Sponsored Content
Top Forums Shell Programming and Scripting How can I do a rexec to execute un C exe ? Post 302107769 by jim mcnamara on Tuesday 20th of February 2007 03:01:10 PM
Old 02-20-2007
You will have to compile and link prog.e over on the other machine, and keep the executable ONLY over there. It looks like you copied a local version of the program to the remote box. This is not guaranteed to work, by any means.
 

10 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

expect (re: rexec)

In http://forums.unix.com/showthread.php?threadid=391 there is one statement called expect. but when I issue command whereis expect, respond from o/s only EXPECT: (only one world). I try to find it at /usr/bin, no expect statement there ? is it default unix o/s command ? I am using AIX on... (1 Reply)
Discussion started by: yatno
1 Replies

2. UNIX for Dummies Questions & Answers

Enabling Rexec ????

Can someone tell me how I would enable Rexec on a UNIX machine? And is the procedure different on the different systems - Solaris, HP-UX -etc. Thanks~!! mike (1 Reply)
Discussion started by: raichuu
1 Replies

3. Programming

how To edit exe to insert a serial no wich can be usd by runing exe

At time of installation I have to open the resource. and i have to insert a string serial number in the exe. please provide me code to edit the exe (in solaris) to insert a serial number which can be used by exe at run time. (6 Replies)
Discussion started by: ssahu
6 Replies

4. Solaris

Rexec

How is rexec enabled on a Solaris 8? How can I check if rexec is installed? (1 Reply)
Discussion started by: pmj1970
1 Replies

5. UNIX for Dummies Questions & Answers

launching script via REXEC

Hi folks! my client uses an winapplication which is launching shell-scripts remotely on a HP-Unix Machine via Rexec. The application-configuration is launching the script (which is in the home directory of connecting user) like: rexec host user pass shell.sh So far so good, everything... (3 Replies)
Discussion started by: JohnMurdoch
3 Replies

6. Programming

c++ : Use of System() to execute .exe with parameters

Hello, I 've trie to execute a a program with parameters unsuccessfully and i take the above message : "The system cannot find the path specified." I used a variaton of the above command : system("\"C:\\xxx\\xxx\\xxx.exe -xxx -xxx xxx.xxx xxx.xxx xxx.xxx\""); Thanks in advance (4 Replies)
Discussion started by: eusta
4 Replies

7. AIX

rexec - other options?

Rexec executes commands one at a time on a remote host. The rexec command provides an automatic login feature by checking for a $HOME/.netrc file. User and password are stored in $HOME/.netrc. I would like to log on to another host and execute a script/command but not using $HOME/.netrc file,... (4 Replies)
Discussion started by: ioniCoder
4 Replies

8. UNIX for Advanced & Expert Users

Rexec Issue

Hi Team, I am executing some ksh scripts which inturn calls java files in AIX Environment. We have installed java6_64 which is in .profile. But when we execute from rexec its taking path from some different place that does not have java in $PATH variable. Can you please help me find out which... (2 Replies)
Discussion started by: balasubramani04
2 Replies

9. Shell Programming and Scripting

how to execute an exe at startup using rc.local

I want to execute a qt exe program at startup. That is after automatic login instead of loading Desktop and seeing it, the program quickly pop up to the screen. For this, I think we should add the script to rcx.local rather than rc.local I guess though.. I tried adding a script to /etc/rc.local... (0 Replies)
Discussion started by: dr_mabuse
0 Replies

10. UNIX for Dummies Questions & Answers

Not able to execute an exe file from my location

Hello all, Am facing a peculiar problem, I have copied a utility exe from a bin folder into my local temp folder. I am trying to execute that exe, but it throws out an error saying "No such file or directory". I have given 755 & 777 permissions to it and I tried, but it still throws out that... (6 Replies)
Discussion started by: abhisheksunkari
6 Replies
spike(1)						      General Commands Manual							  spike(1)

NAME
spike - Performs code optimization after linking a program SYNOPSIS
spike binary_file [options...] OPTIONS
Names the optimized binary output file. The default file name is a.out. Causes spike to use the feedback database stored in file, where file is the name of the input executable. This database is created by first compiling the program with the -feedback option (for example, cc -feedback prog) and then instrumenting and running the program with the pixie -update or prof -pixie -update command (see cc(1), pixie(1), and prof(1)). Causes spike to use file.Addrs (basic block addresses file) and file.Counts (basic block counts file) for profile- based optimization. These files are produced by the pixie tool (see pixie(1) and prof(1)). spike can be applied only to V5.1 or later kernels. Use this option when applying spike to the UNIX kernel (vmunix). Disables code layout optimization that splits procedures into multiple parts. Disables basic block chaining, which arranges code so that the fall through path is the commonly taken path. Disables procedure ordering. Reduces the number of padding nops inserted into the code to align instructions. The alignment usually makes the code run faster, but makes the code larger, which can cause more instruction cache misses. Adjusts the threshold used by procedure splitting in code layout to decide which code is frequently and infrequently executed. The default is that make up at least 99 percent of the estimated execution time are considered frequently executed and the rest are marked as infrequently executed. Increasing the threshold can help when the profile is not representative. For example, try a value of Displays the version number of spike. OPERANDS
Name of the binary file to which spike is to be applied. DESCRIPTION
spike is a tool for performing code optimization after linking. It is a replacement for om and does similar optimizations. Because it can operate on an entire program, spike is able to do optimizations that cannot be done by the compiler. Some of the optimizations that spike performs are code layout, deleting unreachable code, and optimization of address computations. spike is most effective when it uses profile information to guide optimization. spike can process binaries linked on Tru64 UNIX (formerly Digital UNIX) Version 4.0 or later systems. Binaries that are linked on Version 5.1 or later systems contain information that allows spike to do additional optimization. You can use spike in two ways: By applying the spike command to a binary file after compilation. As part of the compilation process, by specifying the -spike option with the cc command (or the cxx, f77, or f90 command, if the associated compiler is installed). The -spike option is more convenient when you are not using profile information (Example 2), or you are using profile information in the compiler, too (Example 3). The spike command is more convenient if you do not want to relink the executable (Example 1) or you are using profile information after compilation (Examples 4 and 5). All spike command options can be passed directly to the cc command's -spike option by using the (cc) -WS option. Example 6 shows the syn- tax. RESTRICTIONS
spike cannot process images that have been stripped. contain RPDR tables (see Section 2.3.7, Special Symbols, of the Object File/Symbol Table Format Specification) compute an offset from a code address. modify the text section at runtime. Using cord, atom, pixie, hiprof, or third on an image that has been processed with spike is unsupported. NOTES
spike tries to update the symbol table in the binary so that the optimized binary can be debugged. As with other compiler optimizations, there may be some situations where the debugger may not be able to properly report the current location in the program or display the val- ues of variables. If spike divides a procedure into multiple disjoint parts, the main body will keep the original procedure name, but the other parts will have names that are the original name with _cold_n (where n is a number) appended to the end. EXAMPLES
In the following example, spike is applied to the binary my_prog, producing the optimized output file prog1.opt. % spike my_prog -o prog1.opt In the following example, spike is applied during compilation with the cc command's -spike option: % cc -c file1.c % cc -o prog3 file1.o -spike The first command line creates the object file file1.o. The second command line links file1.o into an executable and uses spike to optimize the executable. The following example shows how to optimize a program, prog, by first compiling it with the -feedback option, then merging profiling statistics from two instrumented runs of the program, then compiling it with the -spike and -feedback options so the feedback information stored in the executable is used by the compiler and spike: % cc -feedback prog -o prog *.c % pixie -pids prog % prog.pixie (input set 1) % prog.pixie (input set 2) % prof -pixie -update prog prog.Counts.* % cc -spike -feed- back prog -o prog *.c The first compilation produces an augmented executable that will later accept feedback information. The pixie command creates an instrumented program (prog.pixie), which is then run twice. The -pids option adds the process ID of each test run to the name of the profiling data file produced -- for example prog.Counts.371 and prog.Counts.422. The prof -pixie command merges the two data files. The -update option updates the executable, prog, with the combined information. The program is compiled with the -spike and -feedback options so the feedback information stored in the executable is used by the compiler and spike. The following example shows how to optimize a program, prog, by first compiling it with the -feedback option, then merging profiling statistics from two instrumented runs of the program, then applying the spike -feedback command to use the feedback information stored in the executable: % cc -feedback prog -o prog *.c % pixie -pids prog % prog.pixie (input set 1) % prog.pixie (input set 2) % prof -pixie -update prog prog.Counts.* % spike prog -feedback prog -o prog.opt As in the previous example, the first compilation produces an augmented executable. The instrumented program is run twice, producing a uniquely named data file each time. The prof -pixie -update command merges the two data files and updates the executable with the combined information. The spike -feedback command uses the combined profiling information to produce the optimized output file prog.opt. The following example shows how to optimize a program, prog, by merging profiling statistics from two instrumented runs of the program, then applying the spike -fb command to use the feedback information in the and files: % cc prog -o prog *.c % pixie -pids prog % prog.pixie (input set 1) % prog.pixie (input set 2) % prof -pixie -merge prog.Counts prog prog.Addrs prog.Counts.* % spike prog -fb prog -o prog.opt The first compilation produces a normal executable. As in the previous example, the instrumented program is run twice, producing a uniquely named data file each time. The prof -pixie -merge command merges the two data files into one combined prog.Counts file. The spike -fb command uses the information in prog.Addrs and prog.Counts to produce the optimized output file prog.opt. The method in Example 4 is preferred. You should use the method in Example 5 only if you cannot compile with the -feedback option that uses feedback information stored in the executable. The following example shows the syntax for passing spike command options to the (cc) -spike option by using the (cc) -WS option: % cc -spike -feedback prog -o prog *.c -WS,-splitThresh,.999,-noaggressiveAlign RETURN STATUS
spike returns the following status values: 0: Success Nonzero: Error SEE ALSO
cc(1), pixie(1), prof(1) Programmer's Guide spike(1)
All times are GMT -4. The time now is 08:18 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy