HomeSort by relevance Sort by last modified time
    Searched full:lsof (Results 1 - 25 of 36) sorted by null

1 2

  /system/extras/ANRdaemon/
ANRdaemon_get_trace.sh 26 adb $DEVICE shell "lsof -p $PID" | grep $TRACE_FILE > /dev/null
30 adb $DEVICE shell "lsof -p $PID" | grep "$TRACE_FILE" > /dev/null
  /external/autotest/contrib/
watch_expensive_rpcs.py 39 '"sudo lsof -i | grep -e %s | grep -e ESTABLISHED"' % proc_id,
57 lsof = subprocess.check_output('become chromeos-test@%s -- '
58 '"sudo lsof -i | grep -e :%s | grep -e ESTABLISHED"'
60 proc_id = lsof.split()[1]
  /system/core/shell_and_utilities/
README.md 35 iftop insmod ioctl ionice kill ln log ls lsmod lsof mkdir mount mv
47 iftop insmod ioctl ionice kill ln log ls lsmod lsof mkdir mount mv
60 load\_policy log ls lsmod lsof md5 mkdir mount mv nandread netstat notify
73 load\_policy log ls lsmod lsof md5 mkdir mkswap mount mv nandread netstat
86 lsmod lsof md5 mkdir mknod mkswap mount nandread netstat newfs\_msdos
97 toolbox: df getevent iftop ioctl ionice log ls lsof mount nandread
126 lsmod lsof lsusb md5sum mkdir mknod mkswap mktemp modinfo more mount
149 ls lsmod lsof lsusb md5sum microcom mkdir mknod mkswap mktemp modinfo
  /external/autotest/client/site_tests/security_NetworkListeners/
security_NetworkListeners.py 13 # Since we parse lsof output in several places, these centralize the
14 # column numbering for finding things in lsof output. For example:
60 80/443. So, this takes the output of lsof and returns a
63 @param lsof_lines: a list of lines as output by the 'lsof' util.
100 cmd = (r'lsof -n -i -sTCP:LISTEN | '
105 # Use the [1:] slice to discard line 0, the lsof output header.
  /prebuilts/go/darwin-x86/src/os/exec/
exec_test.go 298 open, lsof := numOpenFDS(t)
303 // proc filesystem (as used by lsof). It seems to only
309 t.Errorf("leaked %d fds; want ~0; have:\n%s\noriginally:\n%s", fdGrowth, lsof, lsof0)
315 func numOpenFDS(t *testing.T) (n int, lsof []byte) {
317 // Android's stock lsof does not obey the -p option,
322 lsof, err := exec.Command("lsof", "-b", "-n", "-p", strconv.Itoa(os.Getpid())).Output()
324 t.Skip("skipping test; error finding or running lsof")
326 return bytes.Count(lsof, []byte("\n")), lsof
    [all...]
  /prebuilts/go/linux-x86/src/os/exec/
exec_test.go 298 open, lsof := numOpenFDS(t)
303 // proc filesystem (as used by lsof). It seems to only
309 t.Errorf("leaked %d fds; want ~0; have:\n%s\noriginally:\n%s", fdGrowth, lsof, lsof0)
315 func numOpenFDS(t *testing.T) (n int, lsof []byte) {
317 // Android's stock lsof does not obey the -p option,
322 lsof, err := exec.Command("lsof", "-b", "-n", "-p", strconv.Itoa(os.Getpid())).Output()
324 t.Skip("skipping test; error finding or running lsof")
326 return bytes.Count(lsof, []byte("\n")), lsof
    [all...]
  /external/autotest/server/site_tests/audio_AudioRoutingUSB/
audio_AudioRoutingUSB.py 19 output = host.run('lsof -Fn +D /dev/snd', ignore_status=True).stdout
61 Parses the output of lsof command. Returns the pcm device opened.
  /external/dnsmasq/contrib/Suse/
README.susefirewall 23 test "$FW_SERVICE_DNS" = yes -o "$FW_SERVICE_DNS" = dmz -o "$FW_SERVICE_DNS" = ext -o "$START_NAMED" = yes && DNS_PORT=`$LSOF -i -n -P | \
26 test "$FW_SERVICE_SQUID" = yes -o "$FW_SERVICE_SQUID" = dmz -o "$FW_SERVICE_SQUID" = ext -o "$START_SQUID" = yes && SQUID_PORT=`$LSOF -i -n -P | \
  /external/toybox/toys/pending/
lsof.c 0 /* lsof.c - list open files.
5 USE_LSOF(NEWTOY(lsof, "lp*t", TOYFLAG_USR|TOYFLAG_BIN))
7 config LSOF
8 bool "lsof"
11 usage: lsof [-lt] [-p PID1,PID2,...] [NAME]...
448 // lsof will only filter on paths it can stat (because it filters by inode).
  /external/toybox/
Android.mk 146 toys/pending/lsof.c \
301 lsof \
  /prebuilts/sdk/tools/
jack-admin 606 echo "\$ lsof -i TCP:$SERVER_PORT_SERVICE -l" >>"$REPORT_INFO"
607 lsof -i TCP:$SERVER_PORT_SERVICE -l >>"$REPORT_INFO" 2>&1
611 echo "\$ lsof -i TCP:$SERVER_PORT_ADMIN -l" >>"$REPORT_INFO"
612 lsof -i TCP:$SERVER_PORT_ADMIN -l >>"$REPORT_INFO" 2>&1
jack-diagnose 128 PID_USING_PORT=$(lsof -F p -i TCP:$1 -sTCP:LISTEN | cut -c 2-)
  /system/core/init/
reboot.cpp 254 LOG(INFO) << "Run lsof";
255 const char* lsof_argv[] = {"/system/bin/lsof"};
  /external/autotest/server/cros/chaos_lib/
chaos_runner.py 141 results = client_utils.run('lsof -i:%s' % WEBDRIVER_PORT,
  /frameworks/base/core/java/android/os/
SharedMemory.java 75 * such as lsof or examining /proc/[pid]/maps
  /external/toybox/generated/
globals.h 703 // toys/pending/lsof.c
1474 struct lsof_data lsof; member in union:global_union
newtoys.h 134 USE_LSOF(NEWTOY(lsof, "lp*t", TOYFLAG_USR|TOYFLAG_BIN))
  /frameworks/base/services/core/java/com/android/server/
Watchdog.java 659 .command("/system/bin/lsof", "-p", String.valueOf(Process.myPid()))
666 Slog.w(TAG, "Unable to dump open descriptors, lsof return code: "
  /docs/source.android.com/ja/security/bulletin/
2016-07-01.html 141 <td>lsof ??????????</td>
925 <h3 id="elevation-of-privilege-vulnerability-in-lsof">
926 lsof ??????????</h3>
927 <p>lsof ????????????????????????????????????????????????????????????????????????????????????????????????????????</p>
    [all...]
  /docs/source.android.com/ko/security/bulletin/
2016-07-01.html 171 <td>lsof? ?? ?? ???</td>
1126 <h3 id="elevation-of-privilege-vulnerability-in-lsof">
1127 lsof? ?? ?? ???</h3>
1128 <p>lsof? ?? ?? ????? ??
    [all...]
  /docs/source.android.com/zh-cn/security/bulletin/
2016-07-01.html 138 <td>lsof ??????</td>
882 <h3 id="elevation-of-privilege-vulnerability-in-lsof">lsof ??????</h3>
883 <p>lsof ????????????????????????????????????????????????????????????????????</p>
    [all...]
  /docs/source.android.com/zh-tw/security/bulletin/
2016-07-01.html 139 <td>lsof ????????</td>
991 <h3 id="elevation-of-privilege-vulnerability-in-lsof">
992 lsof ????????</h3>
993 <p>lsof ???????????????????????????????????????????????????????????????????????????????????</p>
    [all...]
  /external/toolchain-utils/crosperf/perf_files/
perf.data.report.0     [all...]
  /external/toybox/www/
roadmap.html 334 chrt dd expr getfattr* lsof modprobe more setfattr* tar tr traceroute
    [all...]
  /docs/source.android.com/en/security/bulletin/
2016-07-01.html 733 <h3 id="elevation-of-privilege-vulnerability-in-lsof">
734 Elevation of privilege vulnerability in lsof</h3>
735 <p>An elevation of privilege vulnerability in lsof could enable a local malicious
    [all...]

Completed in 1697 milliseconds

1 2