Searched refs:execute_command (Results 1 – 7 of 7) sorted by relevance
4 Subject: [PATCH] execute_command: workaround for GUI apps with weston15 execute_command.sh | 34 +++++++++++++++++++++++++++++++++-20 diff --git a/execute_command.sh b/execute_command.sh22 --- a/execute_command.sh23 +++ b/execute_command.sh97 - $script_command = "./execute_command.sh \"".addslashes($script_link). "\" ".$random_string.".txt …98 + $script_command = "./execute_command.sh \"".addslashes($script_link). "\" ".$random_string.".txt …
1 0001-execute_command-workaround-for-GUI-apps-with-weston.patch -p1
20 ==2782220== by 0x4045A6: execute_command (grub-fstest.c:59)32 ==2782220== by 0x4045A6: execute_command (grub-fstest.c:59)
162 static char *execute_command; variable572 execute_command = str; in init_setup()1652 if (execute_command) { in kernel_init()1653 ret = run_init_process(execute_command); in kernel_init()1657 execute_command, ret); in kernel_init()
107070100A8AEB0000041ED0000000000000000000000116841B48100000000000000FD0000000200000000000000000000000200000000.07070100A8B07C000081A40000000000000000000000016841263500000000000000FD0000000200000000000000000000000900000000.gitkeep07070100A8B07D000081A40000000000000000000000016841263500000000000000FD0000000200000000000000000000000B00000000.skip_fsck07070100A8AEB10000A1FF0000000000000000000000016841B0B600000007000000FD0000000200000000000000000000000400000000binusr/bin07070100A8B07E000081A400000000000000000000000168412635000001CC000000FD0000000200000000000000000000001100000000busybox. ...