Searched refs:shell (Results 1 – 14 of 14) sorted by relevance
91 adb shell stop92 adb shell setprop libc.debug.hooks.enable 193 adb shell start97 adb shell101 Any process spawned from this shell will run with malloc hooks enabled.107 adb shell setprop wrap.<APP> '"LIBC_HOOKS_ENABLE=1"'111 … adb shell setprop wrap.com.google.android.googlequicksearchbox '"LIBC_HOOKS_ENABLE=1 logwrapper"'112 adb shell am force-stop com.google.android.googlequicksearchbox
97 adb shell /data/nativetest64/bionic-unit-tests/bionic-unit-tests --gtest_filter="malloc*"98 adb shell /data/nativetest/bionic-unit-tests/bionic-unit-tests --gtest_filter="malloc*"109 adb shell /data/nativetest64/memunreachable_binder_test/memunreachable_binder_test110 adb shell /data/nativetest/memunreachable_binder_test/memunreachable_binder_test111 adb shell /data/nativetest64/memunreachable_test/memunreachable_test112 adb shell /data/nativetest/memunreachable_test/memunreachable_test113 adb shell /data/nativetest64/memunreachable_unit_test/memunreachable_unit_test114 adb shell /data/nativetest/memunreachable_unit_test/memunreachable_unit_test180 …adb shell /data/benchmarktest64/bionic-benchmarks/bionic-benchmarks --benchmark_filter=stdlib_mall…181 …adb shell /data/benchmarktest/bionic-benchmarks/bionic-benchmarks --benchmark_filter=malloc_free_d…[all …]
117 NOTE: It is assumed that these commands are executed in adb as the shell user119 machine, you might need to escape the special shell characters such as **$**.
123 adb shell rm -rf $target_dir125 | gzip -1 -c | adb shell 'cd /data/local/tmp && tar xz')126 env_setup+=( adb shell LD_LIBRARY_PATH=$target_dir )
16 using the setprop command from the shell. This requires the ability to120 adb shell stop121 adb shell setprop libc.debug.malloc 1122 adb shell start126 adb shell setprop libc.debug.malloc.program ls127 adb shell setprop libc.debug.malloc 10128 adb shell ls /data/local/tmp
586 adb shell stop587 adb shell setprop libc.debug.malloc.options backtrace588 adb shell start592 adb shell setprop libc.debug.malloc.options backtrace593 adb shell setprop libc.debug.malloc.program ls594 adb shell ls598 adb shell stop599 adb shell setprop libc.debug.malloc.program app_process600 adb shell setprop libc.debug.malloc.options backtrace601 adb shell start[all …]
40 const char* dir, const char* shell) { in FindAndCheckPasswdEntry() argument51 EXPECT_STREQ(shell, name_passwd.pw_shell); in FindAndCheckPasswdEntry()63 EXPECT_STREQ(shell, id_passwd.pw_shell); in FindAndCheckPasswdEntry()
539 // adb shell /data/nativetest/bionic-unit-tests/bionic-unit-tests540 // adb shell /data/nativetest64/bionic-unit-tests/bionic-unit-tests815 // adb shell /data/nativetest/bionic-unit-tests-static/bionic-unit-tests-static816 // adb shell /data/nativetest64/bionic-unit-tests-static/bionic-unit-tests-static
111 const char* shell() const { in shell() function116 if (name() == nullptr || dir() == nullptr || shell() == nullptr) { in ToPasswdState()145 CopyFieldToString(passwd_state->sh_buffer_, shell(), sizeof(passwd_state->sh_buffer_)); in ToPasswdState()
78 // adb shell /data/benchmarktest/bionic-benchmarks/bionic-benchmarks79 // adb shell /data/benchmarktest64/bionic-benchmarks/bionic-benchmarks
16 $ adb shell /data/benchmarktest/bionic-benchmarks/bionic-benchmarks17 $ adb shell /data/benchmarktest64/bionic-benchmarks/bionic-benchmarks91 adb shell /data/benchmarktest/bionic-spawn-benchmarks/bionic-spawn-benchmarks92 adb shell /data/benchmarktest64/bionic-spawn-benchmarks/bionic-spawn-benchmarks
217 $ adb shell /data/nativetest/bionic-unit-tests/bionic-unit-tests218 $ adb shell \221 $ adb shell /data/nativetest64/bionic-unit-tests/bionic-unit-tests222 $ adb shell \288 $ adb shell \
407 adb shell setprop debug.ld.app.com.example.myapp dlerror,dlopen,dlsym424 adb shell setprop debug.ld.all dlerror,dlopen
30 Contains various Python and shell scripts used to get and re-generate