/system/extras/ANRdaemon/ |
ANRdaemon_get_trace.sh | 26 adb $DEVICE shell "lsof -p $PID" | grep $TRACE_FILE > /dev/null 30 adb $DEVICE shell "lsof -p $PID" | grep "$TRACE_FILE" > /dev/null
|
/external/autotest/contrib/ |
watch_expensive_rpcs.py | 39 '"sudo lsof -i | grep -e %s | grep -e ESTABLISHED"' % proc_id, 57 lsof = subprocess.check_output('become chromeos-test@%s -- ' 58 '"sudo lsof -i | grep -e :%s | grep -e ESTABLISHED"' 60 proc_id = lsof.split()[1]
|
/system/core/shell_and_utilities/ |
README.md | 35 iftop insmod ioctl ionice kill ln log ls lsmod lsof mkdir mount mv 47 iftop insmod ioctl ionice kill ln log ls lsmod lsof mkdir mount mv 60 load\_policy log ls lsmod lsof md5 mkdir mount mv nandread netstat notify 73 load\_policy log ls lsmod lsof md5 mkdir mkswap mount mv nandread netstat 86 lsmod lsof md5 mkdir mknod mkswap mount nandread netstat newfs\_msdos 97 toolbox: df getevent iftop ioctl ionice log ls lsof mount nandread 126 lsmod lsof lsusb md5sum mkdir mknod mkswap mktemp modinfo more mount 149 ls lsmod lsof lsusb md5sum microcom mkdir mknod mkswap mktemp modinfo
|
/external/autotest/client/site_tests/security_NetworkListeners/ |
security_NetworkListeners.py | 13 # Since we parse lsof output in several places, these centralize the 14 # column numbering for finding things in lsof output. For example: 60 80/443. So, this takes the output of lsof and returns a 63 @param lsof_lines: a list of lines as output by the 'lsof' util. 100 cmd = (r'lsof -n -i -sTCP:LISTEN | ' 105 # Use the [1:] slice to discard line 0, the lsof output header.
|
/prebuilts/go/darwin-x86/src/os/exec/ |
exec_test.go | 298 open, lsof := numOpenFDS(t) 303 // proc filesystem (as used by lsof). It seems to only 309 t.Errorf("leaked %d fds; want ~0; have:\n%s\noriginally:\n%s", fdGrowth, lsof, lsof0) 315 func numOpenFDS(t *testing.T) (n int, lsof []byte) { 317 // Android's stock lsof does not obey the -p option, 322 lsof, err := exec.Command("lsof", "-b", "-n", "-p", strconv.Itoa(os.Getpid())).Output() 324 t.Skip("skipping test; error finding or running lsof") 326 return bytes.Count(lsof, []byte("\n")), lsof [all...] |
/prebuilts/go/linux-x86/src/os/exec/ |
exec_test.go | 298 open, lsof := numOpenFDS(t) 303 // proc filesystem (as used by lsof). It seems to only 309 t.Errorf("leaked %d fds; want ~0; have:\n%s\noriginally:\n%s", fdGrowth, lsof, lsof0) 315 func numOpenFDS(t *testing.T) (n int, lsof []byte) { 317 // Android's stock lsof does not obey the -p option, 322 lsof, err := exec.Command("lsof", "-b", "-n", "-p", strconv.Itoa(os.Getpid())).Output() 324 t.Skip("skipping test; error finding or running lsof") 326 return bytes.Count(lsof, []byte("\n")), lsof [all...] |
/external/autotest/server/site_tests/audio_AudioRoutingUSB/ |
audio_AudioRoutingUSB.py | 19 output = host.run('lsof -Fn +D /dev/snd', ignore_status=True).stdout 61 Parses the output of lsof command. Returns the pcm device opened.
|
/external/dnsmasq/contrib/Suse/ |
README.susefirewall | 23 test "$FW_SERVICE_DNS" = yes -o "$FW_SERVICE_DNS" = dmz -o "$FW_SERVICE_DNS" = ext -o "$START_NAMED" = yes && DNS_PORT=`$LSOF -i -n -P | \ 26 test "$FW_SERVICE_SQUID" = yes -o "$FW_SERVICE_SQUID" = dmz -o "$FW_SERVICE_SQUID" = ext -o "$START_SQUID" = yes && SQUID_PORT=`$LSOF -i -n -P | \
|
/external/toybox/toys/pending/ |
lsof.c | 0 /* lsof.c - list open files. 5 USE_LSOF(NEWTOY(lsof, "lp*t", TOYFLAG_USR|TOYFLAG_BIN)) 7 config LSOF 8 bool "lsof" 11 usage: lsof [-lt] [-p PID1,PID2,...] [NAME]... 448 // lsof will only filter on paths it can stat (because it filters by inode).
|
/external/toybox/ |
Android.mk | 146 toys/pending/lsof.c \ 301 lsof \
|
/prebuilts/sdk/tools/ |
jack-admin | 606 echo "\$ lsof -i TCP:$SERVER_PORT_SERVICE -l" >>"$REPORT_INFO" 607 lsof -i TCP:$SERVER_PORT_SERVICE -l >>"$REPORT_INFO" 2>&1 611 echo "\$ lsof -i TCP:$SERVER_PORT_ADMIN -l" >>"$REPORT_INFO" 612 lsof -i TCP:$SERVER_PORT_ADMIN -l >>"$REPORT_INFO" 2>&1
|
jack-diagnose | 128 PID_USING_PORT=$(lsof -F p -i TCP:$1 -sTCP:LISTEN | cut -c 2-)
|
/system/core/init/ |
reboot.cpp | 254 LOG(INFO) << "Run lsof"; 255 const char* lsof_argv[] = {"/system/bin/lsof"};
|
/external/autotest/server/cros/chaos_lib/ |
chaos_runner.py | 141 results = client_utils.run('lsof -i:%s' % WEBDRIVER_PORT,
|
/frameworks/base/core/java/android/os/ |
SharedMemory.java | 75 * such as lsof or examining /proc/[pid]/maps
|
/external/toybox/generated/ |
globals.h | 703 // toys/pending/lsof.c 1474 struct lsof_data lsof; member in union:global_union
|
newtoys.h | 134 USE_LSOF(NEWTOY(lsof, "lp*t", TOYFLAG_USR|TOYFLAG_BIN))
|
/frameworks/base/services/core/java/com/android/server/ |
Watchdog.java | 659 .command("/system/bin/lsof", "-p", String.valueOf(Process.myPid())) 666 Slog.w(TAG, "Unable to dump open descriptors, lsof return code: "
|
/docs/source.android.com/ja/security/bulletin/ |
2016-07-01.html | 141 <td>lsof ??????????</td> 925 <h3 id="elevation-of-privilege-vulnerability-in-lsof"> 926 lsof ??????????</h3> 927 <p>lsof ????????????????????????????????????????????????????????????????????????????????????????????????????????</p> [all...] |
/docs/source.android.com/ko/security/bulletin/ |
2016-07-01.html | 171 <td>lsof? ?? ?? ???</td> 1126 <h3 id="elevation-of-privilege-vulnerability-in-lsof"> 1127 lsof? ?? ?? ???</h3> 1128 <p>lsof? ?? ?? ????? ?? [all...] |
/docs/source.android.com/zh-cn/security/bulletin/ |
2016-07-01.html | 138 <td>lsof ??????</td> 882 <h3 id="elevation-of-privilege-vulnerability-in-lsof">lsof ??????</h3> 883 <p>lsof ????????????????????????????????????????????????????????????????????</p> [all...] |
/docs/source.android.com/zh-tw/security/bulletin/ |
2016-07-01.html | 139 <td>lsof ????????</td> 991 <h3 id="elevation-of-privilege-vulnerability-in-lsof"> 992 lsof ????????</h3> 993 <p>lsof ???????????????????????????????????????????????????????????????????????????????????</p> [all...] |
/external/toolchain-utils/crosperf/perf_files/ |
perf.data.report.0 | [all...] |
/external/toybox/www/ |
roadmap.html | 334 chrt dd expr getfattr* lsof modprobe more setfattr* tar tr traceroute [all...] |
/docs/source.android.com/en/security/bulletin/ |
2016-07-01.html | 733 <h3 id="elevation-of-privilege-vulnerability-in-lsof"> 734 Elevation of privilege vulnerability in lsof</h3> 735 <p>An elevation of privilege vulnerability in lsof could enable a local malicious [all...] |