代码搜索:Executable
找到约 10,000 项符合「Executable」的源代码
代码结果 10,000
www.eeworm.com/read/316294/13525688
prj 0511.prj
[Project Header]
Version = 811
Pathname = "/d/每一天/每一天/每一天/080511/0511.prj"
CVI Dir = "/c/program files/national instruments/cvi81"
IVI Standard Root Dir = "/C/Program Files/IVI"
VXIplug&play Fram
www.eeworm.com/read/149876/5695618
mh solaris.mh
# Host: PowerPC, running Solaris 2
XM_FILE= xm-solaris.h
XDEPFILES= ser-tcp.o
XM_CLIBS= -lsocket -lnsl
NAT_FILE= nm-solaris.h
NATDEPFILES= corelow.o core-sol2.o solib.o fork-child.o procfs.o \
proc
www.eeworm.com/read/149876/5696025
mh sun4sol2.mh
# Host: Sun 4 or Sparcstation, running Solaris 2
XM_FILE= xm-sun4sol2.h
XDEPFILES= ser-tcp.o
XM_CLIBS= -lsocket -lnsl
NAT_FILE= nm-sun4sol2.h
NATDEPFILES= corelow.o core-sol2.o solib.o fork-child.o
www.eeworm.com/read/149876/5696563
odump
#!/bin/ksh
# First source /app/appserver
. /app/appserver
# Exec the executable.
exec $APPROOT/usr/contrib/bin/$(basename $0) "$@"
www.eeworm.com/read/149876/5696652
pa64 symaddr.pa64
#!/bin/ksh
# Get the address of a symbol in Hex.
# $1 = object/executable file name
# $2 = symbol name
/usr/ccs/bin/elfdump -t +s .symtab "$1" | grep "$2"$ | awk '{print $6}'
exit 0
www.eeworm.com/read/149876/5696654
symaddr
#!/bin/ksh
# Get the address of a symbol in Hex.
# $1 = object/executable file name
# $2 = symbol name
${srcdir}/gdb.hp/tools/odump -sym "$1" | grep "$2"$ | awk '{print $1}'
exit 0
www.eeworm.com/read/148694/5711057
mh solaris.mh
# Host: PowerPC, running Solaris 2
XM_FILE= xm-solaris.h
XDEPFILES= ser-tcp.o
XM_CLIBS= -lsocket -lnsl
NAT_FILE= nm-solaris.h
NATDEPFILES= corelow.o core-sol2.o solib.o fork-child.o procfs.o \
proc
www.eeworm.com/read/148694/5711469
mh sun4sol2.mh
# Host: Sun 4 or Sparcstation, running Solaris 2
XM_FILE= xm-sun4sol2.h
XDEPFILES= ser-tcp.o
XM_CLIBS= -lsocket -lnsl
NAT_FILE= nm-sun4sol2.h
NATDEPFILES= corelow.o core-sol2.o solib.o fork-child.o
www.eeworm.com/read/148694/5711997
odump
#!/bin/ksh
# First source /app/appserver
. /app/appserver
# Exec the executable.
exec $APPROOT/usr/contrib/bin/$(basename $0) "$@"
www.eeworm.com/read/148694/5712086
pa64 symaddr.pa64
#!/bin/ksh
# Get the address of a symbol in Hex.
# $1 = object/executable file name
# $2 = symbol name
/usr/ccs/bin/elfdump -t +s .symtab "$1" | grep "$2"$ | awk '{print $6}'
exit 0