Searched refs:shell (Results 1 – 25 of 36) sorted by relevance
12
/art/tools/ |
D | buildbot-setup-device.sh | 70 adb shell date 77 device_seconds_since_epoch=$(adb shell date -u +%s | tr -c -d '[:digit:]') 90 adb shell setprop ctl.stop llkd-0 91 adb shell setprop ctl.stop llkd-1 93 product_name=$(adb shell getprop ro.build.product) 99 adb shell pkill -9 -U logd logd && msginfo "...logd killed" 105 adb shell date -u @$host_seconds_since_epoch 109 adb shell setenforce 0 110 $verbose && adb shell getenforce 113 adb shell ifconfig lo up [all …]
|
D | buildbot-teardown-device.sh | 32 if adb shell test -d "$ART_TEST_CHROOT"; then 36 adb shell lsof | grep "$ART_TEST_CHROOT" 46 adb shell ls -ld "/proc/*/root" \ 51 local cmdline=$(adb shell cat "$dir"/cmdline | tr '\000' ' ') 83 adb shell test -d "$dir" \ 84 && adb shell mount | grep -q " on $dir type $fstype " \ 85 && if adb shell umount "$dir"; then 86 $remove_dir && adb shell rmdir "$dir" 89 adb shell lsof | grep "$dir" 94 adb shell rm -f "$ART_TEST_CHROOT/bin" [all …]
|
D | buildbot-cleanup-device.sh | 47 if adb shell test -d "$ART_TEST_CHROOT"; then 49 adb shell rm -rf "$ART_TEST_CHROOT/linkerconfig" 52 adb shell rm -rf "$ART_TEST_CHROOT/system" 55 adb shell rm -rf "$ART_TEST_CHROOT/data" 58 adb shell rmdir "$ART_TEST_CHROOT" || adb shell ls -la "$ART_TEST_CHROOT" 61 adb shell rm -rf \
|
D | boot-image-profile-configure-device.sh | 55 adb shell stop 56 adb shell setprop dalvik.vm.profilebootclasspath true 57 adb shell setprop dalvik.vm.profilesystemserver true 58 adb shell find "/data/misc/profiles -name *.prof -exec truncate -s 0 {} \;" 59 adb shell start
|
D | add_package_property.sh | 27 adb shell chmod o+x /data/data/$PACKAGE_NAME/$PROPERTY_SCRIPT_NAME 28 adb shell restorecon /data/data/$PACKAGE_NAME/$PROPERTY_SCRIPT_NAME 29 adb shell setprop wrap.$PACKAGE_NAME /data/data/$PACKAGE_NAME/$PROPERTY_SCRIPT_NAME
|
D | buildbot-sync.sh | 53 adb shell mkdir -p "$ART_TEST_CHROOT/$dir" 73 adb shell mkdir -p "$ART_TEST_CHROOT/system/framework" 82 adb shell mkdir -p "$ART_TEST_CHROOT/apex" 118 adb shell rm -rf "$ART_TEST_CHROOT/apex/${dst_apex}" 145 adb shell mkdir -p "$ART_TEST_CHROOT$output_dir" 153 adb shell chroot "$ART_TEST_CHROOT" \
|
D | run-gtests.sh | 66 "$adb" shell chroot "$ART_TEST_CHROOT" $@ 80 dex2oatbootclasspath=$("$adb" shell echo \$DEX2OATBOOTCLASSPATH) 86 bootclasspath=$("$adb" shell echo \$BOOTCLASSPATH)
|
D | wrap-logcat.py | 49 shell=False, 55 shell=False) as run_test_proc:
|
D | boot-image-profile-extract-profile.sh | 31 adb shell cmd package snapshot-profile android
|
D | symbolize.sh | 51 adb shell $@ | sed 's/\r$//'
|
D | generate_cmake_lists.py | 72 …subprocess.check_output('build/soong/soong_ui.bash --make-mode', shell=True, cwd=ANDROID_BUILD_TOP)
|
/art/tools/jvmti-agents/field-counts/ |
D | count-fields.py | 76 device.shell("setenforce 0".split()) 79 lib32 = device.shell("mktemp".split())[0].strip() 80 lib64 = device.shell("mktemp".split())[0].strip() 102 device.shell("logcat -c".split()) 109 device.shell('rm {}'.format(lib32).split()) 110 device.shell('rm {}'.format(lib64).split()) 120 name = device.shell('cat /proc/{}/cmdline'.format(pid).split())[0].strip('\0') 123 target32 = device.shell('mktemp -p {}'.format(targetdir).split())[0].strip() 125 target64 = device.shell('mktemp -p {}'.format(targetdir).split())[0].strip() 128 device.shell('cp {} {}'.format(bit32, target32).split()) [all …]
|
D | README.md | 23 ```shell 30 ```shell 31 adb shell setenforce 0 35 adb shell am start-activity --attach-agent '/data/local/tmp/libfieldcounts.so=Ljava/lang/Class;.ext…
|
/art/tools/jvmti-agents/simple-force-redefine/ |
D | README.md | 16 > `adb shell setenforce 0` 24 > `adb shell am attach-agent $(adb shell pidof some.deubggable.app) /data/local/tmp/libforcerede… 28 > `adb shell am attach-agent $(adb shell pidof some.deubggable.app) /data/local/tmp/libforcerede… 29 > `adb shell am attach-agent $(adb shell pidof some.deubggable.app) /data/local/tmp/libforcerede… 30 > `adb shell am attach-agent $(adb shell pidof some.deubggable.app) /data/local/tmp/libforcerede…
|
/art/tools/jvmti-agents/field-null-percent/ |
D | check-null-fields.py | 75 device.shell("setenforce 0".split()) 78 lib32 = device.shell("mktemp".split())[0].strip() 79 lib64 = device.shell("mktemp".split())[0].strip() 102 device.shell("logcat -c".split()) 109 device.shell('rm {}'.format(lib32).split()) 110 device.shell('rm {}'.format(lib64).split()) 120 device.shell(['am', 'attach-agent', str(pid), bit32]) 121 device.shell(['am', 'attach-agent', str(pid), bit64]) 123 device.shell('kill -3 {}'.format(pid).split()) 128 for l in device.shell(lc_cmd)[0].strip().split('\n'):
|
D | README.md | 27 > `adb shell setenforce 0` 31 > `adb shell am start-activity --attach-agent '/data/local/tmp/libfieldnulls.so=Ljava/lang/Class…
|
/art/imgdiag/ |
D | run_imgdiag.py | 51 subprocess.run(cmd_collect, shell=True, check=True) 57 subprocess.run(cmd_pull, shell=True, check=True, capture_output=True) 104 shell=True, 124 args=f'adb shell "mkdir -p {args.device_out_dir}"', check=True, shell=True 126 subprocess.run(args=f'mkdir -p {args.host_out_dir}', check=True, shell=True)
|
/art/tools/jvmti-agents/dump-jvmti-state/ |
D | README.md | 21 > `adb shell setenforce 0` 25 > `adb shell am start-activity --attach-agent /data/local/tmp/libdumpjvmti.so some.debuggable.ap… 27 > `adb shell kill -3 $(adb shell pidof some.debuggable.apps)`
|
/art/tools/jvmti-agents/titrace/ |
D | README.md | 27 > `adb shell setprop dalvik.vm.dex2oat-flags --debuggable` 30 > `adb shell stop && adb shell start` 38 Upload to device first (it gets shell/root permissions). 40 > `adb shell run-as com.littleinc.orm_benchmark 'cp /data/local/tmp/libtitrace.so /data/data/com.li… 47 > `adb shell am start --attach-agent /data/data/com.littleinc.orm_benchmark/files/libtitrace.so com… 54 > `adb shell am attach-agent $(pid com.littleinc.orm_benchmark) /data/data/com.littleinc.orm_bench…
|
/art/libnativebridge/tests/ |
D | runtests.sh | 59 echo_and_run adb shell rm -rf $test_dir 64 echo_and_run adb shell cd $test_dir '\;' LD_LIBRARY_PATH=. $test_rel_path $* 70 echo_and_run adb shell rm -rf $device_test_root
|
/art/libartbase/base/ |
D | socket_peer_is_trusted.cc | 38 passwd* shell = getpwnam("shell"); in SocketPeerIsTrusted() local 39 if (cr.uid != 0 && cr.uid != shell->pw_uid) { in SocketPeerIsTrusted()
|
/art/tools/jvmti-agents/enable-vlog/ |
D | README.md | 89 > `adb shell setenforce 0` 93 > `adb shell am start-activity --attach-agent /data/local/tmp/libenablevlog.so=class,jit some.de…
|
/art/tools/jvmti-agents/ti-fast/ |
D | README.md | 105 > `adb shell setenforce 0` 109 > `adb shell am start-activity --attach-agent /data/local/tmp/libtifast.so=MonitorWait,ClassPrep…
|
/art/build/ |
D | Android.common.mk | 42 GCOV_PREFIX_STRIP := $(shell echo $(ANDROID_BUILD_TOP) | grep -o / | wc -l)
|
/art/tools/jvmti-agents/simple-profile/ |
D | README.md | 31 % adb shell setenforce 0 33 % adb shell
|
12