| /openbsd-src/usr.bin/file/magdir/ |
| H A D | OpenBSD | 17 >>20 lelong =4096 dynamically linked executable 18 >>20 lelong >4096 dynamically linked executable 19 >0 byte ^0x80 executable 22 >0 byte &0x80 dynamically linked executable 23 >0 byte ^0x80 executable 26 >0 byte &0x80 dynamically linked executable 29 >>20 lelong !0 executable 38 >>20 belong =8192 dynamically linked executable 39 >>20 belong >8192 dynamically linked executable 40 >0 byte ^0x80 executable [all …]
|
| H A D | netbsd | 17 >>20 lelong =4096 dynamically linked executable 18 >>20 lelong >4096 dynamically linked executable 19 >0 byte ^0x80 executable 22 >0 byte &0x80 dynamically linked executable 23 >0 byte ^0x80 executable 26 >0 byte &0x80 dynamically linked executable 29 >>20 lelong !0 executable 39 >>20 belong =8192 dynamically linked executable 40 >>20 belong >8192 dynamically linked executable 41 >0 byte ^0x80 executable [all …]
|
| H A D | plan9 | 7 0 belong 0x00000107 Plan 9 executable, Motorola 68k 8 0 belong 0x000001EB Plan 9 executable, Intel 386 9 0 belong 0x00000247 Plan 9 executable, Intel 960 10 0 belong 0x000002AB Plan 9 executable, SPARC 11 0 belong 0x00000407 Plan 9 executable, MIPS R3000 12 0 belong 0x0000048B Plan 9 executable, AT&T DSP 3210 13 0 belong 0x00000517 Plan 9 executable, MIPS R4000 BE 14 0 belong 0x000005AB Plan 9 executable, AMD 29000 15 0 belong 0x00000647 Plan 9 executable, ARM 7-something 16 0 belong 0x000006EB Plan 9 executable, PowerPC [all …]
|
| H A D | commands | 7 0 string/b #!\ /bin/sh Bourne shell script text executable 9 0 string/b #!\ /bin/csh C shell script text executable 12 0 string/b #!\ /bin/ksh Korn shell script text executable 14 0 string/b #!\ /bin/tcsh Tenex C shell script text executable 16 0 string/b #!\ /usr/local/tcsh Tenex C shell script text executable 18 0 string/b #!\ /usr/local/bin/tcsh Tenex C shell script text executable 23 0 string/b #!\ /bin/zsh Paul Falstad's zsh script text executable 25 0 string/b #!\ /usr/bin/zsh Paul Falstad's zsh script text executable 27 0 string/b #!\ /usr/local/bin/zsh Paul Falstad's zsh script text executable 29 0 string/b #!\ /usr/local/bin/ash Neil Brown's ash script text executable [all …]
|
| H A D | ncr | 12 >20 beshort 0407 executable 13 >20 beshort 0410 pure executable 17 >20 beshort 0407 executable 18 >20 beshort 0410 pure executable 22 >20 beshort 0407 executable 23 >20 beshort 0410 pure executable 27 >20 beshort 0407 executable 28 >20 beshort 0410 pure executable 32 >20 beshort 0407 executable 33 >20 beshort 0410 pure executable [all …]
|
| H A D | sun | 12 >>20 belong =4096 dynamically linked executable 13 >>20 belong >4096 dynamically linked executable 14 >0 byte ^0x80 executable 18 >0 byte &0x80 dynamically linked executable 19 >0 byte ^0x80 executable 23 >0 byte &0x80 dynamically linked executable 24 >0 byte ^0x80 executable 30 >>20 belong =4096 dynamically linked executable 31 >>20 belong >4096 dynamically linked executable 32 >0 byte ^0x80 executable [all …]
|
| H A D | ibm370 | 6 # "ibm370" said that 0x15d == 0535 was "ibm 370 pure executable". 10 # 0 short 0535 370 sysV executable 14 # 0 short 0530 370 sysV pure executable 21 0 beshort 0537 370 XA sysV executable 25 0 beshort 0532 370 XA sysV pure executable 29 0 beshort 054001 370 sysV pure executable 31 0 beshort 055001 370 XA sysV pure executable 33 0 beshort 056401 370 sysV executable 35 0 beshort 057401 370 XA sysV executable 37 0 beshort 0531 SVR2 executable (Amdahl-UTS) [all …]
|
| H A D | bsdi | 7 0 lelong 0314 386 compact demand paged pure executable 11 0 lelong 0407 386 executable 15 0 lelong 0410 386 pure executable 19 0 lelong 0413 386 demand paged pure executable 27 >>20 belong =4096 dynamically linked executable 28 >>20 belong >4096 dynamically linked executable 29 >0 byte ^0x80 executable 34 >0 byte &0x80 dynamically linked executable 35 >0 byte ^0x80 executable 40 >0 byte &0x80 dynamically linked executable [all …]
|
| H A D | pdp | 4 # pdp: file(1) magic for PDP-11 executable/object and APL workspace 11 0 leshort 0407 PDP-11 executable 18 0 leshort 0410 PDP-11 pure executable 22 0 leshort 0411 PDP-11 separate I&D executable 29 0 leshort 0413 PDP-11 demand-paged pure executable 32 0 leshort 0430 PDP-11 overlaid pure executable 35 0 leshort 0431 PDP-11 overlaid separate executable
|
| H A D | vax | 4 # vax: file(1) magic for VAX executable/object and APL workspace 12 0 lelong 0407 VAX executable 15 0 lelong 0410 VAX pure executable 18 0 lelong 0413 VAX demand paged pure executable 21 0 lelong 0420 VAX demand paged (first page unmapped) pure executable 30 0 leshort 0570 VAX COFF executable 33 0 leshort 0575 VAX COFF pure executable
|
| H A D | blit | 12 #0 long 0407 68K Blit (standalone) executable 13 #0 short 0407 VAX-order2 68K Blit (standalone) executable 14 0 short 03401 VAX-order 68K Blit (standalone) executable 15 0 long 0406 68k Blit mpx/mux executable 16 0 short 0406 VAX-order2 68k Blit mpx/mux executable 17 0 short 03001 VAX-order 68k Blit mpx/mux executable 20 #0 short 0520 tty630 layers executable
|
| H A D | intel | 6 # Various flavors of x86 UNIX executable/object (other than Xenix, which 17 0 leshort 0502 basic-16 executable 20 0 leshort 0503 basic-16 executable (TV) 23 0 leshort 0510 x86 executable 25 0 leshort 0511 x86 executable (TV) 27 0 leshort =0512 iAPX 286 executable small model (COFF) 30 0 leshort =0522 iAPX 286 executable large model (COFF) 33 # SGI labeled the next entry as "iAPX 386 executable" --Dan Quinlan 34 0 leshort =0514 80386 COFF executable
|
| H A D | mips | 15 0 belong 0407 old SGI 68020 executable 16 0 belong 0410 old SGI 68020 pure executable 31 0 beshort 0x0160 MIPSEB ECOFF executable 40 0 beshort 0x0162 MIPSEL-BE ECOFF executable 49 0 beshort 0x6001 MIPSEB-LE ECOFF executable 58 0 beshort 0x6201 MIPSEL ECOFF executable 69 0 beshort 0x0163 MIPSEB MIPS-II ECOFF executable 78 0 beshort 0x0166 MIPSEL-BE MIPS-II ECOFF executable 87 0 beshort 0x6301 MIPSEB-LE MIPS-II ECOFF executable 96 0 beshort 0x6601 MIPSEL MIPS-II ECOFF executable [all …]
|
| H A D | freebsd | 11 # schemes for distinguishing between executable images, shared libraries, 25 # an executable, and is dynamically-linked if the "has run-time 33 # a dynamically-linked executable; 40 # if the entry point is non-zero, it's an executable, otherwise 46 # a dynamically-linked executable, otherwise it's just an 47 # executable. 57 # it's a dynamically-linked executable); 60 # set, then it's just an executable. 83 >>3 byte&0x80 0x80 dynamically linked executable 84 >>3 byte&0x80 0x00 executable [all …]
|
| H A D | linux | 11 # >0 leshort 0407 impure executable (OMAGIC) 12 # >0 leshort 0410 pure executable (NMAGIC) 13 # >0 leshort 0413 demand-paged executable (ZMAGIC) 14 # >0 leshort 0314 demand-paged executable (QMAGIC) 16 0 lelong 0x00640107 Linux/i386 impure executable (OMAGIC) 18 0 lelong 0x00640108 Linux/i386 pure executable (NMAGIC) 20 0 lelong 0x0064010b Linux/i386 demand-paged executable (ZMAGIC) 22 0 lelong 0x006400cc Linux/i386 demand-paged executable (QMAGIC) 28 0 string \01\03\020\04 Linux-8086 impure executable 30 0 string \01\03\040\04 Linux-8086 executable [all …]
|
| H A D | sequent | 11 0 lelong 0x10ea BALANCE NS32000 executable (0 @ 0) 14 0 lelong 0x20ea BALANCE NS32000 executable (invalid @ 0) 17 0 lelong 0x30ea BALANCE NS32000 standalone executable 27 0 leshort 0x22eb SYMMETRY i386 executable (0 @ 0) 30 0 leshort 0x32eb SYMMETRY i386 executable (invalid @ 0) 33 0 leshort 0x42eb SYMMETRY i386 standalone executable
|
| H A D | encore | 10 >20 short 0x107 executable 11 >20 short 0x108 pure executable 12 >20 short 0x10b demand-paged executable 13 >20 short 0x10f unsupported executable 18 0 short 0x155 Encore unsupported executable
|
| H A D | motorola | 10 >18 beshort &00000020 executable 17 0 beshort 0521 mc68k executable (shared) 19 0 beshort 0522 mc68k executable (shared demand paged) 24 0 beshort 0554 68K BCS executable 30 0 beshort 0555 88K BCS executable 42 0 belong&0xFFFFFFF0 0x601A0000 Atari ST M68K contiguous executable 47 0 belong&0xFFFFFFF0 0x601B0000 Atari ST M68K non-contig executable 54 0 beshort 0x601A Atari 68xxx executable,
|
| H A D | unknown | 9 # 0x107 is 0407; 0x108 is 0410; both are PDP-11 (executable and pure, 21 0 short 0x107 unknown machine executable 24 0 short 0x108 unknown pure executable 30 0 short 0x10b unknown pure executable 33 0 long 0x10c unknown demand paged pure executable 35 0 long 0x10e unknown readable demand paged pure executable
|
| /openbsd-src/gnu/llvm/lldb/source/Plugins/DynamicLoader/Windows-DYLD/ |
| H A D | DynamicLoaderWindowsDYLD.cpp | 97 lldb::addr_t DynamicLoaderWindowsDYLD::GetLoadAddress(ModuleSP executable) { in GetLoadAddress() argument 99 auto it = m_loaded_modules.find(executable); in GetLoadAddress() 107 FileSpec file_spec(executable->GetPlatformFileSpec()); in GetLoadAddress() 113 m_loaded_modules[executable] = load_addr; in GetLoadAddress() 124 ModuleSP executable = GetTargetExecutable(); in DidAttach() local 126 if (!executable.get()) in DidAttach() 131 lldb::addr_t load_addr = GetLoadAddress(executable); in DidAttach() 141 UpdateLoadedSections(executable, LLDB_INVALID_ADDRESS, load_addr, false); in DidAttach() 144 module_list.Append(executable); in DidAttach() 154 ModuleSP executable = GetTargetExecutable(); in DidLaunch() local [all …]
|
| /openbsd-src/gnu/llvm/lldb/source/Plugins/DynamicLoader/Hexagon-DYLD/ |
| H A D | DynamicLoaderHexagonDYLD.cpp | 115 ModuleSP executable; in DidAttach() local 118 executable = GetTargetExecutable(); in DidAttach() 125 if (executable.get() == nullptr) in DidAttach() 136 module_list.Append(executable); in DidAttach() 140 UpdateLoadedSections(executable, LLDB_INVALID_ADDRESS, load_offset, true); in DidAttach() 165 ModuleSP executable = target.GetExecutableModule(); in GetTargetExecutable() local 168 if (!executable.get()) in GetTargetExecutable() 169 return executable; in GetTargetExecutable() 172 if (!FileSystem::Instance().Exists(executable->GetFileSpec())) in GetTargetExecutable() 173 return executable; in GetTargetExecutable() [all …]
|
| /openbsd-src/gnu/usr.bin/gcc/gcc/testsuite/consistency.vlad/ |
| H A D | vlad.exp | 84 set executable $tmpdir/$basename.x 100 remote_file build delete $executable 114 …_output [gcc_target_compile "$cpp_flag $src -x none $wrap_file" "$executable" executable $options]; 121 remote_file build delete $executable 127 remote_file build delete $executable 136 remote_file build delete $executable 142 if { ![file exists $executable] } { 159 remote_file build delete $executable 177 set result [consistency_load "$executable" "" ""] 191 remote_file build delete $executable
|
| /openbsd-src/gnu/llvm/lldb/source/Core/ |
| H A D | DynamicLoader.cpp | 78 ModuleSP executable = target.GetExecutableModule(); in GetTargetExecutable() local 80 if (executable) { in GetTargetExecutable() 81 if (FileSystem::Instance().Exists(executable->GetFileSpec())) { in GetTargetExecutable() 82 ModuleSpec module_spec(executable->GetFileSpec(), in GetTargetExecutable() 83 executable->GetArchitecture()); in GetTargetExecutable() 89 executable->GetUUID().IsValid()) { in GetTargetExecutable() 90 if (module_sp->GetUUID() != executable->GetUUID()) in GetTargetExecutable() 91 executable.reset(); in GetTargetExecutable() 92 } else if (executable->FileHasChanged()) { in GetTargetExecutable() 93 executable.reset(); in GetTargetExecutable() [all …]
|
| /openbsd-src/gnu/usr.bin/gcc/gcc/testsuite/lib/ |
| H A D | f-torture.exp | 155 set executable $tmpdir/[file tail [file rootname $src].x] 179 remote_file build delete $executable 184 set comp_output [g77_target_compile "$src" "$executable" executable $options]; 191 remote_file build delete $executable 197 remote_file build delete $executable 206 remote_file build delete $executable 217 } elseif ![file exists $executable] { 249 set result [g77_load "$executable" "" ""] 253 remote_file build delete $executable
|
| /openbsd-src/gnu/lib/libiberty/src/ |
| H A D | pex-unix.c | 339 pex_child_error (struct pex_obj *obj, const char *executable, in pex_child_error() argument 345 writeerr (executable); in pex_child_error() 359 pex_unix_exec_child (struct pex_obj *obj, int flags, const char *executable, in pex_unix_exec_child() argument 394 pex_child_error (obj, executable, "dup2", errno); in pex_unix_exec_child() 396 pex_child_error (obj, executable, "close", errno); in pex_unix_exec_child() 401 pex_child_error (obj, executable, "dup2", errno); in pex_unix_exec_child() 403 pex_child_error (obj, executable, "close", errno); in pex_unix_exec_child() 408 pex_child_error (obj, executable, "dup2", errno); in pex_unix_exec_child() 410 pex_child_error (obj, executable, "close", errno); in pex_unix_exec_child() 415 pex_child_error (obj, executable, "close", errno); in pex_unix_exec_child() [all …]
|