andoroid與linux.png
-
搜索類
find 目錄 -name 名字
grep命令 -r代表遞歸
grep -r "內(nèi)容"
grep -rE '內(nèi)容a|內(nèi)容b' 有內(nèi)容a或者內(nèi)容b的
grep -r 內(nèi)容a | grep 內(nèi)容b 既有a也要有b
將文件中XXX替換成YYY
sed -i 's/XXX/YYY/g' grep XXX . -rl
-
查看進(jìn)程類
ps 查看進(jìn)程
ps -t 進(jìn)程號(hào)或者grep 命令
-
Android源碼編譯
source build/envsetup.sh;
lunch
make -j8
-
Android干掉進(jìn)程類
普通進(jìn)程,activity manager就能干掉
adb shell am force-stop com.avatar.settings
adb shell ps | grep com.avatar.dialog
adb shell kill 3349
我們還可以直接用ps -t 加進(jìn)程號(hào) 查看該進(jìn)程的詳細(xì)情況及其開(kāi)的子線程個(gè)數(shù)
root@rk3288:/ # ps -t 3308
USER PID PPID VSIZE RSS WCHAN PC NAME
system 3308 168 957444 102596 ffffffff 4004e754 S com.avatar.dialog
system 3312 3308 957444 102596 c007ef6c 4004e920 S GC
system 3313 3308 957444 102596 c004622c 4004e188 S Signal Catcher
system 3314 3308 957444 102596 c0115d44 4004d6f0 S JDWP
system 3315 3308 957444 102596 c007ef6c 4004e920 S Compiler
system 3316 3308 957444 102596 c007ef6c 4004e920 S ReferenceQueueD
system 3317 3308 957444 102596 c007ef6c 4004e920 S FinalizerDaemon
system 3318 3308 957444 102596 c007ef6c 4004e920 S FinalizerWatchd
system 3319 3308 957444 102596 c05a7d64 4004d5a4 S Binder_1
system 3320 3308 957444 102596 c05a7d64 4004d5a4 S Binder_2
system 3321 3308 957444 102596 c0140070 4004e754 S Notify
system 3322 3308 957444 102596 c0140070 4004e754 S WifiManager
system 3324 3308 957444 102596 c007ef6c 4004e920 S m.avatar.dialog
system 3325 3308 957444 102596 c007ef6c 4004e920 S m.avatar.dialog
system 3326 3308 957444 102596 c007ef6c 4004e920 S m.avatar.dialog
system 3327 3308 957444 102596 c007ef6c 4004e920 S m.avatar.dialog
system 3328 3308 957444 102596 c007ef6c 4004e920 S m.avatar.dialog
system 3329 3308 957444 102596 c007ef6c 4004e920 S m.avatar.dialog
system 3336 3308 957444 102596 c007ef6c 4004e920 S AsyncTask #1
system 3337 3308 957444 102596 c007ef6c 4004e920 S AsyncTask #2
system 3339 3308 957444 102596 c007ef6c 4004e920 S CMEM Purge
system 3340 3308 957444 102596 bf011f64 4004d2e0 S mali-event-hnd
system 3341 3308 957444 102596 c007ef6c 4004e920 S mali-utility-wo
system 3342 3308 957444 102596 c007ef6c 4004e920 S mali-utility-wo
system 3343 3308 957444 102596 c007ef6c 4004e920 S mali-utility-wo
system 3344 3308 957444 102596 c007ef6c 4004e920 S mali-utility-wo
system 3345 3308 957444 102596 c007ef6c 4004e920 S mali-renderer
system 3346 3308 957444 102596 c007ef6c 4004e920 S AsyncTask #3
system 3347 3308 957444 102596 c05a7d64 4004d5a4 S Binder_3
system 3352 3308 957444 102596 c007ef6c 4004e920 S m.avatar.dialog
system 3355 3308 957444 102596 c007ef6c 4004e920 S m.avatar.dialog
system 3367 3308 957444 102596 c007ef6c 4004e920 S m.avatar.dialog
-
強(qiáng)啟應(yīng)用命令
adb shell am start -a android.intent.action.MAIN -n com.avatar.settings/.Settings
-
產(chǎn)生5000次monkey觸摸事件
adb shell monkey -v 5000
adb shell monkey -p com.avatar.settings -s 500 -v 10000
-
持續(xù)更新中...
謝謝大家閱讀矾策,如有幫助,來(lái)個(gè)喜歡或者關(guān)注吧践险!
本文作者:Anderson/Jerey_Jobs
簡(jiǎn)書(shū)地址 : Anderson大碼渣
CSDN地址 : Jerey_Jobs的專欄
github地址 : Jerey_Jobs