Home
last modified time | relevance | path

Searched refs:executable (Results 1 – 25 of 286) sorted by relevance

12345678910>>...12

/freebsd/contrib/file/magic/Magdir/
H A Dcommands7 0 string/fwt #!\ /bin/sh POSIX shell script text executable
9 0 string/fwb #!\ /bin/sh POSIX shell script executable (binary data)
11 >10 string #\040This\040script\040was\040generated\040using\040Makeself \b, self-executable archive
14 0 string/fwt #!\ /bin/csh C shell script text executable
18 0 string/fwt #!\ /bin/ksh Korn shell script text executable
20 0 string/fwb #!\ /bin/ksh Korn shell script executable (binary data)
23 0 string/fwt #!\ /bin/tcsh Tenex C shell script text executable
25 0 string/fwt #!\ /usr/bin/tcsh Tenex C shell script text executable
27 0 string/fwt #!\ /usr/local/tcsh Tenex C shell script text executable
29 0 string/fwt #!\ /usr/local/bin/tcsh Tenex C shell script text executable
[all …]
H A Dncr12 >20 beshort 0407 executable
13 >20 beshort 0410 pure executable
17 >20 beshort 0407 executable
18 >20 beshort 0410 pure executable
22 >20 beshort 0407 executable
23 >20 beshort 0410 pure executable
27 >20 beshort 0407 executable
28 >20 beshort 0410 pure executable
32 >20 beshort 0407 executable
33 >20 beshort 0410 pure executable
[all …]
H A Dplan97 0 belong 0x00000107 Plan 9 executable, Motorola 68k
8 0 belong 0x00000197 Plan 9 executable, AT&T Hobbit
9 0 belong 0x000001EB Plan 9 executable, Intel i386
10 0 belong 0x00000247 Plan 9 executable, Intel i960
11 0 belong 0x000002AB Plan 9 executable, SPARC
12 0 belong 0x00000407 Plan 9 executable, MIPS R3000
13 0 belong 0x0000048B Plan 9 executable, AT&T DSP 3210
14 0 belong 0x00000517 Plan 9 executable, MIPS R4000 BE
15 0 belong 0x000005AB Plan 9 executable, AMD 29000
16 0 belong 0x00000647 Plan 9 executable, ARM 7-something
[all …]
H A Dibm3706 # "ibm370" said that 0x15d == 0535 was "ibm 370 pure executable".
10 # 0 short 0535 370 sysV executable
14 # 0 short 0530 370 sysV pure executable
21 0 beshort 0537 370 XA sysV executable
25 0 beshort 0532 370 XA sysV pure executable
29 0 beshort 054001 370 sysV pure executable
31 0 beshort 055001 370 XA sysV pure executable
33 0 beshort 056401 370 sysV executable
35 0 beshort 057401 370 XA sysV executable
37 0 beshort 0531 SVR2 executable (Amdahl-UTS)
[all …]
H A Dsun16 #>>20 belong =4096 dynamically linked executable~
17 #>>20 belong >4096 dynamically linked executable
18 #>0 byte ^0x80 executable
22 >0 byte &0x80 dynamically linked executable
23 >0 byte ^0x80 executable
27 >0 byte &0x80 dynamically linked executable
28 >0 byte ^0x80 executable
34 >>20 belong =4096 dynamically linked executable
35 >>20 belong >4096 dynamically linked executable
36 >0 byte ^0x80 executable
[all …]
H A Dbsdi5 # Some object/executable formats use the same magic numbers as are used
9 0 lelong 0314 i386 compact demand paged pure executable
19 >>20 belong =4096 dynamically linked executable
20 >>20 belong >4096 dynamically linked executable
21 #!:mime application/x-foo-executable
24 >0 byte ^0x80 executable
29 >0 byte &0x80 dynamically linked executable
30 >0 byte ^0x80 executable
35 >0 byte &0x80 dynamically linked executable
36 >0 byte ^0x80 executable
H A Dmips19 >16 beshort 56 MIPSEB ECOFF executable
25 >16 beshort 56 MIPSEL-BE ECOFF executable
29 >16 leshort 56 MIPSEB-LE ECOFF executable
35 >16 leshort 56 MIPSEL ECOFF executable
41 >16 beshort 56 MIPSEB MIPS-II ECOFF executable
45 >16 beshort 56 MIPSEL-BE MIPS-II ECOFF executable
51 >16 leshort 56 MIPSEB-LE MIPS-II ECOFF executable
55 >16 leshort 56 MIPSEL MIPS-II ECOFF executable
61 >16 beshort 56 MIPSEB MIPS-III ECOFF executable
65 >16 beshort 56 MIPSEL-BE MIPS-III ECOFF executable
[all …]
H A Dblit12 #0 long 0407 68K Blit (standalone) executable
13 #0 short 0407 VAX-order2 68K Blit (standalone) executable
14 0 short 03401 VAX-order 68K Blit (standalone) executable
15 0 long 0406 68k Blit mpx/mux executable
16 0 short 0406 VAX-order2 68k Blit mpx/mux executable
18 0 short 03001 VAX-order 68k Blit mpx/mux executable
20 # skip TTComp archive, ASCII, 4K by looking for executable keyword like main
21 #>0 search/5536 main\0 VAX-order 68k Blit mpx/mux executable
24 #0 short 0520 tty630 layers executable
H A Dtcl7 0 search/1/w #!\ /usr/bin/tcl Tcl script text executable
9 0 search/1/w #!\ /usr/local/bin/tcl Tcl script text executable
11 0 search/1 #!/usr/bin/env\ tcl Tcl script text executable
13 0 search/1 #!\ /usr/bin/env\ tcl Tcl script text executable
15 0 search/1/w #!\ /usr/bin/wish Tcl/Tk script text executable
17 0 search/1/w #!\ /usr/local/bin/wish Tcl/Tk script text executable
19 0 search/1 #!/usr/bin/env\ wish Tcl/Tk script text executable
21 0 search/1 #!\ /usr/bin/env\ wish Tcl/Tk script text executable
H A Dclojure6 0 string/w #!\ /usr/bin/clj Clojure script text executable
8 0 string/w #!\ /usr/local/bin/clj Clojure script text executable
10 0 string/w #!\ /usr/bin/clojure Clojure script text executable
12 0 string/w #!\ /usr/local/bin/clojure Clojure script text executable
14 0 string/W #!/usr/bin/env\ clj Clojure script text executable
16 0 string/W #!/usr/bin/env\ clojure Clojure script text executable
18 0 string/W #!\ /usr/bin/env\ clj Clojure script text executable
20 0 string/W #!\ /usr/bin/env\ clojure Clojure script text executable
H A Dfreebsd11 # schemes for distinguishing between executable images, shared libraries,
25 # an executable, and is dynamically-linked if the "has run-time
33 # a dynamically-linked executable;
40 # if the entry point is non-zero, it's an executable, otherwise
46 # a dynamically-linked executable, otherwise it's just an
47 # executable.
57 # it's a dynamically-linked executable);
60 # set, then it's just an executable.
83 >>3 byte&0x80 0x80 dynamically linked executable
84 >>3 byte&0x80 0x00 executable
[all …]
H A Dsequent11 0 lelong 0x10ea BALANCE NS32000 executable (0 @ 0)
14 0 lelong 0x20ea BALANCE NS32000 executable (invalid @ 0)
17 0 lelong 0x30ea BALANCE NS32000 standalone executable
27 0 leshort 0x22eb SYMMETRY i386 executable (0 @ 0)
30 0 leshort 0x32eb SYMMETRY i386 executable (invalid @ 0)
35 #0 leshort 0x42eb SYMMETRY i386 standalone executable
40 >>124 lelong !28867614 SYMMETRY i386 standalone executable
H A Dmotorola10 >18 beshort &00000020 executable
17 0 beshort 0521 mc68k executable (shared)
19 0 beshort 0522 mc68k executable (shared demand paged)
30 0 beshort 0554 68K BCS executable
36 0 beshort 0555 88K BCS executable
48 0 belong&0xFFFFFFF0 0x601A0000 Atari ST M68K contiguous executable
53 0 belong&0xFFFFFFF0 0x601B0000 Atari ST M68K non-contig executable
60 0 beshort 0x601A Atari 68xxx executable,
H A Dpdp4 # pdp: file(1) magic for PDP-11 executable/object and APL workspace
12 0 leshort 0407 PDP-11 executable
34 0 leshort 0410 PDP-11 pure executable
38 0 leshort 0411 PDP-11 separate I&D executable
45 0 leshort 0413 PDP-11 demand-paged pure executable
48 0 leshort 0430 PDP-11 overlaid pure executable
51 0 leshort 0431 PDP-11 overlaid separate executable
H A Dencore10 >20 short 0x107 executable
11 >20 short 0x108 pure executable
12 >20 short 0x10b demand-paged executable
13 >20 short 0x10f unsupported executable
18 0 short 0x155 Encore unsupported executable
H A Daout4 # aout: file(1) magic for a.out executable/object/etc entries that
18 0 lelong 0407 a.out little-endian 32-bit executable
22 0 lelong 0410 a.out little-endian 32-bit pure executable
26 0 lelong 0413 a.out little-endian 32-bit demand paged pure executable
38 0 belong 0407 a.out big-endian 32-bit executable
41 0 belong 0410 a.out big-endian 32-bit pure executable
44 0 belong 0413 a.out big-endian 32-bit demand paged executable
H A Dunknown7 # (executable, pure, and split I&D, respectively), but the PDP-11 version
20 #0 short 0x107 unknown machine executable
23 #0 short 0x108 unknown pure executable
29 #0 short 0x10b unknown pure executable
32 0 long 0x10c unknown demand paged pure executable
34 0 long 0x10e unknown readable demand paged pure executable
H A Dvaried.out10 0 short 0610 Perkin-Elmer executable
12 0 beshort 0572 amd 29k coff noprebar executable
13 0 beshort 01572 amd 29k coff prebar executable
16 6 beshort 0407 unicos (cray) executable
22 0 string Joy!peffpwpc header for PowerPC PEF executable
39 # 0 string exec BugOS executable
H A Dvaried.script9 >&-1 string/T x %s script text executable
13 >&-1 string/T x %s script executable (binary data)
19 >15 string/T >\0 %s script text executable
23 >15 string/T >\0 %s script executable (binary data)
/freebsd/contrib/llvm-project/lldb/source/Plugins/DynamicLoader/Windows-DYLD/
H A DDynamicLoaderWindowsDYLD.cpp97 lldb::addr_t DynamicLoaderWindowsDYLD::GetLoadAddress(ModuleSP executable) { in GetLoadAddress() argument
99 auto it = m_loaded_modules.find(executable); in GetLoadAddress()
107 FileSpec file_spec(executable->GetPlatformFileSpec()); in GetLoadAddress()
113 m_loaded_modules[executable] = load_addr; in GetLoadAddress()
124 ModuleSP executable = GetTargetExecutable(); in DidAttach() local
126 if (!executable.get()) in DidAttach()
131 lldb::addr_t load_addr = GetLoadAddress(executable); in DidAttach()
141 UpdateLoadedSections(executable, LLDB_INVALID_ADDRESS, load_addr, false); in DidAttach()
144 module_list.Append(executable); in DidAttach()
154 ModuleSP executable = GetTargetExecutable(); in DidLaunch() local
[all …]
/freebsd/contrib/llvm-project/lldb/source/Plugins/DynamicLoader/Hexagon-DYLD/
H A DDynamicLoaderHexagonDYLD.cpp115 ModuleSP executable; in DidAttach() local
118 executable = GetTargetExecutable(); in DidAttach()
125 if (executable.get() == nullptr) in DidAttach()
136 module_list.Append(executable); in DidAttach()
140 UpdateLoadedSections(executable, LLDB_INVALID_ADDRESS, load_offset, true); in DidAttach()
165 ModuleSP executable = target.GetExecutableModule(); in GetTargetExecutable() local
168 if (!executable.get()) in GetTargetExecutable()
169 return executable; in GetTargetExecutable()
172 if (!FileSystem::Instance().Exists(executable->GetFileSpec())) in GetTargetExecutable()
173 return executable; in GetTargetExecutable()
[all …]
/freebsd/usr.sbin/uefisign/
H A Duefisign.h40 struct executable { struct
83 void parse(struct executable *x); argument
84 void update(struct executable *x);
85 size_t signature_size(const struct executable *x);
86 void show_certificate(const struct executable *x);
87 void range_check(const struct executable *x,
H A Dchild.c52 load(struct executable *x) in load()
82 digest_range(struct executable *x, EVP_MD_CTX *mdctx, off_t off, size_t len) in digest_range()
96 digest(struct executable *x) in digest()
187 show_digest(const struct executable *x) in show_digest()
198 send_digest(const struct executable *x, int pipefd) in send_digest()
205 receive_signature(struct executable *x, int pipefd) in receive_signature()
212 save(struct executable *x, FILE *fp, const char *path) in save()
229 struct executable *x; in child()
H A Dpe.c142 range_check(const struct executable *x, off_t off, size_t len, in range_check()
165 signature_size(const struct executable *x) in signature_size()
184 show_certificate(const struct executable *x) in show_certificate()
225 parse_section_table(struct executable *x, off_t off, int number_of_sections) in parse_section_table()
262 parse_directory(struct executable *x, off_t off, in parse_directory()
312 compute_checksum(const struct executable *x) in compute_checksum()
348 parse_optional_32_plus(struct executable *x, off_t off, in parse_optional_32_plus()
398 parse_optional_32(struct executable *x, off_t off, int number_of_sections) in parse_optional_32()
447 parse_optional(struct executable *x, off_t off, int number_of_sections) in parse_optional()
468 parse_pe(struct executable *x, off_t off) in parse_pe()
[all …]
/freebsd/contrib/llvm-project/lldb/source/Core/
H A DDynamicLoader.cpp79 ModuleSP executable = target.GetExecutableModule(); in GetTargetExecutable() local
81 if (executable) { in GetTargetExecutable()
82 if (FileSystem::Instance().Exists(executable->GetFileSpec())) { in GetTargetExecutable()
83 ModuleSpec module_spec(executable->GetFileSpec(), in GetTargetExecutable()
84 executable->GetArchitecture()); in GetTargetExecutable()
90 executable->GetUUID().IsValid()) { in GetTargetExecutable()
91 if (module_sp->GetUUID() != executable->GetUUID()) in GetTargetExecutable()
92 executable.reset(); in GetTargetExecutable()
93 } else if (executable->FileHasChanged()) { in GetTargetExecutable()
94 executable.reset(); in GetTargetExecutable()
[all …]

12345678910>>...12