代码搜索:Executable

找到约 10,000 项符合「Executable」的源代码

代码结果 10,000
www.eeworm.com/read/316294/13525688

prj 0511.prj

[Project Header] Version = 811 Pathname = "/d/每一天/每一天/每一天/080511/0511.prj" CVI Dir = "/c/program files/national instruments/cvi81" IVI Standard Root Dir = "/C/Program Files/IVI" VXIplug&play Fram
www.eeworm.com/read/149876/5695618

mh solaris.mh

# Host: PowerPC, running Solaris 2 XM_FILE= xm-solaris.h XDEPFILES= ser-tcp.o XM_CLIBS= -lsocket -lnsl NAT_FILE= nm-solaris.h NATDEPFILES= corelow.o core-sol2.o solib.o fork-child.o procfs.o \ proc
www.eeworm.com/read/149876/5696025

mh sun4sol2.mh

# Host: Sun 4 or Sparcstation, running Solaris 2 XM_FILE= xm-sun4sol2.h XDEPFILES= ser-tcp.o XM_CLIBS= -lsocket -lnsl NAT_FILE= nm-sun4sol2.h NATDEPFILES= corelow.o core-sol2.o solib.o fork-child.o
www.eeworm.com/read/149876/5696563

odump

#!/bin/ksh # First source /app/appserver . /app/appserver # Exec the executable. exec $APPROOT/usr/contrib/bin/$(basename $0) "$@"
www.eeworm.com/read/149876/5696652

pa64 symaddr.pa64

#!/bin/ksh # Get the address of a symbol in Hex. # $1 = object/executable file name # $2 = symbol name /usr/ccs/bin/elfdump -t +s .symtab "$1" | grep "$2"$ | awk '{print $6}' exit 0
www.eeworm.com/read/149876/5696654

symaddr

#!/bin/ksh # Get the address of a symbol in Hex. # $1 = object/executable file name # $2 = symbol name ${srcdir}/gdb.hp/tools/odump -sym "$1" | grep "$2"$ | awk '{print $1}' exit 0
www.eeworm.com/read/148694/5711057

mh solaris.mh

# Host: PowerPC, running Solaris 2 XM_FILE= xm-solaris.h XDEPFILES= ser-tcp.o XM_CLIBS= -lsocket -lnsl NAT_FILE= nm-solaris.h NATDEPFILES= corelow.o core-sol2.o solib.o fork-child.o procfs.o \ proc
www.eeworm.com/read/148694/5711469

mh sun4sol2.mh

# Host: Sun 4 or Sparcstation, running Solaris 2 XM_FILE= xm-sun4sol2.h XDEPFILES= ser-tcp.o XM_CLIBS= -lsocket -lnsl NAT_FILE= nm-sun4sol2.h NATDEPFILES= corelow.o core-sol2.o solib.o fork-child.o
www.eeworm.com/read/148694/5711997

odump

#!/bin/ksh # First source /app/appserver . /app/appserver # Exec the executable. exec $APPROOT/usr/contrib/bin/$(basename $0) "$@"
www.eeworm.com/read/148694/5712086

pa64 symaddr.pa64

#!/bin/ksh # Get the address of a symbol in Hex. # $1 = object/executable file name # $2 = symbol name /usr/ccs/bin/elfdump -t +s .symtab "$1" | grep "$2"$ | awk '{print $6}' exit 0