当前位置:网站首页>cmake安装到指定目录
cmake安装到指定目录
2022-08-02 03:25:00 【PenguinLeee】
默认情况下我们在拿到一个库的源码(包含CmakeLists.txt),并在$REPO/build里执行:
cmake ..
make install
时,cmake会将库安装到/usr/local/include和/usr/local/lib上。此即所谓的“局部安装”。
如果想要全局安装的话,需要执行:
cmake -DCMAKE_INSTALL_PREFIX:PATH=/usr ..
make all install
就会将库安装在/usr/include和/usr/lib上。
边栏推荐
- 3. PHP data types, constants, strings and operators
- xxe of CTF
- 敏感信息泄露
- How to calculate the distance between two points on the earth (with formula derivation)
- Praying: 1 vulnhub walkthrough
- 阿里云MySQL5.7安装以及部分主要问题(总和)
- IO stream, encoding table, character stream, character buffer stream
- (3) 字符串
- (5) 模块与包、编码格式、文件操作、目录操作
- Offensive and defensive world - novice MISC area 1-12
猜你喜欢

(1) print()函数、转义字符、二进制与字符编码 、变量、数据类型、input()函数、运算符

Eric target penetration test complete tutorial

动力:2 vulnhub预排

(3)Thinkphp6数据库

Eric靶机渗透测试通关全教程

v-bind usage: class dynamic binding object array style style and function method

CTF-Neting Cup Past Topics

hackmyvm: may walkthrough

12.什么是JS

Command Execution Vulnerability
随机推荐
14. JS Statements and Comments, Variables and Data Types
VIKINGS: 1 vulnhub walkthrough
vim edit mode
WeChat applet development video loading: [Rendering layer network layer error] Failed to load media
4. PHP array and array sorting
PHP realizes the automatic reverse search prompt of the search box
战场:3(双子叶植物)vulnhub走读
The shooting range that web penetration must play - DVWA shooting range 1 (centos8.2+phpstudy installation environment)
(4) Function, Bug, Class and Object, Encapsulation, Inheritance, Polymorphism, Copy
Masashi: 1 vulnhub walkthrough
(7) superficial "crawlers" process (concept + practice)
13. JS output content and syntax
Warzone: 3 (Exogen) vulnhub walkthrough
MOMENTUM: 2 vulnhub walkthrough
After Alibaba Cloud sets up domain name resolution redirection, I cannot use Chrome to access it
17. JS conditional statements and loops, and data type conversion
Introduction to PHP (self-study notes)
Eric target penetration test complete tutorial
(1)Thinkphp6入门、安装视图、模板渲染、变量赋值
The learning path of a network security mouse - the basic use of nmap