行表提供了可执行指令与生成它们的源代码之间的映射关系。
The line table provides the mapping between the executable instructions and the source that generated them.
这个阶段要做的主要工作是确定二进制代码中哪些字节是可执行指令、哪些是数据。
The key work performed in this stage is to determine which bytes of the binary hold executable instruction and which hold data.
一旦程序的可执行指令已经被识别,它们就可以被分割为表示过程(或函数)的组。
Once the executable instructions of a program have been identified they may be segmented into groups representing procedures (or functions).
一种用于多模式分支预测器的系统和方法。一种用于预测计算机可执行指令的分支的执行的系统和方法。
The invention relates to a system and a method for a multi-mode branch predictor, which are used for predicting the executions of branches capable of executing commands of a computer.
查看断点属性时,该断点显示为一个地址断点,这个地址断点具有一个与函数中下一个可执行指令相对应的内存位置。
When you view the breakpoint properties, this breakpoint appears as an address breakpoint with a memory location corresponding to the next executable instruction in the function.
要查看代码中是哪条指令出错了,可以使用objdump命令输出可执行文件的代码,该命令会列出编译器所生成的指令。
To uncover the failed instruction in the code, do an object dump of the executable using objdump, which lists the instructions generated by the compiler.
本指令指示fop可执行文件执行以下操作。
This instruction tells the fop executable file to do the following.
调试这个问题的一种方法是对这个可执行程序执行objdump命令,并将其结果保存到一个文件中;然后查找出错的指令(在本例中,出错的操作码是98080000)。
One way of debugging this failure is to do an object dump of the executable and save it in a file, then search for the failed instruction (in this case, the failed opcode is 98080000).
将一条语句或指令翻译成可执行的形式,然后执行。
To translate a statement or instruction into executable form and then execute it.
如果未启用TRACE指令,将在编译过程中忽略所有跟踪代码,并且不会将其包含在将部署的可执行代码中。
If you do not enable the TRACE directive, all tracing code is ignored during compilation and is not included in the executable code that you will deploy.
说明如何借由将MSIL指令发出到属性和方法中,以建立可执行的程序码。
Explains how to create executable code by emitting MSIL instructions into properties and methods.
本程序通过分析PE文件格式,将可执行文件的文件定位表重新定位,指向用户编写的DLL,然后指令指针返回正常调用位置。
The procedures by analyzing PE file format, the executable files repositioning positioning table, prepared by the user at DLL, and then returned to normal indicators directive calling location.
显示使用者输入之前,必须先检查输入是否有恶意用户端指令码,例如可执行的指令码或SQL陈述式。
Before displaying user input, the input must be checked for malicious client script, such as executable script or SQL statements.
显示使用者输入之前,必须先检查输入是否有恶意用户端指令码,例如可执行的指令码或SQL陈述式。
Before displaying user input, the input must be checked for malicious client script, such as executable script or SQL statements.
应用推荐