/freebsd/contrib/file/magic/Magdir/ |
H A D | commands | 7 0 string/fwt #!\ /bin/sh POSIX shell script text executable 9 0 string/fwb #!\ /bin/sh POSIX shell script executable (binary data) 11 >10 string #\040This\040script\040was\040generated\040using\040Makeself \b, self-executable archive 14 0 string/fwt #!\ /bin/csh C shell script text executable 18 0 string/fwt #!\ /bin/ksh Korn shell script text executable 20 0 string/fwb #!\ /bin/ksh Korn shell script executable (binary data) 23 0 string/fwt #!\ /bin/tcsh Tenex C shell script text executable 25 0 string/fwt #!\ /usr/bin/tcsh Tenex C shell script text executable 27 0 string/fwt #!\ /usr/local/tcsh Tenex C shell script text executable 29 0 string/fwt #!\ /usr/local/bin/tcsh Tenex C shell script text executable [all …]
|
H A D | ncr | 12 >20 beshort 0407 executable 13 >20 beshort 0410 pure executable 17 >20 beshort 0407 executable 18 >20 beshort 0410 pure executable 22 >20 beshort 0407 executable 23 >20 beshort 0410 pure executable 27 >20 beshort 0407 executable 28 >20 beshort 0410 pure executable 32 >20 beshort 0407 executable 33 >20 beshort 0410 pure executable [all …]
|
H A D | plan9 | 7 0 belong 0x00000107 Plan 9 executable, Motorola 68k 8 0 belong 0x00000197 Plan 9 executable, AT&T Hobbit 9 0 belong 0x000001EB Plan 9 executable, Intel i386 10 0 belong 0x00000247 Plan 9 executable, Intel i960 11 0 belong 0x000002AB Plan 9 executable, SPARC 12 0 belong 0x00000407 Plan 9 executable, MIPS R3000 13 0 belong 0x0000048B Plan 9 executable, AT&T DSP 3210 14 0 belong 0x00000517 Plan 9 executable, MIPS R4000 BE 15 0 belong 0x000005AB Plan 9 executable, AMD 29000 16 0 belong 0x00000647 Plan 9 executable, ARM 7-something [all …]
|
H A D | ibm370 | 6 # "ibm370" said that 0x15d == 0535 was "ibm 370 pure executable". 10 # 0 short 0535 370 sysV executable 14 # 0 short 0530 370 sysV pure executable 21 0 beshort 0537 370 XA sysV executable 25 0 beshort 0532 370 XA sysV pure executable 29 0 beshort 054001 370 sysV pure executable 31 0 beshort 055001 370 XA sysV pure executable 33 0 beshort 056401 370 sysV executable 35 0 beshort 057401 370 XA sysV executable 37 0 beshort 0531 SVR2 executable (Amdahl-UTS) [all …]
|
H A D | sun | 16 #>>20 belong =4096 dynamically linked executable~ 17 #>>20 belong >4096 dynamically linked executable 18 #>0 byte ^0x80 executable 22 >0 byte &0x80 dynamically linked executable 23 >0 byte ^0x80 executable 27 >0 byte &0x80 dynamically linked executable 28 >0 byte ^0x80 executable 34 >>20 belong =4096 dynamically linked executable 35 >>20 belong >4096 dynamically linked executable 36 >0 byte ^0x80 executable [all …]
|
H A D | bsdi | 5 # Some object/executable formats use the same magic numbers as are used 9 0 lelong 0314 i386 compact demand paged pure executable 19 >>20 belong =4096 dynamically linked executable 20 >>20 belong >4096 dynamically linked executable 21 #!:mime application/x-foo-executable 24 >0 byte ^0x80 executable 29 >0 byte &0x80 dynamically linked executable 30 >0 byte ^0x80 executable 35 >0 byte &0x80 dynamically linked executable 36 >0 byte ^0x80 executable
|
H A D | mips | 19 >16 beshort 56 MIPSEB ECOFF executable 25 >16 beshort 56 MIPSEL-BE ECOFF executable 29 >16 leshort 56 MIPSEB-LE ECOFF executable 35 >16 leshort 56 MIPSEL ECOFF executable 41 >16 beshort 56 MIPSEB MIPS-II ECOFF executable 45 >16 beshort 56 MIPSEL-BE MIPS-II ECOFF executable 51 >16 leshort 56 MIPSEB-LE MIPS-II ECOFF executable 55 >16 leshort 56 MIPSEL MIPS-II ECOFF executable 61 >16 beshort 56 MIPSEB MIPS-III ECOFF executable 65 >16 beshort 56 MIPSEL-BE MIPS-III ECOFF executable [all …]
|
H A D | blit | 12 #0 long 0407 68K Blit (standalone) executable 13 #0 short 0407 VAX-order2 68K Blit (standalone) executable 14 0 short 03401 VAX-order 68K Blit (standalone) executable 15 0 long 0406 68k Blit mpx/mux executable 16 0 short 0406 VAX-order2 68k Blit mpx/mux executable 18 0 short 03001 VAX-order 68k Blit mpx/mux executable 20 # skip TTComp archive, ASCII, 4K by looking for executable keyword like main 21 #>0 search/5536 main\0 VAX-order 68k Blit mpx/mux executable 24 #0 short 0520 tty630 layers executable
|
H A D | tcl | 7 0 search/1/w #!\ /usr/bin/tcl Tcl script text executable 9 0 search/1/w #!\ /usr/local/bin/tcl Tcl script text executable 11 0 search/1 #!/usr/bin/env\ tcl Tcl script text executable 13 0 search/1 #!\ /usr/bin/env\ tcl Tcl script text executable 15 0 search/1/w #!\ /usr/bin/wish Tcl/Tk script text executable 17 0 search/1/w #!\ /usr/local/bin/wish Tcl/Tk script text executable 19 0 search/1 #!/usr/bin/env\ wish Tcl/Tk script text executable 21 0 search/1 #!\ /usr/bin/env\ wish Tcl/Tk script text executable
|
H A D | clojure | 6 0 string/w #!\ /usr/bin/clj Clojure script text executable 8 0 string/w #!\ /usr/local/bin/clj Clojure script text executable 10 0 string/w #!\ /usr/bin/clojure Clojure script text executable 12 0 string/w #!\ /usr/local/bin/clojure Clojure script text executable 14 0 string/W #!/usr/bin/env\ clj Clojure script text executable 16 0 string/W #!/usr/bin/env\ clojure Clojure script text executable 18 0 string/W #!\ /usr/bin/env\ clj Clojure script text executable 20 0 string/W #!\ /usr/bin/env\ clojure Clojure script text executable
|
H A D | freebsd | 11 # schemes for distinguishing between executable images, shared libraries, 25 # an executable, and is dynamically-linked if the "has run-time 33 # a dynamically-linked executable; 40 # if the entry point is non-zero, it's an executable, otherwise 46 # a dynamically-linked executable, otherwise it's just an 47 # executable. 57 # it's a dynamically-linked executable); 60 # set, then it's just an executable. 83 >>3 byte&0x80 0x80 dynamically linked executable 84 >>3 byte&0x80 0x00 executable [all …]
|
H A D | sequent | 11 0 lelong 0x10ea BALANCE NS32000 executable (0 @ 0) 14 0 lelong 0x20ea BALANCE NS32000 executable (invalid @ 0) 17 0 lelong 0x30ea BALANCE NS32000 standalone executable 27 0 leshort 0x22eb SYMMETRY i386 executable (0 @ 0) 30 0 leshort 0x32eb SYMMETRY i386 executable (invalid @ 0) 35 #0 leshort 0x42eb SYMMETRY i386 standalone executable 40 >>124 lelong !28867614 SYMMETRY i386 standalone executable
|
H A D | motorola | 10 >18 beshort &00000020 executable 17 0 beshort 0521 mc68k executable (shared) 19 0 beshort 0522 mc68k executable (shared demand paged) 30 0 beshort 0554 68K BCS executable 36 0 beshort 0555 88K BCS executable 48 0 belong&0xFFFFFFF0 0x601A0000 Atari ST M68K contiguous executable 53 0 belong&0xFFFFFFF0 0x601B0000 Atari ST M68K non-contig executable 60 0 beshort 0x601A Atari 68xxx executable,
|
H A D | pdp | 4 # pdp: file(1) magic for PDP-11 executable/object and APL workspace 12 0 leshort 0407 PDP-11 executable 34 0 leshort 0410 PDP-11 pure executable 38 0 leshort 0411 PDP-11 separate I&D executable 45 0 leshort 0413 PDP-11 demand-paged pure executable 48 0 leshort 0430 PDP-11 overlaid pure executable 51 0 leshort 0431 PDP-11 overlaid separate executable
|
H A D | encore | 10 >20 short 0x107 executable 11 >20 short 0x108 pure executable 12 >20 short 0x10b demand-paged executable 13 >20 short 0x10f unsupported executable 18 0 short 0x155 Encore unsupported executable
|
H A D | aout | 4 # aout: file(1) magic for a.out executable/object/etc entries that 18 0 lelong 0407 a.out little-endian 32-bit executable 22 0 lelong 0410 a.out little-endian 32-bit pure executable 26 0 lelong 0413 a.out little-endian 32-bit demand paged pure executable 38 0 belong 0407 a.out big-endian 32-bit executable 41 0 belong 0410 a.out big-endian 32-bit pure executable 44 0 belong 0413 a.out big-endian 32-bit demand paged executable
|
H A D | unknown | 7 # (executable, pure, and split I&D, respectively), but the PDP-11 version 20 #0 short 0x107 unknown machine executable 23 #0 short 0x108 unknown pure executable 29 #0 short 0x10b unknown pure executable 32 0 long 0x10c unknown demand paged pure executable 34 0 long 0x10e unknown readable demand paged pure executable
|
H A D | varied.out | 10 0 short 0610 Perkin-Elmer executable 12 0 beshort 0572 amd 29k coff noprebar executable 13 0 beshort 01572 amd 29k coff prebar executable 16 6 beshort 0407 unicos (cray) executable 22 0 string Joy!peffpwpc header for PowerPC PEF executable 39 # 0 string exec BugOS executable
|
H A D | varied.script | 9 >&-1 string/T x %s script text executable 13 >&-1 string/T x %s script executable (binary data) 19 >15 string/T >\0 %s script text executable 23 >15 string/T >\0 %s script executable (binary data)
|
/freebsd/contrib/llvm-project/lldb/source/Plugins/DynamicLoader/Windows-DYLD/ |
H A D | DynamicLoaderWindowsDYLD.cpp | 97 lldb::addr_t DynamicLoaderWindowsDYLD::GetLoadAddress(ModuleSP executable) { in GetLoadAddress() argument 99 auto it = m_loaded_modules.find(executable); in GetLoadAddress() 107 FileSpec file_spec(executable->GetPlatformFileSpec()); in GetLoadAddress() 113 m_loaded_modules[executable] = load_addr; in GetLoadAddress() 124 ModuleSP executable = GetTargetExecutable(); in DidAttach() local 126 if (!executable.get()) in DidAttach() 131 lldb::addr_t load_addr = GetLoadAddress(executable); in DidAttach() 141 UpdateLoadedSections(executable, LLDB_INVALID_ADDRESS, load_addr, false); in DidAttach() 144 module_list.Append(executable); in DidAttach() 154 ModuleSP executable = GetTargetExecutable(); in DidLaunch() local [all …]
|
/freebsd/contrib/llvm-project/lldb/source/Plugins/DynamicLoader/Hexagon-DYLD/ |
H A D | DynamicLoaderHexagonDYLD.cpp | 115 ModuleSP executable; in DidAttach() local 118 executable = GetTargetExecutable(); in DidAttach() 125 if (executable.get() == nullptr) in DidAttach() 136 module_list.Append(executable); in DidAttach() 140 UpdateLoadedSections(executable, LLDB_INVALID_ADDRESS, load_offset, true); in DidAttach() 165 ModuleSP executable = target.GetExecutableModule(); in GetTargetExecutable() local 168 if (!executable.get()) in GetTargetExecutable() 169 return executable; in GetTargetExecutable() 172 if (!FileSystem::Instance().Exists(executable->GetFileSpec())) in GetTargetExecutable() 173 return executable; in GetTargetExecutable() [all …]
|
/freebsd/usr.sbin/uefisign/ |
H A D | uefisign.h | 40 struct executable { struct 83 void parse(struct executable *x); argument 84 void update(struct executable *x); 85 size_t signature_size(const struct executable *x); 86 void show_certificate(const struct executable *x); 87 void range_check(const struct executable *x,
|
H A D | child.c | 52 load(struct executable *x) in load() 82 digest_range(struct executable *x, EVP_MD_CTX *mdctx, off_t off, size_t len) in digest_range() 96 digest(struct executable *x) in digest() 187 show_digest(const struct executable *x) in show_digest() 198 send_digest(const struct executable *x, int pipefd) in send_digest() 205 receive_signature(struct executable *x, int pipefd) in receive_signature() 212 save(struct executable *x, FILE *fp, const char *path) in save() 229 struct executable *x; in child()
|
H A D | pe.c | 142 range_check(const struct executable *x, off_t off, size_t len, in range_check() 165 signature_size(const struct executable *x) in signature_size() 184 show_certificate(const struct executable *x) in show_certificate() 225 parse_section_table(struct executable *x, off_t off, int number_of_sections) in parse_section_table() 262 parse_directory(struct executable *x, off_t off, in parse_directory() 312 compute_checksum(const struct executable *x) in compute_checksum() 348 parse_optional_32_plus(struct executable *x, off_t off, in parse_optional_32_plus() 398 parse_optional_32(struct executable *x, off_t off, int number_of_sections) in parse_optional_32() 447 parse_optional(struct executable *x, off_t off, int number_of_sections) in parse_optional() 468 parse_pe(struct executable *x, off_t off) in parse_pe() [all …]
|
/freebsd/contrib/llvm-project/lldb/source/Core/ |
H A D | DynamicLoader.cpp | 79 ModuleSP executable = target.GetExecutableModule(); in GetTargetExecutable() local 81 if (executable) { in GetTargetExecutable() 82 if (FileSystem::Instance().Exists(executable->GetFileSpec())) { in GetTargetExecutable() 83 ModuleSpec module_spec(executable->GetFileSpec(), in GetTargetExecutable() 84 executable->GetArchitecture()); in GetTargetExecutable() 90 executable->GetUUID().IsValid()) { in GetTargetExecutable() 91 if (module_sp->GetUUID() != executable->GetUUID()) in GetTargetExecutable() 92 executable.reset(); in GetTargetExecutable() 93 } else if (executable->FileHasChanged()) { in GetTargetExecutable() 94 executable.reset(); in GetTargetExecutable() [all …]
|