/freebsd/contrib/file/magic/Magdir/ |
H A D | commands | 7 0 string/fwt #!\ /bin/sh POSIX shell script text executable 9 0 string/fwb #!\ /bin/sh POSIX shell script executable (binary data) 11 >10 string #\040This\040script\040was\040generated\040using\040Makeself \b, self-executable archive 14 0 string/fwt #!\ /bin/csh C shell script text executable 18 0 string/fwt #!\ /bin/ksh Korn shell script text executable 20 0 string/fwb #!\ /bin/ksh Korn shell script executable (binary data) 23 0 string/fwt #!\ /bin/tcsh Tenex C shell script text executable 25 0 string/fwt #!\ /usr/bin/tcsh Tenex C shell script text executable 27 0 string/fwt #!\ /usr/local/tcsh Tenex C shell script text executable 29 0 string/fwt #!\ /usr/local/bin/tcsh Tenex C shell script text executable [all …]
|
H A D | plan9 | 7 0 belong 0x00000107 Plan 9 executable, Motorola 68k 8 0 belong 0x00000197 Plan 9 executable, AT&T Hobbit 9 0 belong 0x000001EB Plan 9 executable, Intel i386 10 0 belong 0x00000247 Plan 9 executable, Intel i960 11 0 belong 0x000002AB Plan 9 executable, SPARC 12 0 belong 0x00000407 Plan 9 executable, MIPS R3000 13 0 belong 0x0000048B Plan 9 executable, AT&T DSP 3210 14 0 belong 0x00000517 Plan 9 executable, MIPS R4000 BE 15 0 belong 0x000005AB Plan 9 executable, AMD 29000 16 0 belong 0x00000647 Plan 9 executable, ARM 7-something [all …]
|
H A D | ibm370 | 6 # "ibm370" said that 0x15d == 0535 was "ibm 370 pure executable". 10 # 0 short 0535 370 sysV executable 14 # 0 short 0530 370 sysV pure executable 21 0 beshort 0537 370 XA sysV executable 25 0 beshort 0532 370 XA sysV pure executable 29 0 beshort 054001 370 sysV pure executable 31 0 beshort 055001 370 XA sysV pure executable 33 0 beshort 056401 370 sysV executable 35 0 beshort 057401 370 XA sysV executable 37 0 beshort 0531 SVR2 executable (Amdahl-UTS) [all …]
|
H A D | ncr | 12 >20 beshort 0407 executable 13 >20 beshort 0410 pure executable 17 >20 beshort 0407 executable 18 >20 beshort 0410 pure executable 22 >20 beshort 0407 executable 23 >20 beshort 0410 pure executable 27 >20 beshort 0407 executable 28 >20 beshort 0410 pure executable 32 >20 beshort 0407 executable 33 >20 beshort 0410 pure executable [all …]
|
H A D | sun | 16 #>>20 belong =4096 dynamically linked executable~ 17 #>>20 belong >4096 dynamically linked executable 18 #>0 byte ^0x80 executable 22 >0 byte &0x80 dynamically linked executable 23 >0 byte ^0x80 executable 27 >0 byte &0x80 dynamically linked executable 28 >0 byte ^0x80 executable 34 >>20 belong =4096 dynamically linked executable 35 >>20 belong >4096 dynamically linked executable 36 >0 byte ^0x80 executable [all …]
|
H A D | bsdi | 5 # Some object/executable formats use the same magic numbers as are used 9 0 lelong 0314 i386 compact demand paged pure executable 19 >>20 belong =4096 dynamically linked executable 20 >>20 belong >4096 dynamically linked executable 21 #!:mime application/x-foo-executable 24 >0 byte ^0x80 executable 29 >0 byte &0x80 dynamically linked executable 30 >0 byte ^0x80 executable 35 >0 byte &0x80 dynamically linked executable 36 >0 byte ^0x80 executable
|
H A D | mips | 19 >16 beshort 56 MIPSEB ECOFF executable 25 >16 beshort 56 MIPSEL-BE ECOFF executable 29 >16 leshort 56 MIPSEB-LE ECOFF executable 35 >16 leshort 56 MIPSEL ECOFF executable 41 >16 beshort 56 MIPSEB MIPS-II ECOFF executable 45 >16 beshort 56 MIPSEL-BE MIPS-II ECOFF executable 51 >16 leshort 56 MIPSEB-LE MIPS-II ECOFF executable 55 >16 leshort 56 MIPSEL MIPS-II ECOFF executable 61 >16 beshort 56 MIPSEB MIPS-III ECOFF executable 65 >16 beshort 56 MIPSEL-BE MIPS-III ECOFF executable [all …]
|
H A D | blit | 12 #0 long 0407 68K Blit (standalone) executable 13 #0 short 0407 VAX-order2 68K Blit (standalone) executable 14 0 short 03401 VAX-order 68K Blit (standalone) executable 15 0 long 0406 68k Blit mpx/mux executable 16 0 short 0406 VAX-order2 68k Blit mpx/mux executable 18 0 short 03001 VAX-order 68k Blit mpx/mux executable 20 # skip TTComp archive, ASCII, 4K by looking for executable keyword like main 21 #>0 search/5536 main\0 VAX-order 68k Blit mpx/mux executable 24 #0 short 0520 tty630 layers executable
|
H A D | freebsd | 11 # schemes for distinguishing between executable images, shared libraries, 25 # an executable, and is dynamically-linked if the "has run-time 33 # a dynamically-linked executable; 40 # if the entry point is non-zero, it's an executable, otherwise 46 # a dynamically-linked executable, otherwise it's just an 47 # executable. 57 # it's a dynamically-linked executable); 60 # set, then it's just an executable. 83 >>3 byte&0x80 0x80 dynamically linked executable 84 >>3 byte&0x80 0x00 executable [all …]
|
H A D | tcl | 7 0 search/1/w #!\ /usr/bin/tcl Tcl script text executable 9 0 search/1/w #!\ /usr/local/bin/tcl Tcl script text executable 11 0 search/1 #!/usr/bin/env\ tcl Tcl script text executable 13 0 search/1 #!\ /usr/bin/env\ tcl Tcl script text executable 15 0 search/1/w #!\ /usr/bin/wish Tcl/Tk script text executable 17 0 search/1/w #!\ /usr/local/bin/wish Tcl/Tk script text executable 19 0 search/1 #!/usr/bin/env\ wish Tcl/Tk script text executable 21 0 search/1 #!\ /usr/bin/env\ wish Tcl/Tk script text executable
|
H A D | clojure | 6 0 string/w #!\ /usr/bin/clj Clojure script text executable 8 0 string/w #!\ /usr/local/bin/clj Clojure script text executable 10 0 string/w #!\ /usr/bin/clojure Clojure script text executable 12 0 string/w #!\ /usr/local/bin/clojure Clojure script text executable 14 0 string/W #!/usr/bin/env\ clj Clojure script text executable 16 0 string/W #!/usr/bin/env\ clojure Clojure script text executable 18 0 string/W #!\ /usr/bin/env\ clj Clojure script text executable 20 0 string/W #!\ /usr/bin/env\ clojure Clojure script text executable
|
H A D | sequent | 11 0 lelong 0x10ea BALANCE NS32000 executable (0 @ 0) 14 0 lelong 0x20ea BALANCE NS32000 executable (invalid @ 0) 17 0 lelong 0x30ea BALANCE NS32000 standalone executable 27 0 leshort 0x22eb SYMMETRY i386 executable (0 @ 0) 30 0 leshort 0x32eb SYMMETRY i386 executable (invalid @ 0) 35 #0 leshort 0x42eb SYMMETRY i386 standalone executable 40 >>124 lelong !28867614 SYMMETRY i386 standalone executable
|
H A D | motorola | 10 >18 beshort &00000020 executable 17 0 beshort 0521 mc68k executable (shared) 19 0 beshort 0522 mc68k executable (shared demand paged) 30 0 beshort 0554 68K BCS executable 36 0 beshort 0555 88K BCS executable 48 0 belong&0xFFFFFFF0 0x601A0000 Atari ST M68K contiguous executable 53 0 belong&0xFFFFFFF0 0x601B0000 Atari ST M68K non-contig executable 60 0 beshort 0x601A Atari 68xxx executable,
|
H A D | aout | 4 # aout: file(1) magic for a.out executable/object/etc entries that 18 0 lelong 0407 a.out little-endian 32-bit executable 22 0 lelong 0410 a.out little-endian 32-bit pure executable 26 0 lelong 0413 a.out little-endian 32-bit demand paged pure executable 38 0 belong 0407 a.out big-endian 32-bit executable 41 0 belong 0410 a.out big-endian 32-bit pure executable 44 0 belong 0413 a.out big-endian 32-bit demand paged executable
|
H A D | pdp | 4 # pdp: file(1) magic for PDP-11 executable/object and APL workspace 12 0 leshort 0407 PDP-11 executable 34 0 leshort 0410 PDP-11 pure executable 38 0 leshort 0411 PDP-11 separate I&D executable 45 0 leshort 0413 PDP-11 demand-paged pure executable 48 0 leshort 0430 PDP-11 overlaid pure executable 51 0 leshort 0431 PDP-11 overlaid separate executable
|
H A D | hp | 42 0 beshort 0627 Apollo m68k COFF executable 45 0 beshort 0624 apollo a88k COFF executable 54 0 belong 0x02100107 PA-RISC1.1 executable 59 0 belong 0x02100108 PA-RISC1.1 shared executable 64 0 belong 0x0210010b PA-RISC1.1 demand-load executable 78 0 belong 0x02140107 PA-RISC2.0 executable 83 0 belong 0x02140108 PA-RISC2.0 shared executable 88 0 belong 0x0214010b PA-RISC2.0 demand-load executable 102 0 belong 0x020b0107 PA-RISC1.0 executable 107 0 belong 0x020b0108 PA-RISC1.0 shared executable [all …]
|
H A D | unknown | 7 # (executable, pure, and split I&D, respectively), but the PDP-11 version 20 #0 short 0x107 unknown machine executable 23 #0 short 0x108 unknown pure executable 29 #0 short 0x10b unknown pure executable 32 0 long 0x10c unknown demand paged pure executable 34 0 long 0x10e unknown readable demand paged pure executable
|
H A D | varied.out | 10 0 short 0610 Perkin-Elmer executable 12 0 beshort 0572 amd 29k coff noprebar executable 13 0 beshort 01572 amd 29k coff prebar executable 16 6 beshort 0407 unicos (cray) executable 22 0 string Joy!peffpwpc header for PowerPC PEF executable 39 # 0 string exec BugOS executable
|
H A D | python | 9 0 string/t """ Python script text executable 237 0 search/1/w #!\040/usr/bin/python Python script text executable 240 0 search/1/w #!\040/usr/local/bin/python Python script text executable 243 0 search/10/w #!\040/usr/bin/env\040python Python script text executable 250 >0 regex \^from[\040\t]+([A-Za-z0-9_]|\\.)+[\040\t]+import.*$ Python script text executable 253 >0 regex \^import\ [_[:alpha:]]+\ as\ [[:alpha:]][[:space:]]*$ Python script text executable 259 >&0 search/64 self Python script text executable 265 >&0 search/64 '__main__' Python script text executable 266 >&0 search/64 "__main__" Python script text executable 272 #>&0 regex .*'''$ Python script text executable [all …]
|
H A D | encore | 10 >20 short 0x107 executable 11 >20 short 0x108 pure executable 12 >20 short 0x10b demand-paged executable 13 >20 short 0x10f unsupported executable 18 0 short 0x155 Encore unsupported executable
|
/freebsd/contrib/llvm-project/lldb/source/Plugins/DynamicLoader/Hexagon-DYLD/ |
H A D | DynamicLoaderHexagonDYLD.cpp | 115 ModuleSP executable; in DidAttach() local 118 executable = GetTargetExecutable(); in DidAttach() 124 // Check that there is a valid executable in DidAttach() 125 if (executable.get() == nullptr) in DidAttach() 134 // Add the current executable to the module list in DidAttach() 136 module_list.Append(executable); in DidAttach() 138 // Map the loaded sections of this executable in DidAttach() 140 UpdateLoadedSections(executable, LLDB_INVALID_ADDRESS, load_offset, true); in DidAttach() 162 /// accordingly and returns the target executable module. 165 ModuleSP executable = target.GetExecutableModule(); in GetTargetExecutable() local [all …]
|
/freebsd/contrib/bc/tests/ |
H A D | history.py | 142 # @param exe The executable. 143 # @param args The arguments to pass to the executable. 183 # @param exe The executable. 184 # @param args The arguments to pass to the executable. 242 # @param exe The executable. 243 # @param args The arguments to pass to the executable. 274 # @param exe The executable. 275 # @param args The arguments to pass to the executable. 308 # @param exe The executable. 309 # @param args The arguments to pass to the executable [all...] |
/freebsd/contrib/llvm-project/lldb/source/Core/ |
H A D | DynamicLoader.cpp | 79 ModuleSP executable = target.GetExecutableModule(); in GetTargetExecutable() local 81 if (executable) { in GetTargetExecutable() 82 if (FileSystem::Instance().Exists(executable->GetFileSpec())) { in GetTargetExecutable() 83 ModuleSpec module_spec(executable->GetFileSpec(), in GetTargetExecutable() 84 executable->GetArchitecture()); in GetTargetExecutable() 87 // Check if the executable has changed and set it to the target in GetTargetExecutable() 88 // executable if they differ. in GetTargetExecutable() 90 executable->GetUUID().IsValid()) { in GetTargetExecutable() 91 if (module_sp->GetUUID() != executable->GetUUID()) in GetTargetExecutable() 92 executable.reset(); in GetTargetExecutable() [all …]
|
/freebsd/contrib/llvm-project/lldb/source/Plugins/DynamicLoader/Windows-DYLD/ |
H A D | DynamicLoaderWindowsDYLD.cpp | 97 lldb::addr_t DynamicLoaderWindowsDYLD::GetLoadAddress(ModuleSP executable) { in GetLoadAddress() argument 99 auto it = m_loaded_modules.find(executable); in GetLoadAddress() 107 FileSpec file_spec(executable->GetPlatformFileSpec()); in GetLoadAddress() 113 m_loaded_modules[executable] = load_addr; in GetLoadAddress() 124 ModuleSP executable = GetTargetExecutable(); in DidAttach() local 126 if (!executable.get()) in DidAttach() 131 lldb::addr_t load_addr = GetLoadAddress(executable); in DidAttach() 141 UpdateLoadedSections(executable, LLDB_INVALID_ADDRESS, load_addr, false); in DidAttach() 144 module_list.Append(executable); in DidAttach() 154 ModuleSP executable = GetTargetExecutable(); in DidLaunch() local [all …]
|
/freebsd/lib/libc/string/ |
H A D | strmode.3 | 98 executable or the directory is not searchable by the owner, and the 102 executable or the directory is not searchable by the group, and the 106 executable or the directory is not searchable by others, and the ``sticky'' 111 executable or the directory searchable by the owner, and the set-user-id 115 executable or the directory searchable by the group, and the set-group-id 119 executable or the directory searchable by others, and the ``sticky'' 123 The file is executable or the directory is searchable.
|