代码搜索:bash
找到约 5,321 项符合「bash」的源代码
代码结果 5,321
www.eeworm.com/read/176340/9502708
gdbline
#!/bin/bash
#
# $Id: gdbline,v 1.1 2004/08/02 16:27:55 corbet Exp $
#
# gdbline module image
#
# Outputs an add-symbol-file line suitable for pasting into gdb to examine
# a loaded module.
#
cd /sys/m
www.eeworm.com/read/169711/9845390
loaddrv
#!/bin/bash
module=zjmdmdrv.o
device=zjmdmdrv
group=xhw
mode=664
pid=-1
pid=`ps -A|awk '$4=="klogd"{print $1}'`
curpath=`pwd`
#execute klogd
if test $pid>0
then
{
echo \"klogd\" running already
}
e
www.eeworm.com/read/365809/9845714
functest
#! /bin/bash
BR=${1:-"br549"}
ETH=${2:-"eth0"}
maxports=${3:-1000}
echo "Ethernet Bridge functional test"
echo -n "Testing kernel: " ; uname -a
echo -n "Utilities: " ; brctl -V
# fetch ip of w
www.eeworm.com/read/168707/9900374
gdbline
#!/bin/bash
#
# $Id: gdbline,v 1.1 2004/08/02 16:27:55 corbet Exp $
#
# gdbline module image
#
# Outputs an add-symbol-file line suitable for pasting into gdb to examine
# a loaded module.
#
cd /sys/m
www.eeworm.com/read/167231/9974854
load
#!/bin/bash
if [ "$USER" != "root" ]; then
echo "You are not root. Please enter root password now!"
su root -c "$0 $*"
exit
fi
echo "flushing hd..."
sync
echo done.
if [ "$(lsmod | grep zc030x)" !
www.eeworm.com/read/166184/10030497
gdbline
#!/bin/bash
#
# $Id: gdbline,v 1.1 2004/08/02 16:27:55 corbet Exp $
#
# gdbline module image
#
# Outputs an add-symbol-file line suitable for pasting into gdb to examine
# a loaded module.
#
cd /sys/m
www.eeworm.com/read/160867/10480783
loaddrv
#!/bin/bash
module=zjmdmdrv.o
device=zjmdmdrv
group=xhw
mode=664
pid=-1
pid=`ps -A|awk '$4=="klogd"{print $1}'`
curpath=`pwd`
#execute klogd
if test $pid>0
then
{
echo \"klogd\" running already
}
e
www.eeworm.com/read/352895/10495170
load
#!/bin/bash
if [ "$USER" != "root" ]; then
echo "You are not root. Please enter root password now!"
su root -c "$0 $*"
exit
fi
echo "flushing hd..."
sync
echo done.
if [ "$(lsmod | grep zc030x)" !
www.eeworm.com/read/422376/10638919
gdbline
#!/bin/bash
#
# $Id: gdbline,v 1.1 2004/08/02 16:27:55 corbet Exp $
#
# gdbline module image
#
# Outputs an add-symbol-file line suitable for pasting into gdb to examine
# a loaded module.
#
cd /sys/m
www.eeworm.com/read/421085/10756061
sh template_generator.sh
#!/bin/bash
# $Id: template_generator.sh 9537 2006-10-12 16:27:13Z nijel $
#
# Shell script that adds a new mimetype with transform function.
#
# The filename should contain either 'mimetype_subtype'