代码搜索:exec
找到约 10,000 项符合「exec」的源代码
代码结果 10,000
www.eeworm.com/read/372834/2769088
c gui_exec.c
/*
*********************************************************************************************************
* uC/GUI
* Univers
www.eeworm.com/read/368386/2815973
c exec32.c
/*
* Support for 32-bit Linux for S390 ELF binaries.
*
* Copyright (C) 2000 IBM Deutschland Entwicklung GmbH, IBM Corporation
* Author(s): Gerhard Tonn (ton@de.ibm.com)
*
* Seperated from binfmt
www.eeworm.com/read/368173/2824837
java exec_ok.java
/*
*this file is part of nseer erp
*Copyright (C)2006-2010 Nseer(Beijing) Technology co.LTD/http://www.nseer.com
*
*This program is free software; you can redistribute it and/or
*modify it
www.eeworm.com/read/367467/2843381
c pcre_exec.c
/*************************************************
* Perl-Compatible Regular Expressions *
*************************************************/
/* PCRE is a library of functions to support r
www.eeworm.com/read/367467/2844007
c pcre_exec.c
/*************************************************
* Perl-Compatible Regular Expressions *
*************************************************/
/* PCRE is a library of functions to support r
www.eeworm.com/read/367467/2844468
c pcre_exec.c
/*************************************************
* Perl-Compatible Regular Expressions *
*************************************************/
/* PCRE is a library of functions to support r
www.eeworm.com/read/367467/2845080
c pcre_exec.c
/*************************************************
* Perl-Compatible Regular Expressions *
*************************************************/
/* PCRE is a library of functions to support r
www.eeworm.com/read/365785/2895289
c do_exec.c
/* The kernel call implemented in this file:
* m_type: SYS_EXEC
*
* The parameters for this kernel call are:
* m1_i1: PR_PROC_NR (process that did exec call)
* m1_p1: PR_STACK_PTR (new
www.eeworm.com/read/362762/2927265
c do_exec.c
/* The kernel call implemented in this file:
* m_type: SYS_EXEC
*
* The parameters for this kernel call are:
* m1_i1: PR_PROC_NR (process that did exec call)
* m1_p1: PR_STACK_PTR (new
www.eeworm.com/read/361201/2950903
c gui_exec.c
/*
*********************************************************************************************************
* uC/GUI
* Universal