19:19:31.000Z
2022-01-17T21:53:31.000Z
tests/optimizer/E018.asm
neoneye/loda
afe9559fb53ee12e3040da54bd6aa47283e0d9ec
[ "Apache-2.0" ]
69
2021-08-28T10:34:30.000Z
2022-03-20T19:16:19.000Z
tests/optimizer/E018.asm
neoneye/loda
afe9559fb53ee12e3040da54bd6aa47283e0d9ec
[ "Apache-2.0" ]
5
2021-02-24T21:14:16.000Z
2021-08-09T19:48:05.000Z
; in mul $0,-120259084286 div $0,120259084286 ; out mul $0,-1
10.333333
20
0.677419
b5ba5b58882fc0ed85a56aad870f84132ec9e502
334
asm
Assembly
programs/oeis/318/A318054.asm
karttu/loda
9c3b0fc57b810302220c044a9d17db733c76a598
[ "Apache-2.0" ]
null
null
null
programs/oeis/318/A318054.asm
karttu/loda
9c3b0fc57b810302220c044a9d17db733c76a598
[ "Apache-2.0" ]
null
null
null
programs/oeis/318/A318054.asm
karttu/loda
9c3b0fc57b810302220c044a9d17db733c76a598
[ "Apache-2.0" ]
null
null
null
; A318054: a(n) = n*(n + 1)*(n^2 + n + 22)/24. ; 0,2,7,17,35,65,112,182,282,420,605,847,1157,1547,2030,2620,3332,4182,5187,6365,7735,9317,11132,13202,15550,18200,21177,24507,28217,32335,36890,41912,47432,53482,60095,67305,75147,83657,92872,102830,113570,125132,137557 add $0,1 bin $0,2 add $0,6 mov $1,$0 bin $1,2 sub $1,15 div $1,3
30.363636
220
0.691617
b70f2f3dc910b07029474f6643bfe244f4b15008
310
asm
Assembly
examples/st7783/JpegPixels.asm
AIHZP/andysworkshop-stm32plus
8f7868bf30e9df7df38004597a0430d1fe5d0370
[ "BSD-3-Clause" ]
607
2015-01-06T18:38:17.000Z
2022-03-19T18:37:09.000Z
examples/st7783/JpegPixels.asm
AIHZP/andysworkshop-stm32plus
8f7868bf30e9df7df38004597a0430d1fe5d0370
[ "BSD-3-Clause" ]
148
2015-01-02T11:34:15.000Z
2021-05-10T05:15:30.000Z
examples/st7783/JpegPixels.asm
AIHZP/andysworkshop-stm32plus
8f7868bf30e9df7df38004597a0430d1fe5d0370
[ "BSD-3-Clause" ]
203
2015-01-10T14:24:58.000Z
2022-03-25T16:08:57.000Z
/* * This file is a part of the open source stm32plus library. * Copyright (c) 2011,2012 Andy Brown <www.andybrown.me.uk> * Please see website for licensing terms. */ .global JpegTest0Pixels .global JpegTest0PixelsSize JpegTest0Pixels: .incbin "jpeg/test0.jpg" JpegTest0PixelsSize=.-JpegTest0Pixels
23.846154
60
0.758065
3f8b31eca285720406b4bd0a1171f9e22c402814
6,177
asm
Assembly
Transynther/x86/_processed/AVXALIGN/_st_/i7-7700_9_0xca_notsx.log_21829_392.asm
ljhsiun2/medusa
67d769b8a2fb42c538f10287abaf0e6dbb463f0c
[ "MIT" ]
9
2020-08-13T19:41:58.000Z
2022-03-30T12:22:51.000Z
Transynther/x86/_processed/AVXALIGN/_st_/i7-7700_9_0xca_notsx.log_21829_392.asm
ljhsiun2/medusa
67d769b8a2fb42c538f10287abaf0e6dbb463f0c
[ "MIT" ]
1
2021-04-29T06:29:35.000Z
2021-05-13T21:02:30.000Z
Transynther/x86/_processed/AVXALIGN/_st_/i7-7700_9_0xca_notsx.log_21829_392.asm
ljhsiun2/medusa
67d769b8a2fb42c538f10287abaf0e6dbb463f0c
[ "MIT" ]
3
2020-07-14T17:07:07.000Z
2022-03-21T01:12:22.000Z
.global s_prepare_buffers s_prepare_buffers: push %r14 push %r8 push %r9 push %rcx push %rdi push %rdx push %rsi lea addresses_A_ht+0xaa1, %rsi lea addresses_UC_ht+0x1baa1, %rdi nop nop nop nop and %r14, %r14 mov $87, %rcx rep movsq cmp %rdx, %rdx lea addresses_UC_ht+0x9b01, %rsi lea addresses_normal_ht+0x1cfa1, %rdi nop nop nop nop sub %r8, %r8 mov $61, %rcx rep movsb nop nop nop add %r14, %r14 lea addresses_WC_ht+0x48a1, %rsi nop add $23536, %r9 mov $0x6162636465666768, %rdi movq %rdi, %xmm4 movups %xmm4, (%rsi) nop nop dec %r14 lea addresses_UC_ht+0xf00b, %r14 xor %r9, %r9 movl $0x61626364, (%r14) nop nop nop nop sub $46402, %rdi lea addresses_A_ht+0x84a1, %rsi clflush (%rsi) nop nop sub %r9, %r9 mov $0x6162636465666768, %rdi movq %rdi, (%rsi) nop nop nop dec %r8 pop %rsi pop %rdx pop %rdi pop %rcx pop %r9 pop %r8 pop %r14 ret .global s_faulty_load s_faulty_load: push %r10 push %r11 push %r14 push %r15 push %rbx push %rcx push %rdi // Load lea addresses_WT+0x16bd1, %r14 and %r11, %r11 vmovups (%r14), %ymm5 vextracti128 $1, %ymm5, %xmm5 vpextrq $1, %xmm5, %r15 nop nop nop nop nop sub %rdi, %rdi // Load mov $0x4a1, %r10 nop nop nop nop nop add $46556, %rbx movb (%r10), %r14b nop nop nop nop and $57189, %r10 // Load lea addresses_US+0x1d0c1, %r15 nop nop nop sub %rdi, %rdi mov (%r15), %rbx nop nop nop nop and %r10, %r10 // Store mov $0x5e36080000000921, %rcx nop nop nop inc %rbx movb $0x51, (%rcx) nop nop nop xor $26259, %r10 // Faulty Load lea addresses_D+0x80a1, %r11 nop nop nop xor $33038, %rdi movb (%r11), %r15b lea oracles, %r14 and $0xff, %r15 shlq $12, %r15 mov (%r14,%r15,1), %r15 pop %rdi pop %rcx pop %rbx pop %r15 pop %r14 pop %r11 pop %r10 ret /* <gen_faulty_load> [REF] {'src': {'NT': False, 'AVXalign': False, 'size': 32, 'congruent': 0, 'same': False, 'type': 'addresses_D'}, 'OP': 'LOAD'} {'src': {'NT': False, 'AVXalign': False, 'size': 32, 'congruent': 4, 'same': False, 'type': 'addresses_WT'}, 'OP': 'LOAD'} {'src': {'NT': False, 'AVXalign': False, 'size': 1, 'congruent': 8, 'same': False, 'type': 'addresses_P'}, 'OP': 'LOAD'} {'src': {'NT': False, 'AVXalign': False, 'size': 8, 'congruent': 5, 'same': False, 'type': 'addresses_US'}, 'OP': 'LOAD'} {'dst': {'NT': False, 'AVXalign': False, 'size': 1, 'congruent': 5, 'same': False, 'type': 'addresses_NC'}, 'OP': 'STOR'} [Faulty Load] {'src': {'NT': False, 'AVXalign': True, 'size': 1, 'congruent': 0, 'same': True, 'type': 'addresses_D'}, 'OP': 'LOAD'} <gen_prepare_buffer> {'src': {'congruent': 9, 'same': False, 'type': 'addresses_A_ht'}, 'dst': {'congruent': 9, 'same': False, 'type': 'addresses_UC_ht'}, 'OP': 'REPM'} {'src': {'congruent': 5, 'same': False, 'type': 'addresses_UC_ht'}, 'dst': {'congruent': 5, 'same': True, 'type': 'addresses_normal_ht'}, 'OP': 'REPM'} {'dst': {'NT': False, 'AVXalign': False, 'size': 16, 'congruent': 10, 'same': False, 'type': 'addresses_WC_ht'}, 'OP': 'STOR'} {'dst': {'NT': False, 'AVXalign': False, 'size': 4, 'congruent': 1, 'same': False, 'type': 'addresses_UC_ht'}, 'OP': 'STOR'} {'dst': {'NT': False, 'AVXalign': True, 'size': 8, 'congruent': 10, 'same': False, 'type': 'addresses_A_ht'}, 'OP': 'STOR'} {'36': 21829} 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 36 */
35.912791
2,999
0.654849
0985ecece6ea141f4f6927193bae70502c01a015
52
asm
Assembly
tools/bls/test/a.asm
retro16/blastsdk
572bd8489e6a2c1cc638120aa62241c99badc2e5
[ "MIT" ]
10
2017-01-14T16:22:58.000Z
2021-02-16T21:41:48.000Z
tools/bls/test/a.asm
retro16/blastsdk
572bd8489e6a2c1cc638120aa62241c99badc2e5
[ "MIT" ]
null
null
null
tools/bls/test/a.asm
retro16/blastsdk
572bd8489e6a2c1cc638120aa62241c99badc2e5
[ "MIT" ]
null
null
null
asm_symbol: move.w d0, d1 BLS_LOAD_BINARY_COMMON_C
10.4
24
0.826923
630b401af7f1fb5d962517894c2899a4284ae816
5,085
asm
Assembly
Transynther/x86/_processed/AVXALIGN/_zr_/i7-7700_9_0xca_notsx.log_21829_30.asm
ljhsiun2/medusa
67d769b8a2fb42c538f10287abaf0e6dbb463f0c
[ "MIT" ]
9
2020-08-13T19:41:58.000Z
2022-03-30T12:22:51.000Z
Transynther/x86/_processed/AVXALIGN/_zr_/i7-7700_9_0xca_notsx.log_21829_30.asm
ljhsiun2/medusa
67d769b8a2fb42c538f10287abaf0e6dbb463f0c
[ "MIT" ]
1
2021-04-29T06:29:35.000Z
2021-05-13T21:02:30.000Z
Transynther/x86/_processed/AVXALIGN/_zr_/i7-7700_9_0xca_notsx.log_21829_30.asm
ljhsiun2/medusa
67d769b8a2fb42c538f10287abaf0e6dbb463f0c
[ "MIT" ]
3
2020-07-14T17:07:07.000Z
2022-03-21T01:12:22.000Z
.global s_prepare_buffers s_prepare_buffers: push %r13 push %r14 push %rbx push %rcx push %rdi push %rdx push %rsi lea addresses_WT_ht+0x114c7, %rsi nop nop nop xor %r13, %r13 mov (%rsi), %edx nop nop nop inc %r13 lea addresses_WT_ht+0x11cc7, %rbx nop nop nop xor $30382, %r13 movb $0x61, (%rbx) nop nop nop nop nop dec %r14 lea addresses_D_ht+0x7121, %rsi lea addresses_WT_ht+0x18d67, %rdi nop nop nop nop add %r13, %r13 mov $113, %rcx rep movsw dec %r14 lea addresses_WC_ht+0x1d0c7, %rsi xor $41431, %rdx mov $0x6162636465666768, %r14 movq %r14, %xmm7 and $0xffffffffffffffc0, %rsi movntdq %xmm7, (%rsi) nop cmp $58248, %rcx lea addresses_normal_ht+0xbc25, %rsi nop nop add %r14, %r14 movb $0x61, (%rsi) nop cmp $13237, %r13 pop %rsi pop %rdx pop %rdi pop %rcx pop %rbx pop %r14 pop %r13 ret .global s_faulty_load s_faulty_load: push %r10 push %r11 push %r9 push %rbx push %rdi // Faulty Load lea addresses_D+0x1f8c7, %rdi xor %r9, %r9 movntdqa (%rdi), %xmm6 vpextrq $0, %xmm6, %r10 lea oracles, %rdi and $0xff, %r10 shlq $12, %r10 mov (%rdi,%r10,1), %r10 pop %rdi pop %rbx pop %r9 pop %r11 pop %r10 ret /* <gen_faulty_load> [REF] {'src': {'NT': False, 'AVXalign': False, 'size': 32, 'congruent': 0, 'same': False, 'type': 'addresses_D'}, 'OP': 'LOAD'} [Faulty Load] {'src': {'NT': True, 'AVXalign': False, 'size': 16, 'congruent': 0, 'same': True, 'type': 'addresses_D'}, 'OP': 'LOAD'} <gen_prepare_buffer> {'src': {'NT': False, 'AVXalign': True, 'size': 4, 'congruent': 9, 'same': False, 'type': 'addresses_WT_ht'}, 'OP': 'LOAD'} {'dst': {'NT': False, 'AVXalign': False, 'size': 1, 'congruent': 10, 'same': False, 'type': 'addresses_WT_ht'}, 'OP': 'STOR'} {'src': {'congruent': 1, 'same': False, 'type': 'addresses_D_ht'}, 'dst': {'congruent': 5, 'same': False, 'type': 'addresses_WT_ht'}, 'OP': 'REPM'} {'dst': {'NT': True, 'AVXalign': False, 'size': 16, 'congruent': 4, 'same': True, 'type': 'addresses_WC_ht'}, 'OP': 'STOR'} {'dst': {'NT': False, 'AVXalign': False, 'size': 1, 'congruent': 0, 'same': False, 'type': 'addresses_normal_ht'}, 'OP': 'STOR'} {'00': 21829} 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 */
48.428571
2,999
0.660767
4bbdf095531176cf08f161088d246d12f53d7d01
7,412
asm
Assembly
Transynther/x86/_processed/NONE/_xt_/i9-9900K_12_0xa0_notsx.log_21829_306.asm
ljhsiun2/medusa
67d769b8a2fb42c538f10287abaf0e6dbb463f0c
[ "MIT" ]
9
2020-08-13T19:41:58.000Z
2022-03-30T12:22:51.000Z
Transynther/x86/_processed/NONE/_xt_/i9-9900K_12_0xa0_notsx.log_21829_306.asm
ljhsiun2/medusa
67d769b8a2fb42c538f10287abaf0e6dbb463f0c
[ "MIT" ]
1
2021-04-29T06:29:35.000Z
2021-05-13T21:02:30.000Z
Transynther/x86/_processed/NONE/_xt_/i9-9900K_12_0xa0_notsx.log_21829_306.asm
ljhsiun2/medusa
67d769b8a2fb42c538f10287abaf0e6dbb463f0c
[ "MIT" ]
3
2020-07-14T17:07:07.000Z
2022-03-21T01:12:22.000Z
.global s_prepare_buffers s_prepare_buffers: push %r12 push %r15 push %rbp push %rbx push %rcx push %rdi push %rdx push %rsi lea addresses_normal_ht+0x1a432, %rbp clflush (%rbp) nop nop nop and %r12, %r12 mov $0x6162636465666768, %r15 movq %r15, (%rbp) nop nop nop nop nop sub %rdx, %rdx lea addresses_A_ht+0x7262, %rsi lea addresses_UC_ht+0x9162, %rdi nop nop xor $30409, %rdx mov $113, %rcx rep movsl xor %rdx, %rdx lea addresses_D_ht+0x9fe2, %rcx nop nop nop nop add %rsi, %rsi vmovups (%rcx), %ymm5 vextracti128 $1, %ymm5, %xmm5 vpextrq $0, %xmm5, %rdx nop nop nop nop xor $3905, %r15 lea addresses_normal_ht+0x12242, %rdx nop nop lfence movw $0x6162, (%rdx) nop xor %rbp, %rbp lea addresses_WT_ht+0x48c2, %rbp nop and %rdi, %rdi movl $0x61626364, (%rbp) nop nop nop nop nop sub $18097, %rsi lea addresses_UC_ht+0x1d7e2, %r15 nop nop nop xor %rdi, %rdi movb (%r15), %cl nop nop add %rbp, %rbp lea addresses_WC_ht+0x1c512, %r15 nop nop nop nop nop add $42529, %rbp and $0xffffffffffffffc0, %r15 movntdqa (%r15), %xmm1 vpextrq $0, %xmm1, %r12 nop nop nop nop xor %rdi, %rdi lea addresses_D_ht+0xcf42, %rdx nop sub %rbp, %rbp mov (%rdx), %rdi xor $1967, %rdi lea addresses_WT_ht+0x177e2, %r15 nop nop xor $16771, %rdi mov (%r15), %r12 nop nop nop nop add %rsi, %rsi lea addresses_UC_ht+0x5de2, %rbp dec %rcx vmovups (%rbp), %ymm6 vextracti128 $0, %ymm6, %xmm6 vpextrq $1, %xmm6, %r12 nop nop xor %rcx, %rcx lea addresses_normal_ht+0x169ca, %rsi lea addresses_WC_ht+0xa7e2, %rdi nop nop nop nop add %rbx, %rbx mov $18, %rcx rep movsl nop nop nop cmp %rdi, %rdi lea addresses_D_ht+0x1af6a, %rbp nop nop nop nop nop lfence movl $0x61626364, (%rbp) nop nop add $14118, %rdi lea addresses_normal_ht+0x96e2, %r12 nop nop add $31345, %rsi movl $0x61626364, (%r12) nop dec %rcx pop %rsi pop %rdx pop %rdi pop %rcx pop %rbx pop %rbp pop %r15 pop %r12 ret .global s_faulty_load s_faulty_load: push %r15 push %r9 push %rbp push %rbx push %rdi push %rsi // Store lea addresses_D+0x12752, %rbx nop nop nop nop add %r15, %r15 movl $0x51525354, (%rbx) xor %r9, %r9 // Faulty Load lea addresses_WT+0x13fe2, %rbx nop nop nop nop add $26297, %rdi mov (%rbx), %rsi lea oracles, %r15 and $0xff, %rsi shlq $12, %rsi mov (%r15,%rsi,1), %rsi pop %rsi pop %rdi pop %rbx pop %rbp pop %r9 pop %r15 ret /* <gen_faulty_load> [REF] {'src': {'type': 'addresses_WT', 'AVXalign': False, 'size': 16, 'NT': False, 'same': False, 'congruent': 0}, 'OP': 'LOAD'} {'OP': 'STOR', 'dst': {'type': 'addresses_D', 'AVXalign': True, 'size': 4, 'NT': False, 'same': False, 'congruent': 3}} [Faulty Load] {'src': {'type': 'addresses_WT', 'AVXalign': False, 'size': 8, 'NT': False, 'same': True, 'congruent': 0}, 'OP': 'LOAD'} <gen_prepare_buffer> {'OP': 'STOR', 'dst': {'type': 'addresses_normal_ht', 'AVXalign': False, 'size': 8, 'NT': False, 'same': False, 'congruent': 2}} {'src': {'type': 'addresses_A_ht', 'congruent': 7, 'same': False}, 'OP': 'REPM', 'dst': {'type': 'addresses_UC_ht', 'congruent': 1, 'same': False}} {'src': {'type': 'addresses_D_ht', 'AVXalign': False, 'size': 32, 'NT': False, 'same': False, 'congruent': 7}, 'OP': 'LOAD'} {'OP': 'STOR', 'dst': {'type': 'addresses_normal_ht', 'AVXalign': False, 'size': 2, 'NT': False, 'same': False, 'congruent': 4}} {'OP': 'STOR', 'dst': {'type': 'addresses_WT_ht', 'AVXalign': False, 'size': 4, 'NT': False, 'same': False, 'congruent': 5}} {'src': {'type': 'addresses_UC_ht', 'AVXalign': True, 'size': 1, 'NT': False, 'same': True, 'congruent': 11}, 'OP': 'LOAD'} {'src': {'type': 'addresses_WC_ht', 'AVXalign': False, 'size': 16, 'NT': True, 'same': False, 'congruent': 4}, 'OP': 'LOAD'} {'src': {'type': 'addresses_D_ht', 'AVXalign': True, 'size': 8, 'NT': False, 'same': False, 'congruent': 5}, 'OP': 'LOAD'} {'src': {'type': 'addresses_WT_ht', 'AVXalign': False, 'size': 8, 'NT': False, 'same': False, 'congruent': 8}, 'OP': 'LOAD'} {'src': {'type': 'addresses_UC_ht', 'AVXalign': False, 'size': 32, 'NT': False, 'same': True, 'congruent': 6}, 'OP': 'LOAD'} {'src': {'type': 'addresses_normal_ht', 'congruent': 3, 'same': False}, 'OP': 'REPM', 'dst': {'type': 'addresses_WC_ht', 'congruent': 11, 'same': False}} {'OP': 'STOR', 'dst': {'type': 'addresses_D_ht', 'AVXalign': False, 'size': 4, 'NT': False, 'same': False, 'congruent': 2}} {'OP': 'STOR', 'dst': {'type': 'addresses_normal_ht', 'AVXalign': False, 'size': 4, 'NT': False, 'same': True, 'congruent': 8}} {'39': 21829} 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 */
34.474419
2,999
0.656233
fd42e5f473d7d8bbcaad359e042dd7d8d17ae4b2
149
asm
Assembly
other.7z/SFC.7z/SFC/ソースデータ/ゼルダの伝説神々のトライフォース/ドイツ_PAL/Ger_asm1/zel_rmdt09.asm
prismotizm/gigaleak
d082854866186a05fec4e2fdf1def0199e7f3098
[ "MIT" ]
null
null
null
other.7z/SFC.7z/SFC/ソースデータ/ゼルダの伝説神々のトライフォース/ドイツ_PAL/Ger_asm1/zel_rmdt09.asm
prismotizm/gigaleak
d082854866186a05fec4e2fdf1def0199e7f3098
[ "MIT" ]
null
null
null
other.7z/SFC.7z/SFC/ソースデータ/ゼルダの伝説神々のトライフォース/ドイツ_PAL/Ger_asm1/zel_rmdt09.asm
prismotizm/gigaleak
d082854866186a05fec4e2fdf1def0199e7f3098
[ "MIT" ]
null
null
null
Name: zel_rmdt09.asm Type: file Size: 172160 Last-Modified: '2016-05-13T04:23:03Z' SHA-1: 9923BFF3480B6D560D2A8F8AF8B9E87CC9190E2E Description: null
21.285714
47
0.818792
f4daa61b56734f1e0fa01aef4f5f3f03e73a4f64
385
asm
Assembly
programs/oeis/318/A318935.asm
neoneye/loda
afe9559fb53ee12e3040da54bd6aa47283e0d9ec
[ "Apache-2.0" ]
22
2018-02-06T19:19:31.000Z
2022-01-17T21:53:31.000Z
programs/oeis/318/A318935.asm
neoneye/loda
afe9559fb53ee12e3040da54bd6aa47283e0d9ec
[ "Apache-2.0" ]
41
2021-02-22T19:00:34.000Z
2021-08-28T10:47:47.000Z
programs/oeis/318/A318935.asm
neoneye/loda
afe9559fb53ee12e3040da54bd6aa47283e0d9ec
[ "Apache-2.0" ]
5
2021-02-24T21:14:16.000Z
2021-08-09T19:48:05.000Z
; A318935: a(n) = Sum_{2^m divides n} 2^(3*m). ; 1,9,1,73,1,9,1,585,1,9,1,73,1,9,1,4681,1,9,1,73,1,9,1,585,1,9,1,73,1,9,1,37449,1,9,1,73,1,9,1,585,1,9,1,73,1,9,1,4681,1,9,1,73,1,9,1,585,1,9,1,73,1,9,1,299593,1,9,1,73,1,9,1,585,1,9,1,73,1,9,1,4681,1,9,1,73,1,9,1,585,1,9,1,73,1,9,1,37449,1,9,1,73 add $0,1 mov $1,1 lpb $0 dif $0,2 mul $1,8 lpe div $1,7 mul $1,8 add $1,1 mov $0,$1
27.5
248
0.571429
25d03a3797b838935215fc73364cc920349d6dc3
669
asm
Assembly
ecdsa128/src/aRC4_src/src/rc4_crypt.asm
FloydZ/Crypto-Hash
2635450fb16d4d8dc4578d6539cc25ce599f7e21
[ "MIT" ]
11
2015-03-17T10:31:23.000Z
2022-01-21T17:42:43.000Z
ecdsa128/src/aRC4_src/src/rc4_crypt.asm
0xFF1E071F/Crypto-Hash
2635450fb16d4d8dc4578d6539cc25ce599f7e21
[ "MIT" ]
null
null
null
ecdsa128/src/aRC4_src/src/rc4_crypt.asm
0xFF1E071F/Crypto-Hash
2635450fb16d4d8dc4578d6539cc25ce599f7e21
[ "MIT" ]
6
2018-01-29T16:06:36.000Z
2021-05-08T19:22:24.000Z
.686p .mmx .model flat,stdcall option casemap:none option prologue:none option epilogue:none extern rc4keytable:DWORD .code rc4_crypt proc ptrData:DWORD, lData:DWORD pushad mov edi, dword ptr [esp+20h+4+4] ;lData mov esi, dword ptr [esp+20h+4] ;ptrData test edi, edi jz @rc4_enc_exit xor eax, eax xor ebx, ebx xor ecx, ecx xor edx, edx @@: inc bl mov dl, byte ptr [rc4keytable+ebx] add al, dl mov cl, byte ptr [rc4keytable+eax] mov byte ptr [rc4keytable+ebx], cl mov byte ptr [rc4keytable+eax], dl add cl, dl mov cl, byte ptr [rc4keytable+ecx] xor byte ptr [esi], cl inc esi dec edi jnz @B @rc4_enc_exit: popad ret 8 rc4_crypt endp end
15.204545
42
0.710015
1489b0d7fb4760872fa4df03ebc11cd9ac36c8ec
492
asm
Assembly
oeis/145/A145602.asm
neoneye/loda-programs
84790877f8e6c2e821b183d2e334d612045d29c0
[ "Apache-2.0" ]
11
2021-08-22T19:44:55.000Z
2022-03-20T16:47:57.000Z
oeis/145/A145602.asm
neoneye/loda-programs
84790877f8e6c2e821b183d2e334d612045d29c0
[ "Apache-2.0" ]
9
2021-08-29T13:15:54.000Z
2022-03-09T19:52:31.000Z
oeis/145/A145602.asm
neoneye/loda-programs
84790877f8e6c2e821b183d2e334d612045d29c0
[ "Apache-2.0" ]
3
2021-08-22T20:56:47.000Z
2021-09-29T06:26:12.000Z
; A145602: a(n) is the number of walks from (0,0) to (0,3) that remain in the upper half-plane y >= 0 using 2*n +1 unit steps either up (U), down (D), left (L) or right (R). ; Submitted by Jamie Morken(s1) ; 1,24,392,5760,81675,1145144,16032016,225059328,3173688180,44986664800,641087516256,9183622822400,132211882468575,1912322889603000,27781440618420000,405248874740582400,5933888308457316900 mov $1,$0 mov $2,1 add $2,$0 add $2,3 add $0,$2 bin $0,$1 mul $0,2 pow $0,2 add $2,$1 div $0,$2
32.8
188
0.723577
00c4c990930229260d32df8ae1b4af8763112453
1,623
asm
Assembly
programs/oeis/008/A008804.asm
jmorken/loda
99c09d2641e858b074f6344a352d13bc55601571
[ "Apache-2.0" ]
1
2021-03-15T11:38:20.000Z
2021-03-15T11:38:20.000Z
programs/oeis/008/A008804.asm
jmorken/loda
99c09d2641e858b074f6344a352d13bc55601571
[ "Apache-2.0" ]
null
null
null
programs/oeis/008/A008804.asm
jmorken/loda
99c09d2641e858b074f6344a352d13bc55601571
[ "Apache-2.0" ]
null
null
null
; A008804: Expansion of 1/((1-x)^2*(1-x^2)*(1-x^4)). ; 1,2,4,6,10,14,20,26,35,44,56,68,84,100,120,140,165,190,220,250,286,322,364,406,455,504,560,616,680,744,816,888,969,1050,1140,1230,1330,1430,1540,1650,1771,1892,2024,2156,2300,2444,2600,2756,2925,3094,3276,3458,3654,3850,4060,4270,4495,4720,4960,5200,5456,5712,5984,6256,6545,6834,7140,7446,7770,8094,8436,8778,9139,9500,9880,10260,10660,11060,11480,11900,12341,12782,13244,13706,14190,14674,15180,15686,16215,16744,17296,17848,18424,19000,19600,20200,20825,21450,22100,22750,23426,24102,24804,25506,26235,26964,27720,28476,29260,30044,30856,31668,32509,33350,34220,35090,35990,36890,37820,38750,39711,40672,41664,42656,43680,44704,45760,46816,47905,48994,50116,51238,52394,53550,54740,55930,57155,58380,59640,60900,62196,63492,64824,66156,67525,68894,70300,71706,73150,74594,76076,77558,79079,80600,82160,83720,85320,86920,88560,90200,91881,93562,95284,97006,98770,100534,102340,104146,105995,107844,109736,111628,113564,115500,117480,119460,121485,123510,125580,127650,129766,131882,134044,136206,138415,140624,142880,145136,147440,149744,152096,154448,156849,159250,161700,164150,166650,169150,171700,174250,176851,179452,182104,184756,187460,190164,192920,195676,198485,201294,204156,207018,209934,212850,215820,218790,221815,224840,227920,231000,234136,237272,240464,243656,246905,250154,253460,256766,260130,263494,266916,270338,273819,277300,280840,284380,287980,291580,295240,298900,302621,306342,310124,313906,317750,321594,325500,329406,333375,337344 add $0,3 mov $2,$0 lpb $2 mov $3,2 add $4,$2 lpb $4 trn $4,$3 add $1,$4 lpe sub $2,4 lpe
108.2
1,461
0.792976
8b3b4accf06c2f1d961656de6e5f846be8232768
635
asm
Assembly
hello.asm
Devlious/asmx86-excercises
77e0977587e1dd8514a61e2e7778ac952a775e33
[ "MIT" ]
null
null
null
hello.asm
Devlious/asmx86-excercises
77e0977587e1dd8514a61e2e7778ac952a775e33
[ "MIT" ]
null
null
null
hello.asm
Devlious/asmx86-excercises
77e0977587e1dd8514a61e2e7778ac952a775e33
[ "MIT" ]
null
null
null
section .data text1 db "Whats your name: " len1 equ $ - text1 text2 db "Hello, " len2 equ $ - text2 section .bss name resb 16 section .text global _start _start: call _printText1 call _getName call _printText2 call _printName mov rax, 60 mov rdi, 0 syscall _getName: mov rax, 0 mov rdi, 0 mov rsi, name mov rdx, 16 syscall ret _printText1: mov rax, 1 mov rdi, 1 mov rsi, text1 mov rdx, len1 syscall ret _printText2: mov rax, 1 mov rdi, 1 mov rsi, text2 mov rdx, len2 syscall ret _printName: mov rax, 1 mov rdi, 1 mov rsi, name mov rdx, 16 syscall ret
11.339286
30
0.64252
67da8b6a36fece7e530a29d2d4c4ca0ab02a40cd
5,352
asm
Assembly
Transynther/x86/_processed/NONE/_xt_/i3-7100_9_0x84_notsx.log_21829_2342.asm
ljhsiun2/medusa
67d769b8a2fb42c538f10287abaf0e6dbb463f0c
[ "MIT" ]
9
2020-08-13T19:41:58.000Z
2022-03-30T12:22:51.000Z
Transynther/x86/_processed/NONE/_xt_/i3-7100_9_0x84_notsx.log_21829_2342.asm
ljhsiun2/medusa
67d769b8a2fb42c538f10287abaf0e6dbb463f0c
[ "MIT" ]
1
2021-04-29T06:29:35.000Z
2021-05-13T21:02:30.000Z
Transynther/x86/_processed/NONE/_xt_/i3-7100_9_0x84_notsx.log_21829_2342.asm
ljhsiun2/medusa
67d769b8a2fb42c538f10287abaf0e6dbb463f0c
[ "MIT" ]
3
2020-07-14T17:07:07.000Z
2022-03-21T01:12:22.000Z
.global s_prepare_buffers s_prepare_buffers: push %r13 push %r14 push %rax push %rbp push %rcx push %rdi push %rsi lea addresses_WC_ht+0xcdf1, %rsi lea addresses_normal_ht+0x1b691, %rdi nop add $33802, %rax mov $73, %rcx rep movsw nop nop nop nop nop and %rsi, %rsi lea addresses_A_ht+0x14643, %r13 nop nop nop and %rbp, %rbp mov (%r13), %cx nop nop nop nop xor %rbp, %rbp lea addresses_WT_ht+0x165f1, %rax nop nop nop cmp $6130, %r14 mov $0x6162636465666768, %rbp movq %rbp, (%rax) nop cmp $54591, %rax lea addresses_WT_ht+0x10311, %r14 nop nop nop cmp $16843, %rcx mov (%r14), %rsi nop nop and %rax, %rax lea addresses_WC_ht+0x165f1, %rdi nop nop dec %rbp movw $0x6162, (%rdi) nop nop nop xor %r14, %r14 pop %rsi pop %rdi pop %rcx pop %rbp pop %rax pop %r14 pop %r13 ret .global s_faulty_load s_faulty_load: push %r10 push %r11 push %r13 push %r15 push %r9 push %rcx push %rdx // Store lea addresses_WC+0xadf1, %r10 nop nop nop nop add $22537, %rdx mov $0x5152535455565758, %rcx movq %rcx, (%r10) nop nop and %r10, %r10 // Faulty Load lea addresses_A+0x195f1, %r9 nop nop nop add %r13, %r13 mov (%r9), %dx lea oracles, %r11 and $0xff, %rdx shlq $12, %rdx mov (%r11,%rdx,1), %rdx pop %rdx pop %rcx pop %r9 pop %r15 pop %r13 pop %r11 pop %r10 ret /* <gen_faulty_load> [REF] {'src': {'type': 'addresses_A', 'same': False, 'size': 1, 'congruent': 0, 'NT': False, 'AVXalign': False}, 'OP': 'LOAD'} {'dst': {'type': 'addresses_WC', 'same': False, 'size': 8, 'congruent': 10, 'NT': False, 'AVXalign': False}, 'OP': 'STOR'} [Faulty Load] {'src': {'type': 'addresses_A', 'same': True, 'size': 2, 'congruent': 0, 'NT': False, 'AVXalign': False}, 'OP': 'LOAD'} <gen_prepare_buffer> {'src': {'type': 'addresses_WC_ht', 'congruent': 10, 'same': False}, 'dst': {'type': 'addresses_normal_ht', 'congruent': 4, 'same': False}, 'OP': 'REPM'} {'src': {'type': 'addresses_A_ht', 'same': False, 'size': 2, 'congruent': 1, 'NT': False, 'AVXalign': False}, 'OP': 'LOAD'} {'dst': {'type': 'addresses_WT_ht', 'same': False, 'size': 8, 'congruent': 11, 'NT': False, 'AVXalign': False}, 'OP': 'STOR'} {'src': {'type': 'addresses_WT_ht', 'same': False, 'size': 8, 'congruent': 4, 'NT': False, 'AVXalign': False}, 'OP': 'LOAD'} {'dst': {'type': 'addresses_WC_ht', 'same': True, 'size': 2, 'congruent': 11, 'NT': False, 'AVXalign': False}, 'OP': 'STOR'} {'35': 21829} 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 */
41.8125
2,999
0.658819
6fe2c5d18af7b2a0f52c7e2e13830e0cd39516d6
1,195
asm
Assembly
src/general.asm
SickanDev/assembly-http-server
0f2f4139887b2d70df736b02ee32e8a0db0fb3e8
[ "MIT" ]
1
2021-07-14T12:13:59.000Z
2021-07-14T12:13:59.000Z
src/general.asm
SickanK/assembly-http-server
0f2f4139887b2d70df736b02ee32e8a0db0fb3e8
[ "MIT" ]
null
null
null
src/general.asm
SickanK/assembly-http-server
0f2f4139887b2d70df736b02ee32e8a0db0fb3e8
[ "MIT" ]
null
null
null
; int slen(Sprint message) ; Calculate length of sring slen: push ebx mov ebx, eax .nextchar: cmp byte [eax], 0 je .finished inc eax jmp .nextchar .finished: sub eax, ebx pop ebx ret ; void sprint(String message) ; Prints message sprint: push edx push ecx push ebx push eax call slen mov edx, eax pop eax mov ecx, eax mov ebx, 1 mov eax, 4 int 80h pop edx pop ecx pop ebx ret ; void sprintLF(String message) ; Prints message and a linefeed sprintLF: call sprint push eax mov eax, 0Ah push eax mov eax, esp call sprint pop eax pop eax ret iprint: push eax push ecx push edx push esi mov ecx, 0 divideLoop: inc ecx mov edx, 0 mov esi, 10 idiv esi add edx, 48 push edx cmp eax, 0 jnz divideLoop printLoop: dec ecx mov eax, esp call sprint pop eax cmp ecx, 0 jnz printLoop pop esi pop edx pop ecx pop eax ret iprintLF: call iprint push eax mov eax, 0Ah push eax mov eax, esp call sprint pop eax pop eax ret
11.831683
31
0.566527
8d70ce1a492e50f3920abdb9253fd4b5fa5d8604
636
asm
Assembly
programs/oeis/104/A104626.asm
jmorken/loda
99c09d2641e858b074f6344a352d13bc55601571
[ "Apache-2.0" ]
1
2021-03-15T11:38:20.000Z
2021-03-15T11:38:20.000Z
programs/oeis/104/A104626.asm
jmorken/loda
99c09d2641e858b074f6344a352d13bc55601571
[ "Apache-2.0" ]
null
null
null
programs/oeis/104/A104626.asm
jmorken/loda
99c09d2641e858b074f6344a352d13bc55601571
[ "Apache-2.0" ]
null
null
null
; A104626: Numbers having three 1's in their base-phi representation. ; 4,5,6,8,19,48,124,323,844,2208,5779,15128,39604,103683,271444,710648,1860499,4870848,12752044,33385283,87403804,228826128,599074579,1568397608,4106118244,10749957123,28143753124,73681302248,192900153619,505019158608,1322157322204,3461452808003,9062201101804,23725150497408,62113250390419,162614600673848,425730551631124,1114577054219523,2918000611027444,7639424778862808 mov $2,1 mov $5,$0 lpb $0 add $3,$2 add $1,$3 trn $1,3 add $2,1 add $3,$1 trn $4,$0 sub $0,1 add $4,1 lpe add $4,1 add $1,$4 trn $1,4 lpb $5 add $1,1 sub $5,1 lpe add $1,4
26.5
372
0.754717
222e79e427d80ab2f1c3244ee46985a71720dc9c
148
asm
Assembly
other.7z/SFC.7z/SFC/ソースデータ/ゼルダの伝説神々のトライフォース/日本_Ver3/asm/z00_enmy4.asm
prismotizm/gigaleak
d082854866186a05fec4e2fdf1def0199e7f3098
[ "MIT" ]
null
null
null
other.7z/SFC.7z/SFC/ソースデータ/ゼルダの伝説神々のトライフォース/日本_Ver3/asm/z00_enmy4.asm
prismotizm/gigaleak
d082854866186a05fec4e2fdf1def0199e7f3098
[ "MIT" ]
null
null
null
other.7z/SFC.7z/SFC/ソースデータ/ゼルダの伝説神々のトライフォース/日本_Ver3/asm/z00_enmy4.asm
prismotizm/gigaleak
d082854866186a05fec4e2fdf1def0199e7f3098
[ "MIT" ]
null
null
null
Name: z00_enmy4.asm Type: file Size: 272768 Last-Modified: '2016-05-13T04:36:32Z' SHA-1: FDCC0B103288F475222088A4870D925DA1499736 Description: null
21.142857
47
0.817568
853b2644595bc9ee2740b90290b003b0841d6fbb
355
asm
Assembly
programs/oeis/033/A033876.asm
karttu/loda
9c3b0fc57b810302220c044a9d17db733c76a598
[ "Apache-2.0" ]
1
2021-03-15T11:38:20.000Z
2021-03-15T11:38:20.000Z
programs/oeis/033/A033876.asm
karttu/loda
9c3b0fc57b810302220c044a9d17db733c76a598
[ "Apache-2.0" ]
null
null
null
programs/oeis/033/A033876.asm
karttu/loda
9c3b0fc57b810302220c044a9d17db733c76a598
[ "Apache-2.0" ]
null
null
null
; A033876: Expansion of 1/(2*x) * (1/(1-4*x)^(3/2)-1). ; 3,15,70,315,1386,6006,25740,109395,461890,1939938,8112468,33801950,140408100,581690700,2404321560,9917826435,40838108850,167890003050,689232644100,2825853840810,11572544300460,47342226683700,193485622098600,790066290235950,3223470464162676 add $0,2 mov $1,$0 mul $1,2 bin $1,$0 mul $1,$0 div $1,4
35.5
241
0.769014
66770d401ccf168ecb47119496b494c8fa531f48
694
asm
Assembly
oeis/085/A085282.asm
neoneye/loda-programs
84790877f8e6c2e821b183d2e334d612045d29c0
[ "Apache-2.0" ]
11
2021-08-22T19:44:55.000Z
2022-03-20T16:47:57.000Z
oeis/085/A085282.asm
neoneye/loda-programs
84790877f8e6c2e821b183d2e334d612045d29c0
[ "Apache-2.0" ]
9
2021-08-29T13:15:54.000Z
2022-03-09T19:52:31.000Z
oeis/085/A085282.asm
neoneye/loda-programs
84790877f8e6c2e821b183d2e334d612045d29c0
[ "Apache-2.0" ]
3
2021-08-22T20:56:47.000Z
2021-09-29T06:26:12.000Z
; A085282: Expansion of (1 - 5*x + 5*x^2)/((1-x)*(1-3*x)*(1-4*x)). ; Submitted by Jamie Morken(s3) ; 1,3,10,35,126,463,1730,6555,25126,97223,379050,1486675,5858126,23166783,91869970,365088395,1453179126,5791193143,23100202490,92207099715,368247268126,1471245680303,5879752544610,23503319648635,93966207005126,375723613252263,1502470808704330,6008612301903155,24030636408870126,96111107239253023,384410113768329650,1537537509507271275,6149841201330943126,24598438295229346583,98390973650634108570,393555556011686600995,1574197208274196904126,6296713785779139116943,25186630001163610969090 mov $2,$0 add $0,1 mov $1,3 pow $1,$0 add $2,$0 mov $3,2 pow $3,$2 add $1,$3 mov $0,$1 div $0,6 add $0,1
43.375
488
0.805476
3173f31ffd2e2edb9df3a8be36aaded7c9f86c48
553
asm
Assembly
linux64/lesson20.asm
mashingan/notes-asmtutor
88532e0b364a63cd1e7578a537807795d429fc2f
[ "MIT" ]
1
2021-11-05T06:41:49.000Z
2021-11-05T06:41:49.000Z
linux64/lesson20.asm
mashingan/notes-asmtutor
88532e0b364a63cd1e7578a537807795d429fc2f
[ "MIT" ]
null
null
null
linux64/lesson20.asm
mashingan/notes-asmtutor
88532e0b364a63cd1e7578a537807795d429fc2f
[ "MIT" ]
null
null
null
format ELF64 executable 3 entry start include 'procs.inc' segment readable childMsg db 'This is the child process', 0h parentMsg db 'This is the parent process', 0h segment readable executable start: mov rax, 57 ; SYS_FORK (kernel opcode 57) syscall cmp rax, 0 ; if eax is zero, we are in the child process jnz .parent ; jump to child if eax is zero .child: mov rax, childMsg call sprintLF call quitProgram .parent: mov rax, parentMsg call sprintLF call quitProgram
20.481481
65
0.654611
6ab6ddf58cd6c65b37cbd9eff1e5feac7dd00059
1,713
asm
Assembly
programs/oeis/154/A154105.asm
karttu/loda
9c3b0fc57b810302220c044a9d17db733c76a598
[ "Apache-2.0" ]
1
2021-03-15T11:38:20.000Z
2021-03-15T11:38:20.000Z
programs/oeis/154/A154105.asm
karttu/loda
9c3b0fc57b810302220c044a9d17db733c76a598
[ "Apache-2.0" ]
null
null
null
programs/oeis/154/A154105.asm
karttu/loda
9c3b0fc57b810302220c044a9d17db733c76a598
[ "Apache-2.0" ]
null
null
null
; A154105: a(n) = 12*n^2 + 18*n + 7. ; 7,37,91,169,271,397,547,721,919,1141,1387,1657,1951,2269,2611,2977,3367,3781,4219,4681,5167,5677,6211,6769,7351,7957,8587,9241,9919,10621,11347,12097,12871,13669,14491,15337,16207,17101,18019,18961,19927,20917,21931,22969,24031,25117,26227,27361,28519,29701,30907,32137,33391,34669,35971,37297,38647,40021,41419,42841,44287,45757,47251,48769,50311,51877,53467,55081,56719,58381,60067,61777,63511,65269,67051,68857,70687,72541,74419,76321,78247,80197,82171,84169,86191,88237,90307,92401,94519,96661,98827,101017,103231,105469,107731,110017,112327,114661,117019,119401,121807,124237,126691,129169,131671,134197,136747,139321,141919,144541,147187,149857,152551,155269,158011,160777,163567,166381,169219,172081,174967,177877,180811,183769,186751,189757,192787,195841,198919,202021,205147,208297,211471,214669,217891,221137,224407,227701,231019,234361,237727,241117,244531,247969,251431,254917,258427,261961,265519,269101,272707,276337,279991,283669,287371,291097,294847,298621,302419,306241,310087,313957,317851,321769,325711,329677,333667,337681,341719,345781,349867,353977,358111,362269,366451,370657,374887,379141,383419,387721,392047,396397,400771,405169,409591,414037,418507,423001,427519,432061,436627,441217,445831,450469,455131,459817,464527,469261,474019,478801,483607,488437,493291,498169,503071,507997,512947,517921,522919,527941,532987,538057,543151,548269,553411,558577,563767,568981,574219,579481,584767,590077,595411,600769,606151,611557,616987,622441,627919,633421,638947,644497,650071,655669,661291,666937,672607,678301,684019,689761,695527,701317,707131,712969,718831,724717,730627,736561,742519,748501 mov $1,$0 mul $1,2 add $1,3 mul $1,$0 mul $1,6 add $1,7
171.3
1,618
0.825452
4b3a54230ad181ac5f41c264159be052b0e70c4f
3,265
asm
Assembly
third_party/virtualbox/src/VBox/Devices/BiosCommonCode/__U4M.asm
Fimbure/icebox-1
0b81992a53e1b410955ca89bdb6f8169d6f2da86
[ "MIT" ]
521
2019-03-29T15:44:08.000Z
2022-03-22T09:46:19.000Z
third_party/virtualbox/src/VBox/Devices/BiosCommonCode/__U4M.asm
Fimbure/icebox-1
0b81992a53e1b410955ca89bdb6f8169d6f2da86
[ "MIT" ]
30
2019-06-04T17:00:49.000Z
2021-09-08T20:44:19.000Z
third_party/virtualbox/src/VBox/Devices/BiosCommonCode/__U4M.asm
Fimbure/icebox-1
0b81992a53e1b410955ca89bdb6f8169d6f2da86
[ "MIT" ]
99
2019-03-29T16:04:13.000Z
2022-03-28T16:59:34.000Z
; $Id: __U4M.asm $ ;; @file ; Compiler support routines. ; ; ; Copyright (C) 2012-2017 Oracle Corporation ; ; This file is part of VirtualBox Open Source Edition (OSE), as ; available from http://www.virtualbox.org. This file is free software; ; you can redistribute it and/or modify it under the terms of the GNU ; General Public License (GPL) as published by the Free Software ; Foundation, in version 2 as it comes in the "COPYING" file of the ; VirtualBox OSE distribution. VirtualBox OSE is distributed in the ; hope that it will be useful, but WITHOUT ANY WARRANTY of any kind. ; ;******************************************************************************* ;* Exported Symbols * ;******************************************************************************* public __U4M .8086 _TEXT segment public 'CODE' use16 assume cs:_TEXT ;; ; 32-bit unsigned multiplication. ; ; @param dx:ax Factor 1. ; @param cx:bx Factor 2. ; @returns dx:ax Result. ; __U4M: pushf if VBOX_BIOS_CPU ge 80386 .386 push eax push edx push ecx rol eax, 16 mov ax, dx ror eax, 16 xor edx, edx shr ecx, 16 mov cx, bx mul ecx ; eax * ecx -> edx:eax pop ecx pop edx ror eax, 16 mov dx, ax add sp, 2 pop ax rol eax, 16 .8086 else push si ; high result push di ; low result ; ; dx:ax * cx:bx = ;----------------------- ; ax*bx ; + dx*bx ; only lower 16 bits relevant. ; + ax*cx ; ditto ; +dx*cx ; not relevant ; ------------- ; = dx:ax ; push ax ; stash the low factor 1 part for the 3rd multiplication. mov di, dx ; stash the high factor 1 part for the 2nd multiplication. ; multiply the two low factor "digits": ax * bx mul bx mov si, dx xchg di, ax ; save low result and loads high factor 1 into ax for the next step ; Multiply the low right "digit" by the high left one and add it to the high result part mul bx add si, ax ; Multiply the high right "digit" by the low left on and add it ot the high result part. pop ax mul cx add si, ax ; Load the result. mov dx, si mov ax, di pop di pop si endif popf ret _TEXT ends end
29.681818
107
0.394793
13d357528ee91f582de955950e6598de561ff38b
374
asm
Assembly
programs/oeis/220/A220128.asm
neoneye/loda
afe9559fb53ee12e3040da54bd6aa47283e0d9ec
[ "Apache-2.0" ]
22
2018-02-06T19:19:31.000Z
2022-01-17T21:53:31.000Z
programs/oeis/220/A220128.asm
neoneye/loda
afe9559fb53ee12e3040da54bd6aa47283e0d9ec
[ "Apache-2.0" ]
41
2021-02-22T19:00:34.000Z
2021-08-28T10:47:47.000Z
programs/oeis/220/A220128.asm
neoneye/loda
afe9559fb53ee12e3040da54bd6aa47283e0d9ec
[ "Apache-2.0" ]
5
2021-02-24T21:14:16.000Z
2021-08-09T19:48:05.000Z
; A220128: 1 followed by period 6: (1, 3, 2, 3, 1, 4) repeated; offset 0. ; 1,1,3,2,3,1,4,1,3,2,3,1,4,1,3,2,3,1,4,1,3,2,3,1,4,1,3,2,3,1,4,1,3,2,3,1,4,1,3,2,3,1,4,1,3,2,3,1,4,1,3,2,3,1,4,1,3,2,3,1,4,1,3,2,3,1,4,1,3,2,3,1,4,1,3,2,3,1,4,1,3,2,3,1,4,1,3,2,3,1,4,1,3,2,3,1,4,1,3,2 lpb $0 sub $0,1 mul $0,2 mod $1,3 add $1,$0 sub $0,1 div $0,2 lpe add $1,1 mov $0,$1
26.714286
201
0.516043
b9fd92476b37965acfe1a18d65fe8bca1301e66f
299
asm
Assembly
examples/asm/echo.asm
zignig/Boneless-CPU
10bb571b4efab015e1bf147c78f0b8b3c93443e4
[ "Apache-2.0", "0BSD" ]
5
2019-03-30T01:08:13.000Z
2020-05-04T06:02:41.000Z
examples/asm/echo.asm
zignig/Boneless-CPU
10bb571b4efab015e1bf147c78f0b8b3c93443e4
[ "Apache-2.0", "0BSD" ]
null
null
null
examples/asm/echo.asm
zignig/Boneless-CPU
10bb571b4efab015e1bf147c78f0b8b3c93443e4
[ "Apache-2.0", "0BSD" ]
1
2020-05-04T06:02:17.000Z
2020-05-04T06:02:17.000Z
reset: NOP loop: LDX R0, R2,0 ; load a word from 0 CMP R2,R0 ; compare with R0 (0) JNZ char ; is it not neto , go to cher STX R4,R4,1 ; send a break to the simulatore J loop ; do it again char: STX R0,R3,0 ;output the char back out J loop ; lump back to loop
23
48
0.598662
9540bc1d11eb4464039af0dd891774ccd271ac4d
757
asm
Assembly
oeis/007/A007420.asm
neoneye/loda-programs
84790877f8e6c2e821b183d2e334d612045d29c0
[ "Apache-2.0" ]
11
2021-08-22T19:44:55.000Z
2022-03-20T16:47:57.000Z
oeis/007/A007420.asm
neoneye/loda-programs
84790877f8e6c2e821b183d2e334d612045d29c0
[ "Apache-2.0" ]
9
2021-08-29T13:15:54.000Z
2022-03-09T19:52:31.000Z
oeis/007/A007420.asm
neoneye/loda-programs
84790877f8e6c2e821b183d2e334d612045d29c0
[ "Apache-2.0" ]
3
2021-08-22T20:56:47.000Z
2021-09-29T06:26:12.000Z
; A007420: Berstel sequence: a(n+1) = 2*a(n) - 4*a(n-1) + 4*a(n-2). ; Submitted by Jamie Morken(s4) ; 0,0,1,2,0,-4,0,16,16,-32,-64,64,256,0,-768,-512,2048,3072,-4096,-12288,4096,40960,16384,-114688,-131072,262144,589824,-393216,-2097152,-262144,6291456,5242880,-15728640,-27262976,29360128,104857600,-16777216,-335544320,-184549376,905969664,1207959552,-1946157056,-5100273664,2415919104,17448304640,4831838208,-50465865728,-50465865728,120259084288,240518168576,-201863462912,-884763262976,0,2731599200256,1924145348608,-7078106103808,-10926396801024,14156212207616,43705587204096,-12919261626368 lpb $0 sub $0,1 add $3,1 add $2,$3 add $2,$1 add $3,12 sub $3,$2 add $1,$3 mul $1,2 sub $2,1 mul $3,2 add $3,$2 lpe mov $0,$2 div $0,48
37.85
497
0.718626
8567e3723088feb2d7efbcbcd5e0806725892dfb
657
asm
Assembly
oeis/308/A308136.asm
neoneye/loda-programs
84790877f8e6c2e821b183d2e334d612045d29c0
[ "Apache-2.0" ]
11
2021-08-22T19:44:55.000Z
2022-03-20T16:47:57.000Z
oeis/308/A308136.asm
neoneye/loda-programs
84790877f8e6c2e821b183d2e334d612045d29c0
[ "Apache-2.0" ]
9
2021-08-29T13:15:54.000Z
2022-03-09T19:52:31.000Z
oeis/308/A308136.asm
neoneye/loda-programs
84790877f8e6c2e821b183d2e334d612045d29c0
[ "Apache-2.0" ]
3
2021-08-22T20:56:47.000Z
2021-09-29T06:26:12.000Z
; A308136: Number of (undirected) Hamiltonian paths in the 2n-crossed prism graph. ; 72,288,960,2880,8064,21504,55296,138240,337920,811008,1916928,4472832,10321920,23592960,53477376,120324096,268959744,597688320,1321205760,2906652672,6366953472,13891534848,30198988800,65431142400,141331267584,304405807104,653908770816,1401233080320,2995739688960,6390911336448,13606456393728,28913719836672,61332132986880,129879811031040,274603029037056,579717505744896,1222107174273024,2572857208995840,5409597208657920,11360154138181632,23828615997161472,49926623994052608,104497585103831040 mov $1,$0 add $1,3 bin $1,2 mov $2,2 pow $2,$0 mul $1,$2 mov $0,$1 mul $0,24
54.75
495
0.847793
822c546da147d9bd03b0afae1c6615e09ce4be46
228
asm
Assembly
libsrc/math/mbf64/c/sccz80/___mbf64_set_zero.asm
jpoikela/z88dk
7108b2d7e3a98a77de99b30c9a7c9199da9c75cb
[ "ClArtistic" ]
640
2017-01-14T23:33:45.000Z
2022-03-30T11:28:42.000Z
libsrc/math/mbf64/c/sccz80/___mbf64_set_zero.asm
jpoikela/z88dk
7108b2d7e3a98a77de99b30c9a7c9199da9c75cb
[ "ClArtistic" ]
1,600
2017-01-15T16:12:02.000Z
2022-03-31T12:11:12.000Z
libsrc/math/mbf64/c/sccz80/___mbf64_set_zero.asm
jpoikela/z88dk
7108b2d7e3a98a77de99b30c9a7c9199da9c75cb
[ "ClArtistic" ]
215
2017-01-17T10:43:03.000Z
2022-03-23T17:25:02.000Z
SECTION code_fp_mbf64 PUBLIC ___mbf64_set_zero EXTERN ___mbf64_FA ___mbf64_set_zero: ld b,8 ld hl,___mbf64_FA zero_1: ld (hl),0 inc hl djnz zero_1 ret
14.25
30
0.548246
4b864393554323e0be64da38c21a4f91c330a10a
884
asm
Assembly
libsrc/cpc/cpc_PrintGphStrXY2X_callee.asm
jpoikela/z88dk
7108b2d7e3a98a77de99b30c9a7c9199da9c75cb
[ "ClArtistic" ]
640
2017-01-14T23:33:45.000Z
2022-03-30T11:28:42.000Z
libsrc/cpc/cpc_PrintGphStrXY2X_callee.asm
jpoikela/z88dk
7108b2d7e3a98a77de99b30c9a7c9199da9c75cb
[ "ClArtistic" ]
1,600
2017-01-15T16:12:02.000Z
2022-03-31T12:11:12.000Z
libsrc/cpc/cpc_PrintGphStrXY2X_callee.asm
jpoikela/z88dk
7108b2d7e3a98a77de99b30c9a7c9199da9c75cb
[ "ClArtistic" ]
215
2017-01-17T10:43:03.000Z
2022-03-23T17:25:02.000Z
; ; Amstrad CPC library ; ; ****************************************************** ; ** Librería de rutinas para Amstrad CPC ** ; ** Raúl Simarro, Artaburu 2009 ** ; ****************************************************** ; ; void cpc_PrintGphStrXY2X(char *, int x, int y) __smallc ; ; ; $Id: cpc_PrintGphStrXY2X_callee.asm $ ; SECTION code_clib PUBLIC cpc_PrintGphStrXY2X_callee PUBLIC _cpc_PrintGphStrXY2X_callee EXTERN cpc_GetScrAddress0 EXTERN cpc_PrintGphStr0 .cpc_PrintGphStrXY2X_callee ._cpc_PrintGphStrXY2X_callee ;preparación datos impresión. El ancho y alto son fijos! pop bc pop hl ; l=y pop de ; e=x ld a,e push bc ; ret addr call cpc_GetScrAddress0 ; hl= screen address pop bc ; ret addr pop de ; text push bc ld a,1 JP cpc_PrintGphStr0
21.560976
66
0.556561
aacd287f63899561cf8160cc80df379caaea6bcf
353
asm
Assembly
programs/oeis/131/A131426.asm
neoneye/loda
afe9559fb53ee12e3040da54bd6aa47283e0d9ec
[ "Apache-2.0" ]
22
2018-02-06T19:19:31.000Z
2022-01-17T21:53:31.000Z
programs/oeis/131/A131426.asm
neoneye/loda
afe9559fb53ee12e3040da54bd6aa47283e0d9ec
[ "Apache-2.0" ]
41
2021-02-22T19:00:34.000Z
2021-08-28T10:47:47.000Z
programs/oeis/131/A131426.asm
neoneye/loda
afe9559fb53ee12e3040da54bd6aa47283e0d9ec
[ "Apache-2.0" ]
5
2021-02-24T21:14:16.000Z
2021-08-09T19:48:05.000Z
; A131426: a(n) = 2*prime(n) - 3. ; 1,3,7,11,19,23,31,35,43,55,59,71,79,83,91,103,115,119,131,139,143,155,163,175,191,199,203,211,215,223,251,259,271,275,295,299,311,323,331,343,355,359,379,383,391,395,419,443,451,455,463,475,479,499,511,523,535,539,551,559,563,583,611 seq $0,6005 ; The odd prime numbers together with 1. mov $1,$0 trn $0,3 add $0,$1
44.125
235
0.685552
04e28f980994309a5fa444b2794b8ac13270081d
310
asm
Assembly
programs/oeis/021/A021149.asm
neoneye/loda
afe9559fb53ee12e3040da54bd6aa47283e0d9ec
[ "Apache-2.0" ]
22
2018-02-06T19:19:31.000Z
2022-01-17T21:53:31.000Z
programs/oeis/021/A021149.asm
neoneye/loda
afe9559fb53ee12e3040da54bd6aa47283e0d9ec
[ "Apache-2.0" ]
41
2021-02-22T19:00:34.000Z
2021-08-28T10:47:47.000Z
programs/oeis/021/A021149.asm
neoneye/loda
afe9559fb53ee12e3040da54bd6aa47283e0d9ec
[ "Apache-2.0" ]
5
2021-02-24T21:14:16.000Z
2021-08-09T19:48:05.000Z
; A021149: Decimal expansion of 1/145. ; 0,0,6,8,9,6,5,5,1,7,2,4,1,3,7,9,3,1,0,3,4,4,8,2,7,5,8,6,2,0,6,8,9,6,5,5,1,7,2,4,1,3,7,9,3,1,0,3,4,4,8,2,7,5,8,6,2,0,6,8,9,6,5,5,1,7,2,4,1,3,7,9,3,1,0,3,4,4,8,2,7,5,8,6,2,0,6,8,9,6,5,5,1,7,2,4,1,3,7 add $0,2 mov $1,10 pow $1,$0 mul $1,4 div $1,5800 mod $1,10 mov $0,$1
28.181818
199
0.541935
4b3ec8b7010a72dee8db770ccef722432d7954b1
3,380
asm
Assembly
Library/BorlandRTL/h_pada.asm
steakknife/pcgeos
95edd7fad36df400aba9bab1d56e154fc126044a
[ "Apache-2.0" ]
504
2018-11-18T03:35:53.000Z
2022-03-29T01:02:51.000Z
Library/BorlandRTL/h_pada.asm
steakknife/pcgeos
95edd7fad36df400aba9bab1d56e154fc126044a
[ "Apache-2.0" ]
96
2018-11-19T21:06:50.000Z
2022-03-06T10:26:48.000Z
Library/BorlandRTL/h_pada.asm
steakknife/pcgeos
95edd7fad36df400aba9bab1d56e154fc126044a
[ "Apache-2.0" ]
73
2018-11-19T20:46:53.000Z
2022-03-29T00:59:26.000Z
; $Id: h_pada.asm,v 1.1 97/04/07 12:04:01 newdeal Exp $ ;[]-----------------------------------------------------------------[] ;| H_PADA.ASM -- long pointer routines | ;[]-----------------------------------------------------------------[] ; ; C/C++ Run Time Library - Version 5.0 ; ; Copyright (c) 1987, 1992 by Borland International ; All Rights Reserved. ; INCLUDE rules.asi ; calls to these routines are generated by the compiler to perform ; arithmetic operations on long pointers. _TEXT SEGMENT BYTE PUBLIC 'CODE' ASSUME CS:_TEXT public PADA@ public F_PADA@ public N_PADA@ N_PADA@ proc near call F_PADA@ ret N_PADA@ endp PADA@ proc far .fall_thru PADA@ endp F_PADA@ proc far mov es,dx xchg ax,bx ; ; Pointer to memory cell to increment is in es:bx ; Increment amount is ax:cx ; mov dx, es:2[bx] ; DX <- Selector push bx mov bx, es:[bx] ; BX <- Offset or cx,cx ; Is increment negative? jge ada1 ; No, ... not ax ; Yes, ... not cx add ax,1 adc cx,0 jmp sba1 ada1 label near add bx,ax ; Add offsets jnc adaok add dx,1000h adaok: mov ah,cl mov cl,4 shl ah,cl xor al,al add dx,ax mov ch,bl shr bx,cl add dx,bx mov al,ch and ax,0fh pop bx mov es:[bx], ax mov es:2[bx], dx ret F_PADA@ endp public PSBA@ public F_PSBA@ public N_PSBA@ N_PSBA@ proc near call F_PSBA@ ret N_PSBA@ endp PSBA@ proc far .fall_thru PSBA@ endp F_PSBA@ proc far mov es,dx xchg ax,bx ; ; Pointer to memory cell to increment is in es:bx ; Increment amount is ax:cx ; mov dx,es:2[bx] push bx mov bx,es:[bx] or cx,cx jge sba1 not ax not cx add ax,1 adc cx,0 jmp ada1 sba1 label near sub bx,ax jnc sbaok sub dx,1000h sbaok: mov ah,cl mov cl,4 shl ah,cl xor al,al sub dx,ax mov ch,bl shr bx,cl add dx,bx mov al,ch and ax,0fh pop bx mov es:[bx],ax mov es:2[bx],dx ret F_PSBA@ endp _TEXT ENDS
27.04
71
0.341716
4fbe2ea573cd61b6b5c0e055ea9c82500ac15cf2
944
asm
Assembly
src/boot.asm
dysoco/viloni
e6e851bbd39cb24ea20b5f32b2391fd1e0d8a7d2
[ "MIT" ]
null
null
null
src/boot.asm
dysoco/viloni
e6e851bbd39cb24ea20b5f32b2391fd1e0d8a7d2
[ "MIT" ]
null
null
null
src/boot.asm
dysoco/viloni
e6e851bbd39cb24ea20b5f32b2391fd1e0d8a7d2
[ "MIT" ]
null
null
null
extern GDT_DESC ; Multiboot header MBALIGN equ 1<<0 MEMINFO equ 1<<1 FLAGS equ MBALIGN | MEMINFO MAGIC equ 0x1BADB002 CHECKSUM equ -(MAGIC+FLAGS) section .multiboot align 4 dd MAGIC dd FLAGS dd CHECKSUM section .bss align 16 stack_bottom: resb 16386 ; 16KiB stack_top: section .text bits 32 global _start _start: cli cld ; We are now in 32bit protected mode, PE is enabled ; eax has 0x1BADB002, ebx has phy address of the Multiboot ; information data structure ; Set up stack mov esp, stack_top ; Clear screen %define VGABUF 0xB8000 ; Clear screen mov ecx, 2000 ; 80 * 25 characters in the buffer jmp .cls_end .cls: dec ecx mov word [VGABUF + ecx * 2], 0x0F20 .cls_end: cmp ecx, 0 jne .cls ; load GDT xchg bx, bx lgdt [GDT_DESC] xchg bx, bx ; load Paging ; Call kmain ; Ciclar infinitamente cli jmp $ .end:
15.225806
62
0.643008
ccbcff15afa762899d7e3d34111734e4272be0b1
971
asm
Assembly
external/source/shellcode/windows/x64/src/stager/stager_reverse_tcp_nx.asm
OsmanDere/metasploit-framework
b7a014a5d22d3b57157e301d4af57e3a31ad03a9
[ "BSD-2-Clause", "BSD-3-Clause" ]
26,932
2015-01-01T00:04:51.000Z
2022-03-31T22:51:38.000Z
external/source/shellcode/windows/x64/src/stager/stager_reverse_tcp_nx.asm
Kilo-411/metasploit-framework
aaf27d7fa51390895dea63c58cb3b76e959d36f8
[ "BSD-2-Clause", "BSD-3-Clause" ]
11,048
2015-01-01T00:05:44.000Z
2022-03-31T21:49:52.000Z
external/source/shellcode/windows/x64/src/stager/stager_reverse_tcp_nx.asm
Kilo-411/metasploit-framework
aaf27d7fa51390895dea63c58cb3b76e959d36f8
[ "BSD-2-Clause", "BSD-3-Clause" ]
12,593
2015-01-01T01:01:20.000Z
2022-03-31T22:13:32.000Z
;-----------------------------------------------------------------------------; ; Author: Stephen Fewer (stephen_fewer[at]harmonysecurity[dot]com) ; Compatible: Windows 7, 2003 ; Architecture: x64 ; Size: 422 bytes ; Build: >build.py stager_reverse_tcp_nx ;-----------------------------------------------------------------------------; [BITS 64] [ORG 0] cld ; Clear the direction flag. and rsp, 0xFFFFFFFFFFFFFFF0 ; Ensure RSP is 16 byte aligned call start ; Call start, this pushes the address of 'api_call' onto the stack. %include "./src/block/block_api.asm" start: ; pop rbp ; pop off the address of 'api_call' for calling later. %include "./src/block/block_reverse_tcp.asm" ; By here we will have performed the reverse_tcp connection and EDI will be our socket. %include "./src/block/block_recv.asm" ; By now we will have recieved in the second stage into a RWX buffer and be executing it
46.238095
92
0.575695
873bc8bf628123df481282903992138514bbce8e
574
asm
Assembly
oeis/080/A080956.asm
neoneye/loda-programs
84790877f8e6c2e821b183d2e334d612045d29c0
[ "Apache-2.0" ]
11
2021-08-22T19:44:55.000Z
2022-03-20T16:47:57.000Z
oeis/080/A080956.asm
neoneye/loda-programs
84790877f8e6c2e821b183d2e334d612045d29c0
[ "Apache-2.0" ]
9
2021-08-29T13:15:54.000Z
2022-03-09T19:52:31.000Z
oeis/080/A080956.asm
neoneye/loda-programs
84790877f8e6c2e821b183d2e334d612045d29c0
[ "Apache-2.0" ]
3
2021-08-22T20:56:47.000Z
2021-09-29T06:26:12.000Z
; A080956: a(n) = (n+1)*(2-n)/2. ; 1,1,0,-2,-5,-9,-14,-20,-27,-35,-44,-54,-65,-77,-90,-104,-119,-135,-152,-170,-189,-209,-230,-252,-275,-299,-324,-350,-377,-405,-434,-464,-495,-527,-560,-594,-629,-665,-702,-740,-779,-819,-860,-902,-945,-989,-1034,-1080,-1127,-1175,-1224,-1274,-1325,-1377,-1430,-1484,-1539,-1595,-1652,-1710,-1769,-1829,-1890,-1952,-2015,-2079,-2144,-2210,-2277,-2345,-2414,-2484,-2555,-2627,-2700,-2774,-2849,-2925,-3002,-3080,-3159,-3239,-3320,-3402,-3485,-3569,-3654,-3740,-3827,-3915,-4004,-4094,-4185,-4277,-4370 bin $0,2 mov $1,1 sub $1,$0 mov $0,$1
71.75
501
0.60453
a2ddc0e8d05fc33cfa4dad414912926c42b476ec
171
asm
Assembly
sample/test.asm
hungalab/shapa
ca422dc05842bee62f6ffede3159c2bcdbb4d54a
[ "MIT" ]
1
2018-04-26T14:39:47.000Z
2018-04-26T14:39:47.000Z
sample/test.asm
hungalab/shapa
ca422dc05842bee62f6ffede3159c2bcdbb4d54a
[ "MIT" ]
null
null
null
sample/test.asm
hungalab/shapa
ca422dc05842bee62f6ffede3159c2bcdbb4d54a
[ "MIT" ]
null
null
null
DELAY 8 LDI r3,#4 LDI r0,#0 LDI r1,#8 LDI r4,#4 LDI r2,#0x20 lp: LD_ADD r0,r1,#0 ST_ADDS r2,r4,#0 ADDI r3,#-1 LD_ADD r0,r1,#0 ST_ADDS r2,r4,#1 BNZD r3,lp DONE
12.214286
19
0.619883
f28ce0285619b81cbbc09c6c12bc50c29a1d92f6
1,698
asm
Assembly
Library/Chart/SGroup/sgroupRelocate.asm
steakknife/pcgeos
95edd7fad36df400aba9bab1d56e154fc126044a
[ "Apache-2.0" ]
504
2018-11-18T03:35:53.000Z
2022-03-29T01:02:51.000Z
Library/Chart/SGroup/sgroupRelocate.asm
steakknife/pcgeos
95edd7fad36df400aba9bab1d56e154fc126044a
[ "Apache-2.0" ]
96
2018-11-19T21:06:50.000Z
2022-03-06T10:26:48.000Z
Library/Chart/SGroup/sgroupRelocate.asm
steakknife/pcgeos
95edd7fad36df400aba9bab1d56e154fc126044a
[ "Apache-2.0" ]
73
2018-11-19T20:46:53.000Z
2022-03-29T00:59:26.000Z
COMMENT @%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% Copyright (c) GeoWorks 1992 -- All Rights Reserved PROJECT: PC GEOS MODULE: FILE: sgroupRelocate.asm AUTHOR: Chris Boyke ROUTINES: Name Description ---- ----------- REVISION HISTORY: Name Date Description ---- ---- ----------- cdb 6/30/92 Initial version. DESCRIPTION: $Id: sgroupRelocate.asm,v 1.1 97/04/04 17:46:56 newdeal Exp $ %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%@ COMMENT @%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% SeriesGroupRelocate %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% DESCRIPTION: Handle relocation of the OD array managed by the series group. PASS: *ds:si = SeriesGroupClass object ds:di = SeriesGroupClass instance data es = segment o fSeriesGroupClass ax - MSG_META_RELOCATE/MSG_META_UNRELOCATE cx - handle of block containing relocation dx - VMRelocType: VMRT_UNRELOCATE_BEFORE_WRITE VMRT_RELOCATE_AFTER_READ VMRT_RELOCATE_AFTER_WRITE bp - data to pass to ObjRelocOrUnRelocSuper RETURN: DESTROYED: nothing REGISTER/STACK USAGE: PSEUDO CODE/STRATEGY: KNOWN BUGS/SIDE EFFECTS/CAVEATS/IDEAS: REVISION HISTORY: Name Date Description ---- ---- ----------- cdb 6/30/92 Initial version. %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%@ SeriesGroupRelocate method dynamic SeriesGroupClass, reloc mov cx, COMT_DROP_LINES call ChartObjectRelocOrUnRelocArray mov di, offset SeriesGroupClass call ObjRelocOrUnRelocSuper ret SeriesGroupRelocate endm
22.342105
71
0.555948
1083f5999ae4df38a813bcaf0b7f60a1357167e7
830
asm
Assembly
MicroProcessor Lab Programs/3b.asm
MyCollegeForums/4thSemISE
7c8b64c594a081954e2a011e1dcac71638d5f9b5
[ "Apache-2.0" ]
null
null
null
MicroProcessor Lab Programs/3b.asm
MyCollegeForums/4thSemISE
7c8b64c594a081954e2a011e1dcac71638d5f9b5
[ "Apache-2.0" ]
1
2018-02-06T10:51:31.000Z
2018-02-06T10:51:31.000Z
MicroProcessor Lab Programs/3b.asm
MyCollegeForums/4thSemISE
7c8b64c594a081954e2a011e1dcac71638d5f9b5
[ "Apache-2.0" ]
3
2018-02-06T10:46:32.000Z
2018-04-23T13:41:07.000Z
assume cs:code, ds:data data segment pa equ 20a0h pb equ 20a1h pc equ 20a2h cr equ 20a3h data ends code segment start: mov ax,data mov ds,ax mov dx,cr mov al,80h out dx,al mov cx,10h ;degree of rotation mov al,22h ; the quadrant mov dx,pa rot_clock: out dx,al ror al,1 ;clockwise call delay loop rot_clock mov ah,4ch int 21h delay proc mov bx,000ffh l2: mov di,02fffh l1: dec di jnz l1 dec bx jnz l2 ret delay endp code ends end start
19.302326
47
0.398795