代码搜索:exec
找到约 10,000 项符合「exec」的源代码
代码结果 10,000
www.eeworm.com/read/377991/2693448
java exec.java
/*
* Licensed to the Apache Software Foundation (ASF) under one or more
* contributor license agreements. See the NOTICE file distributed with
* this work for additional information regarding copyrig
www.eeworm.com/read/375736/2721525
txt exec.txt
An EXEC function with memory swap
=================================
Thomas Wagner
Ferrari electronic GmbH
Beusselstrasse 27
D-1000
www.eeworm.com/read/375190/2737954
cpp exec.cpp
// Copyright Stefan Seefeld 2005.
// Distributed under the Boost Software License, Version 1.0. (See
// accompanying file LICENSE_1_0.txt or copy at
// http://www.boost.org/LICENSE_1_0.txt)
#include
www.eeworm.com/read/375190/2738096
cpp exec.cpp
// Copyright Stefan Seefeld 2005.
// Distributed under the Boost Software License, Version 1.0. (See
// accompanying file LICENSE_1_0.txt or copy at
// http://www.boost.org/LICENSE_1_0.txt)
#include
www.eeworm.com/read/375190/2738115
py exec.py
# Copyright Stefan Seefeld 2006. Distributed under the Boost
# Software License, Version 1.0. (See accompanying
# file LICENSE_1_0.txt or copy at http://www.boost.org/LICENSE_1_0.txt)
print 'Hello Wo
www.eeworm.com/read/369418/2800295
java exec.java
/*
* Licensed to the Apache Software Foundation (ASF) under one or more
* contributor license agreements. See the NOTICE file distributed with
* this work for additional information regarding c
www.eeworm.com/read/369339/2800839
2 exec.2
.th EXEC II 8/5/73
.sh NAME
exec, execl, execv \*- execute a file
.sh SYNOPSIS
(exec = 11.)
.br
.ft B
sys exec; name; args
.br
.li
...
.br
name:
.br
.li
...
.br
args: arg0; arg1; ...; 0
.br
www.eeworm.com/read/365785/2895452
c exec.c
/* This file handles the EXEC system call. It performs the work as follows:
* - see if the permissions allow the file to be executed
* - read the header and extract the sizes
* - fetch th
www.eeworm.com/read/362762/2927428
c exec.c
/* This file handles the EXEC system call. It performs the work as follows:
* - see if the permissions allow the file to be executed
* - read the header and extract the sizes
* - fetch th