代码搜索:exec

找到约 10,000 项符合「exec」的源代码

代码结果 10,000
www.eeworm.com/read/372834/2769088

c gui_exec.c

/* ********************************************************************************************************* * uC/GUI * Univers
www.eeworm.com/read/368386/2815973

c exec32.c

/* * Support for 32-bit Linux for S390 ELF binaries. * * Copyright (C) 2000 IBM Deutschland Entwicklung GmbH, IBM Corporation * Author(s): Gerhard Tonn (ton@de.ibm.com) * * Seperated from binfmt
www.eeworm.com/read/368173/2824837

java exec_ok.java

/* *this file is part of nseer erp *Copyright (C)2006-2010 Nseer(Beijing) Technology co.LTD/http://www.nseer.com * *This program is free software; you can redistribute it and/or *modify it
www.eeworm.com/read/367467/2843381

c pcre_exec.c

/************************************************* * Perl-Compatible Regular Expressions * *************************************************/ /* PCRE is a library of functions to support r
www.eeworm.com/read/367467/2844007

c pcre_exec.c

/************************************************* * Perl-Compatible Regular Expressions * *************************************************/ /* PCRE is a library of functions to support r
www.eeworm.com/read/367467/2844468

c pcre_exec.c

/************************************************* * Perl-Compatible Regular Expressions * *************************************************/ /* PCRE is a library of functions to support r
www.eeworm.com/read/367467/2845080

c pcre_exec.c

/************************************************* * Perl-Compatible Regular Expressions * *************************************************/ /* PCRE is a library of functions to support r
www.eeworm.com/read/365785/2895289

c do_exec.c

/* The kernel call implemented in this file: * m_type: SYS_EXEC * * The parameters for this kernel call are: * m1_i1: PR_PROC_NR (process that did exec call) * m1_p1: PR_STACK_PTR (new
www.eeworm.com/read/362762/2927265

c do_exec.c

/* The kernel call implemented in this file: * m_type: SYS_EXEC * * The parameters for this kernel call are: * m1_i1: PR_PROC_NR (process that did exec call) * m1_p1: PR_STACK_PTR (new
www.eeworm.com/read/361201/2950903

c gui_exec.c

/* ********************************************************************************************************* * uC/GUI * Universal