Home
last modified time | relevance | path

Searched refs:shell (Results 1 – 25 of 36) sorted by relevance

12

/art/tools/
Dbuildbot-setup-device.sh70 adb shell date
77 device_seconds_since_epoch=$(adb shell date -u +%s | tr -c -d '[:digit:]')
90 adb shell setprop ctl.stop llkd-0
91 adb shell setprop ctl.stop llkd-1
93 product_name=$(adb shell getprop ro.build.product)
99 adb shell pkill -9 -U logd logd && msginfo "...logd killed"
105 adb shell date -u @$host_seconds_since_epoch
109 adb shell setenforce 0
110 $verbose && adb shell getenforce
113 adb shell ifconfig lo up
[all …]
Dbuildbot-teardown-device.sh32 if adb shell test -d "$ART_TEST_CHROOT"; then
36 adb shell lsof | grep "$ART_TEST_CHROOT"
46 adb shell ls -ld "/proc/*/root" \
51 local cmdline=$(adb shell cat "$dir"/cmdline | tr '\000' ' ')
83 adb shell test -d "$dir" \
84 && adb shell mount | grep -q " on $dir type $fstype " \
85 && if adb shell umount "$dir"; then
86 $remove_dir && adb shell rmdir "$dir"
89 adb shell lsof | grep "$dir"
94 adb shell rm -f "$ART_TEST_CHROOT/bin"
[all …]
Dbuildbot-cleanup-device.sh47 if adb shell test -d "$ART_TEST_CHROOT"; then
49 adb shell rm -rf "$ART_TEST_CHROOT/linkerconfig"
52 adb shell rm -rf "$ART_TEST_CHROOT/system"
55 adb shell rm -rf "$ART_TEST_CHROOT/data"
58 adb shell rmdir "$ART_TEST_CHROOT" || adb shell ls -la "$ART_TEST_CHROOT"
61 adb shell rm -rf \
Dboot-image-profile-configure-device.sh55 adb shell stop
56 adb shell setprop dalvik.vm.profilebootclasspath true
57 adb shell setprop dalvik.vm.profilesystemserver true
58 adb shell find "/data/misc/profiles -name *.prof -exec truncate -s 0 {} \;"
59 adb shell start
Dadd_package_property.sh27 adb shell chmod o+x /data/data/$PACKAGE_NAME/$PROPERTY_SCRIPT_NAME
28 adb shell restorecon /data/data/$PACKAGE_NAME/$PROPERTY_SCRIPT_NAME
29 adb shell setprop wrap.$PACKAGE_NAME /data/data/$PACKAGE_NAME/$PROPERTY_SCRIPT_NAME
Dbuildbot-sync.sh53 adb shell mkdir -p "$ART_TEST_CHROOT/$dir"
73 adb shell mkdir -p "$ART_TEST_CHROOT/system/framework"
82 adb shell mkdir -p "$ART_TEST_CHROOT/apex"
118 adb shell rm -rf "$ART_TEST_CHROOT/apex/${dst_apex}"
145 adb shell mkdir -p "$ART_TEST_CHROOT$output_dir"
153 adb shell chroot "$ART_TEST_CHROOT" \
Drun-gtests.sh66 "$adb" shell chroot "$ART_TEST_CHROOT" $@
80 dex2oatbootclasspath=$("$adb" shell echo \$DEX2OATBOOTCLASSPATH)
86 bootclasspath=$("$adb" shell echo \$BOOTCLASSPATH)
Dwrap-logcat.py49 shell=False,
55 shell=False) as run_test_proc:
Dboot-image-profile-extract-profile.sh31 adb shell cmd package snapshot-profile android
Dsymbolize.sh51 adb shell $@ | sed 's/\r$//'
Dgenerate_cmake_lists.py72 …subprocess.check_output('build/soong/soong_ui.bash --make-mode', shell=True, cwd=ANDROID_BUILD_TOP)
/art/tools/jvmti-agents/field-counts/
Dcount-fields.py76 device.shell("setenforce 0".split())
79 lib32 = device.shell("mktemp".split())[0].strip()
80 lib64 = device.shell("mktemp".split())[0].strip()
102 device.shell("logcat -c".split())
109 device.shell('rm {}'.format(lib32).split())
110 device.shell('rm {}'.format(lib64).split())
120 name = device.shell('cat /proc/{}/cmdline'.format(pid).split())[0].strip('\0')
123 target32 = device.shell('mktemp -p {}'.format(targetdir).split())[0].strip()
125 target64 = device.shell('mktemp -p {}'.format(targetdir).split())[0].strip()
128 device.shell('cp {} {}'.format(bit32, target32).split())
[all …]
DREADME.md23 ```shell
30 ```shell
31 adb shell setenforce 0
35 adb shell am start-activity --attach-agent '/data/local/tmp/libfieldcounts.so=Ljava/lang/Class;.ext…
/art/tools/jvmti-agents/simple-force-redefine/
DREADME.md16 > `adb shell setenforce 0`
24 > `adb shell am attach-agent $(adb shell pidof some.deubggable.app) /data/local/tmp/libforcerede…
28 > `adb shell am attach-agent $(adb shell pidof some.deubggable.app) /data/local/tmp/libforcerede…
29 > `adb shell am attach-agent $(adb shell pidof some.deubggable.app) /data/local/tmp/libforcerede…
30 > `adb shell am attach-agent $(adb shell pidof some.deubggable.app) /data/local/tmp/libforcerede…
/art/tools/jvmti-agents/field-null-percent/
Dcheck-null-fields.py75 device.shell("setenforce 0".split())
78 lib32 = device.shell("mktemp".split())[0].strip()
79 lib64 = device.shell("mktemp".split())[0].strip()
102 device.shell("logcat -c".split())
109 device.shell('rm {}'.format(lib32).split())
110 device.shell('rm {}'.format(lib64).split())
120 device.shell(['am', 'attach-agent', str(pid), bit32])
121 device.shell(['am', 'attach-agent', str(pid), bit64])
123 device.shell('kill -3 {}'.format(pid).split())
128 for l in device.shell(lc_cmd)[0].strip().split('\n'):
DREADME.md27 > `adb shell setenforce 0`
31 > `adb shell am start-activity --attach-agent '/data/local/tmp/libfieldnulls.so=Ljava/lang/Class…
/art/imgdiag/
Drun_imgdiag.py51 subprocess.run(cmd_collect, shell=True, check=True)
57 subprocess.run(cmd_pull, shell=True, check=True, capture_output=True)
104 shell=True,
124 args=f'adb shell "mkdir -p {args.device_out_dir}"', check=True, shell=True
126 subprocess.run(args=f'mkdir -p {args.host_out_dir}', check=True, shell=True)
/art/tools/jvmti-agents/dump-jvmti-state/
DREADME.md21 > `adb shell setenforce 0`
25 > `adb shell am start-activity --attach-agent /data/local/tmp/libdumpjvmti.so some.debuggable.ap…
27 > `adb shell kill -3 $(adb shell pidof some.debuggable.apps)`
/art/tools/jvmti-agents/titrace/
DREADME.md27 > `adb shell setprop dalvik.vm.dex2oat-flags --debuggable`
30 > `adb shell stop && adb shell start`
38 Upload to device first (it gets shell/root permissions).
40 > `adb shell run-as com.littleinc.orm_benchmark 'cp /data/local/tmp/libtitrace.so /data/data/com.li…
47 > `adb shell am start --attach-agent /data/data/com.littleinc.orm_benchmark/files/libtitrace.so com…
54 > `adb shell am attach-agent $(pid com.littleinc.orm_benchmark) /data/data/com.littleinc.orm_bench…
/art/libnativebridge/tests/
Druntests.sh59 echo_and_run adb shell rm -rf $test_dir
64 echo_and_run adb shell cd $test_dir '\;' LD_LIBRARY_PATH=. $test_rel_path $*
70 echo_and_run adb shell rm -rf $device_test_root
/art/libartbase/base/
Dsocket_peer_is_trusted.cc38 passwd* shell = getpwnam("shell"); in SocketPeerIsTrusted() local
39 if (cr.uid != 0 && cr.uid != shell->pw_uid) { in SocketPeerIsTrusted()
/art/tools/jvmti-agents/enable-vlog/
DREADME.md89 > `adb shell setenforce 0`
93 > `adb shell am start-activity --attach-agent /data/local/tmp/libenablevlog.so=class,jit some.de…
/art/tools/jvmti-agents/ti-fast/
DREADME.md105 > `adb shell setenforce 0`
109 > `adb shell am start-activity --attach-agent /data/local/tmp/libtifast.so=MonitorWait,ClassPrep…
/art/build/
DAndroid.common.mk42 GCOV_PREFIX_STRIP := $(shell echo $(ANDROID_BUILD_TOP) | grep -o / | wc -l)
/art/tools/jvmti-agents/simple-profile/
DREADME.md31 % adb shell setenforce 0
33 % adb shell

12