代码搜索:bash
找到约 5,321 项符合「bash」的源代码
代码结果 5,321
www.eeworm.com/read/374494/9402904
tst-groupmod
#!/bin/bash
export LANG=C
TEMPDIR=`mktemp -d tests.XXXXXX`
cat $TEMPDIR/group
root:x:0:bigsister
bin:x:1:daemon
uucp:x:14:
dialout:x:16:
audio:x:17:
floppy:x:19:
utmp:x:22:
video:x:33:
EOT
www.eeworm.com/read/417848/10974448
sh testit.sh
#!/bin/bash -norc
set -x
strace -v ./mapper1 /mnt/wrapfs/BAR.TXT 0 20
exit 0
# attach a node so /mnt/wrapfs/abc -> /n/fist/zadok
./fist_ioctl +a /mnt/wrapfs abc /n/fist/zadok
#read n
#./fist_ioctl
www.eeworm.com/read/469347/6973355
sh foo_backup.sh
#!/bin/bash
BACKUP_DIR=/backup
SRCDIR=/src
TODAY_TIME=$(date +%F)
full()
{
touch /tmp/time.key
cd $SRCDIR
find ./ ! -type d > file.list
mkdir -p $BACKUP_DIR/$TODAY_TIME
tar -T file.list -c | tar
www.eeworm.com/read/468463/6991120
gitcompile
#!/bin/bash
if test -d ../alsa-lib/utils && ! test -r `aclocal --print-ac-dir`/alsa.m4; then
alsa_m4_flags="-I ../alsa-lib/utils"
fi
aclocal $alsa_m4_flags $ACLOCAL_FLAGS
# save original files to a
www.eeworm.com/read/458613/7293192
sh build_bootloader.sh
#!/bin/bash
rm -f *.zip
rm -f *.nb0
wget http://www.handhelds.org/~aquadran/MyPal716/firmware/original/asus716_bootloader_Jan_30_2004_backup.zip
unzip asus716_bootloader_Jan_30_2004_backup.zip A7123
www.eeworm.com/read/458613/7293193
sh build_first_time.sh
#!/bin/bash
rm -f orig/asus716_bootloader_Jan_30_2004_backup.zip
rm -f orig/A7123000_orig.nb0
cd orig
wget http://www.handhelds.org/~aquadran/MyPal716/firmware/original/asus716_bootloader_Jan_30_200
www.eeworm.com/read/438832/7725292
sh arrow-detect.sh
#!/bin/bash
# arrow-detect.sh: 检测方向键, 和一些非打印字符的按键.
# 感谢, Sandro Magi, 告诉了我们怎么做到这点.
# --------------------------------------------
# 按键所产生的字符编码.
arrowup='\[A'
arrowdown='\[B'
arrowrt='\[C'
arrowleft='
www.eeworm.com/read/438832/7725401
sh numbers.sh
#!/bin/bash
# numbers.sh: 几种不同数制的数字表示法.
# 10进制: 默认情况
let "dec = 32"
echo "decimal number = $dec" # 32
# 这没什么特别的.
# 8进制: 以'0'(零)开头
let "oct = 032"
echo "octal number = $oct"
www.eeworm.com/read/438832/7725430
sh stupid-script-tricks.sh
#!/bin/bash
# stupid-script-tricks.sh: 朋友, 别在家试这个脚本.
# 来自于"Stupid Script Tricks," 卷I.
dangerous_variable=`cat /boot/vmlinuz` # 这是压缩过的Linux内核自身.
echo "string-length of \$dangerous_variable = ${#