Searched refs:shell (Results 1 – 15 of 15) sorted by relevance
91 adb shell stop92 adb shell setprop libc.debug.hooks.enable 193 adb shell start97 adb shell101 Any process spawned from this shell will run with malloc hooks enabled.107 adb shell setprop wrap.<APP> '"LIBC_HOOKS_ENABLE=1"'111 … adb shell setprop wrap.com.google.android.googlequicksearchbox '"LIBC_HOOKS_ENABLE=1 logwrapper"'112 adb shell am force-stop com.google.android.googlequicksearchbox
31 adb shell rm -rf ${DEVICE_TEST_DIR32} ${DEVICE_TEST_DIR64} ${DEVICE_PROF_DIR}32 adb shell mkdir ${DEVICE_TEST_DIR32} ${DEVICE_TEST_DIR64} ${DEVICE_PROF_DIR}37 adb shell LLVM_PROFILE_FILE=${DEVICE_PROF_DIR}/bionic-%p-%m.profraw \40 adb shell LLVM_PROFILE_FILE=${DEVICE_PROF_DIR}/bionic-%p-%m.profraw \
123 adb shell rm -rf $target_dir125 | gzip -1 -c | adb shell 'cd /data/local/tmp && tar xz')126 env_setup+=( adb shell LD_LIBRARY_PATH=$target_dir )
97 adb shell /data/nativetest64/bionic-unit-tests/bionic-unit-tests --gtest_filter="malloc*"98 adb shell /data/nativetest/bionic-unit-tests/bionic-unit-tests --gtest_filter="malloc*"109 adb shell /data/nativetest64/memunreachable_binder_test/memunreachable_binder_test110 adb shell /data/nativetest/memunreachable_binder_test/memunreachable_binder_test111 adb shell /data/nativetest64/memunreachable_test/memunreachable_test112 adb shell /data/nativetest/memunreachable_test/memunreachable_test113 adb shell /data/nativetest64/memunreachable_unit_test/memunreachable_unit_test114 adb shell /data/nativetest/memunreachable_unit_test/memunreachable_unit_test180 …adb shell /data/benchmarktest64/bionic-benchmarks/bionic-benchmarks --benchmark_filter=stdlib_mall…181 …adb shell /data/benchmarktest/bionic-benchmarks/bionic-benchmarks --benchmark_filter=malloc_free_d…[all …]
118 NOTE: It is assumed that these commands are executed in adb as the shell user120 machine, you might need to escape the special shell characters such as **$**.
16 using the setprop command from the shell. This requires the ability to120 adb shell stop121 adb shell setprop libc.debug.malloc 1122 adb shell start126 adb shell setprop libc.debug.malloc.program ls127 adb shell setprop libc.debug.malloc 10128 adb shell ls /data/local/tmp
586 adb shell stop587 adb shell setprop libc.debug.malloc.options backtrace588 adb shell start592 adb shell setprop libc.debug.malloc.options backtrace593 adb shell setprop libc.debug.malloc.program ls594 adb shell ls598 adb shell stop599 adb shell setprop libc.debug.malloc.program app_process600 adb shell setprop libc.debug.malloc.options backtrace601 adb shell start[all …]
40 const char* dir, const char* shell) { in FindAndCheckPasswdEntry() argument51 EXPECT_STREQ(shell, name_passwd.pw_shell); in FindAndCheckPasswdEntry()63 EXPECT_STREQ(shell, id_passwd.pw_shell); in FindAndCheckPasswdEntry()
790 // adb shell /data/nativetest/bionic-unit-tests/bionic-unit-tests791 // adb shell /data/nativetest64/bionic-unit-tests/bionic-unit-tests1066 // adb shell /data/nativetest/bionic-unit-tests-static/bionic-unit-tests-static1067 // adb shell /data/nativetest64/bionic-unit-tests-static/bionic-unit-tests-static
111 const char* shell() const { in shell() function116 if (name() == nullptr || dir() == nullptr || shell() == nullptr) { in ToPasswdState()145 CopyFieldToString(passwd_state->sh_buffer_, shell(), sizeof(passwd_state->sh_buffer_)); in ToPasswdState()
93 // adb shell /data/benchmarktest/bionic-benchmarks/bionic-benchmarks94 // adb shell /data/benchmarktest64/bionic-benchmarks/bionic-benchmarks
16 $ adb shell /data/benchmarktest/bionic-benchmarks/bionic-benchmarks17 $ adb shell /data/benchmarktest64/bionic-benchmarks/bionic-benchmarks91 adb shell /data/benchmarktest/bionic-spawn-benchmarks/bionic-spawn-benchmarks92 adb shell /data/benchmarktest64/bionic-spawn-benchmarks/bionic-spawn-benchmarks
217 $ adb shell /data/nativetest/bionic-unit-tests/bionic-unit-tests218 $ adb shell \221 $ adb shell /data/nativetest64/bionic-unit-tests/bionic-unit-tests222 $ adb shell \288 $ adb shell \
410 adb shell setprop debug.ld.app.com.example.myapp dlerror,dlopen,dlsym427 adb shell setprop debug.ld.all dlerror,dlopen
42 Contains various Python and shell scripts used to get and re-generate