n ELF header,
followed by a program header table or a section header table, or both.
The ELF header is always at offset zero of the file. The program
header table and the section header table's offset in the file are
defined in the ELF header. The tw
caller to create and manage a hash search table containing entries con-
sisting of a key (... Using these func-
tions, only one hash table can be used at a time.
The three functi... rogram to use more than one hash search
table at the same time. The last argument, htab, points to a structure
that describes the table on which the function is to operate. The pro-
caller to create and manage a hash search table containing entries con-
sisting of a key (... Using these func-
tions, only one hash table can be used at a time.
The three functi... rogram to use more than one hash search
table at the same time. The last argument, htab, points to a structure
that describes the table on which the function is to operate. The pro-
caller to create and manage a hash search table containing entries con-
sisting of a key (... Using these func-
tions, only one hash table can be used at a time.
The three functi... rogram to use more than one hash search
table at the same time. The last argument, htab, points to a structure
that describes the table on which the function is to operate. The pro-
caller to create and manage a hash search table containing entries con-
sisting of a key (... Using these func-
tions, only one hash table can be used at a time.
The three functi... rogram to use more than one hash search
table at the same time. The last argument, htab, points to a structure
that describes the table on which the function is to operate. The pro-
caller to create and manage a hash search table containing entries con-
sisting of a key (... Using these func-
tions, only one hash table can be used at a time.
The three functi... rogram to use more than one hash search
table at the same time. The last argument, htab, points to a structure
that describes the table on which the function is to operate. The pro-
caller to create and manage a hash search table containing entries con-
sisting of a key (... Using these func-
tions, only one hash table can be used at a time.
The three functi... rogram to use more than one hash search
table at the same time. The last argument, htab, points to a structure
that describes the table on which the function is to operate. The pro-
entries
for the specified routing table. For the other fields, except
rtm_table and rtm_protocol, 0 is the wildcard.
... OS filter */
unsigned char rtm_table; /* Routing table ID */
unsigned char rtm_protocol; /* Routing protocol; see belo
Loads the "user definable" (fourth) table in the kernel which
maps bytes ... Loads the "user definable" (fourth) table in the kernel which
maps bytes ... 1.1.92)
PIO_UNIMAPCLR
Clear table, possibly advise hash algorithm. argp points to ... Gets one entry in key translation table (keycode to action
code). argp
Loads the "user definable" (fourth) table in the kernel which
maps bytes into... Loads the "user definable" (fourth) table in the kernel which
maps bytes into... 1.1.92)
PIO_UNIMAPCLR
Clear table, possibly advise hash algorithm. argp points to ... Gets one entry in key translation table (keycode to action
code). argp poi
s below is relevant.
ARM functions
The table below lists the symbols exported by the vDSO.
... ser_helpers.txt.
aarch64 functions
The table below lists the symbols exported by the vDSO.
... x-kernel:fixed-code
mips functions
The table below lists the symbols exported by the vDSO.
... inux 4.4)
ia64 (Itanium) functions
The table below lists the symbols exported by the vDSO.
s-
formed according to the current mapping table (which translates it to a
Unicode value). ... re transformation according
to the mapping table) it has one of the 14 codes 00 (NUL), 07 (BEL), 0... to be tog-
gled before the mapping table translation is done.
21 set normal in... hese variables G0 and G1 point at a translation table, and can be
changed by the user. Initi
HOSTS(5)
NAME
hosts - static table lookup for hostnames
SYNOPSIS
/etc/hosts
... In modern systems, even though the host table has been superseded by
DNS, it is still wi... ping
Most systems have a small host table containing the name and
address...
NIS Sites that use NIS use the host table as input to the NIS host
database.
ss, such as the virtual address
space, the table of file descriptors, and the table of signal handlers.
(Note that on this manual page, "calling ... ess
share the same file descriptor table. Any file descriptor cre-
ated by ... fected. If a process sharing a file descriptor table calls
execve(2), its file descript
ss, such as the virtual address
space, the table of file descriptors, and the table of signal handlers.
(Note that on this manual page, "calling ... ess
share the same file descriptor table. Any file descriptor cre-
ated by ... fected. If a process sharing a file descriptor table calls
execve(2), its file descript