/test/vts-testcase/kernel/checkpoint/ |
D | VtsKernelCheckpointTest.py | 35 extension = self.dut.adb.shell("getprop ro.boot." + prop, no_except = True) 41 contents = self.dut.adb.shell("cat " + filename + extension, no_except = True) 66 self.shell = self.dut.shell 87 self.dut.adb.shell("ls"); 94 result = self.dut.adb.shell("getprop sys.boot_completed") 105 result = self.dut.adb.shell("getprop ro.product.first_api_level") 124 self.dut.adb.shell("setprop persist.vold.dont_commit_checkpoint 1") 125 self.dut.adb.shell("echo " + self._ORIGINALVALUE + " > " + self._CHECKPOINTTESTFILE) 126 result = self.dut.adb.shell("vdc checkpoint startCheckpoint 1", no_except = True) 131 self.dut.adb.shell("echo " + self._MODIFIEDVALUE + " > " + self._CHECKPOINTTESTFILE) [all …]
|
/test/vts/utils/python/precondition/ |
D | precondition_utils.py | 29 shell=None, argument 43 if shell is None: 44 dut.shell.InvokeTerminal("check_hal_preconditions") 45 shell = dut.shell.check_hal_preconditions 65 cmd_results = shell.Execute("ps -A") 80 if not target_file_utils.Exists(path_prefix, shell): 91 shell, hal, bitness, run_as_compliance_test) 97 def CheckFeaturePrecondition(test_instance, dut, shell=None): argument 123 if shell is None: 124 dut.shell.InvokeTerminal("check_feature_precondition") [all …]
|
/test/vts-testcase/kernel/api/sysfs/ |
D | KernelApiSysfsTest.py | 35 self.shell = self.dut.shell 73 permission = target_file_utils.GetPermission(path, self.shell) 104 def tryReadFileContent(self, f, shell): argument 110 content = target_file_utils.ReadFileContent(f, self.shell) 120 contents = target_file_utils.ReadFileContent(state, self.shell).strip() 134 content = target_file_utils.ReadFileContent(filepath, self.shell) 146 present_cpus = target_file_utils.ReadFileContent(f, self.shell) 164 content = self.tryReadFileContent(f, self.shell) 170 content = self.tryReadFileContent(f, self.shell) 176 content = self.tryReadFileContent(f, self.shell) [all …]
|
/test/mlts/benchmark/ |
D | build_and_run_benchmark.sh | 150 BUILD_DESCRIPTION=`adb shell getprop ro.build.description` 160 BUILD_VERSION_RELEASE=`adb shell getprop ro.build.version.release` 169 …while ! adb shell "am start -W $TEST_EXTENRAL_STORAGE && rm /sdcard/mlts_write_external_storage" >… 178 adb shell "pm grant com.android.nn.benchmark.app android.permission.WRITE_EXTERNAL_STORAGE" 180 if ! adb shell test -f /data/local.prop; then 181 adb shell 'echo ro.setupwizard.mode=DISABLED > /data/local.prop' 182 adb shell 'chmod 644 /data/local.prop' 183 adb shell 'settings put global device_provisioned 1*' 184 adb shell 'settings put secure user_setup_complete 1' 194 adb shell 'echo testing > /data/local/enable_menu_key' [all …]
|
/test/vts/utils/python/file/ |
D | target_file_utils.py | 26 def _Test(shell, *args): argument 37 results = shell.Execute(cmd) 41 def Exists(filepath, shell): argument 51 return _Test(shell, "-e", filepath) 54 def IsDirectory(path, shell): argument 64 return _Test(shell, "-d", path) 67 def FindFiles(shell, path, name_pattern, options=None): argument 87 results = shell.Execute(cmd) 98 def ReadFileContent(filepath, shell): argument 112 results = shell.Execute(cmd) [all …]
|
/test/vts/script/ |
D | start-agent.sh | 2 adb shell chmod 755 /data/local/tmp/32/vts_shell_driver32 3 adb shell chmod 755 /data/local/tmp/64/vts_shell_driver64 4 adb shell killall vts_hal_driver32 > /dev/null 2&>1 5 adb shell killall vts_hal_driver64 > /dev/null 2&>1 6 adb shell killall vts_shell_driver32 > /dev/null 2&>1 7 adb shell killall vts_shell_driver64 > /dev/null 2&>1 8 adb shell rm -f /data/local/tmp/vts_driver_* 9 adb shell rm -f /data/local/tmp/vts_agent_callback* 10 adb shell LD_LIBRARY_PATH=/data/local/tmp/64 \
|
D | run_cts_with_profiling.sh | 43 adb -s $serial_no shell setenforce 0 44 adb -s $serial_no shell chmod 777 -R data/local/tmp 66 adb -s $serial_no shell rm /data/local/tmp/*.vts.trace 67 …adb -s $serial_no shell ./data/local/tmp/vts_profiling_configure enable /vendor/lib/ /vendor/lib64/ 73 adb -s $serial_no shell setenforce 0 74 adb -s $serial_no shell ls /data/local/tmp/*.vts.trace > temp
|
/test/vts/testcases/host/shell/ |
D | SampleShellTest.py | 37 self.dut.shell.InvokeTerminal("my_shell1") 38 results = self.dut.shell.Execute("which ls") 46 self.dut.shell.InvokeTerminal("my_shell2") 47 results = self.dut.shell.my_shell2.Execute(["which ls"] * 58 self.dut.shell.InvokeTerminal("my_shell3") 60 results = self.dut.shell.my_shell3.Execute("which ls") 71 self.dut.shell.InvokeTerminal("command_sequence_cd") 76 results = self.dut.shell.command_sequence_cd.Execute(cmd) 84 self.dut.shell.InvokeTerminal("command_sequence_export") 86 results = self.dut.shell.command_sequence_export.Execute( [all …]
|
/test/vts/runners/host/ |
D | utils.py | 337 cmd, stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True) 451 shell=True, 458 shell=True, 614 ad.adb.shell("settings put global airplane_mode_on {}".format( 632 ad.adb.shell("dumpsys battery unplug") 633 ad.adb.shell("dumpsys deviceidle enable") 634 if (ad.adb.shell("dumpsys deviceidle force-idle") != 639 adb_shell_result = ad.adb.shell("dumpsys deviceidle step") 645 ad.adb.shell("dumpsys battery").decode('utf-8'), 646 ad.adb.shell("dumpsys deviceidle").decode('utf-8'))) [all …]
|
/test/vts-testcase/kernel/ltp/shell_environment/ |
D | shell_environment.py | 36 def __init__(self, shell): argument 37 self.shell = shell 51 def shell(self): member in ShellEnvironment 55 @shell.setter 56 def shell(self, shell): member in ShellEnvironment 57 self._shell = shell 76 results = self.shell.Execute('cat %s' %
|
/test/vts-testcase/kernel/api/proc/ |
D | VtsKernelProcFileApiTest.py | 134 self.shell = self.dut.shell 146 asserts.skipIf(not target_file_utils.Exists(filepath, self.shell) and 147 test_object.file_optional(shell=self.shell, dut=self.dut), 150 self.shell, filepath, test_object.get_permission_checker()) 155 test_object.prepare_test(self.shell, self.dut), "Setup failed!") 185 results = self.shell.Execute(cmd) 197 self.dut.adb.shell("which incident_helper") 203 result = self.shell.Execute("cat %s | incident_helper -s 2001" % filepath) 213 self.dut.adb.shell("echo u > %s" % filepath) 216 self.dut.adb.shell("echo b > %s" % filepath) [all …]
|
/test/vts-testcase/kernel/ltp/ |
D | environment_requirement_checker.py | 56 def __init__(self, shell): argument 57 self.shell = shell 60 self._shell_env = shell_environment.ShellEnvironment(self.shell) 64 def shell(self): member in EnvironmentRequirementChecker 68 @shell.setter 69 def shell(self, shell): member in EnvironmentRequirementChecker 71 self._shell = shell 152 permission_result = self.shell.Execute(permission_command) 183 self.shell.Execute(bin_path_exist_commands)[const.EXIT_CODE]) 187 self.shell.Execute(bin_path_exist_commands)[const.EXIT_CODE])
|
D | KernelLtpTest.py | 97 self.shell = self._dut.shell 98 self.shell.SetConnTimeout(TIMEOUT_TCP_IN_SECS) 101 self.shell) 102 self._shell_env = shell_environment.ShellEnvironment(self.shell) 119 def shell(self): member in KernelLtpTest 123 @shell.setter 124 def shell(self, shell): argument 126 self._shell = shell 167 self.shell.Execute("mkdir %s -p" % ltp_configs.LTPDIR) 168 self.shell.Execute("restorecon -F -R %s" % ltp_configs.LTPDIR) [all …]
|
/test/vts/testcases/codelab/hidl_handle_test/ |
D | VtsCodelabHidlHandleTest.py | 74 self.dut.shell.Execute(self.START_COMMAND) 80 result = self.dut.shell.Execute(self.CHECK_COMMAND) 106 permission_result = self.dut.shell.Execute("getenforce") 109 self.dut.shell.Execute("setenforce permissive") 113 if not target_file_utils.Exists(self.TEST_DIR_PATH, self.dut.shell): 115 self.dut.shell.Execute("mkdir " + self.TEST_DIR_PATH) 118 self.dut.shell): 168 self.dut.shell.Execute("rm -rf " + self.TEST_DIR_PATH) 172 self.dut.shell.Execute("setenforce enforcing") 190 self.dut.shell):
|
/test/vts-testcase/performance/audio_loopback_test/ |
D | AudioLoopbackTest.py | 45 self.dut.adb.shell("mkdir -p %s" % self.FULL_DATA_DIR_PATH) 47 self.dut.adb.shell("pm install -r -g /data/local/tmp/Loopback.apk") 50 self.dut.adb.shell("rm -rf %s" % self.FULL_DATA_DIR_PATH) 98 self.dut.shell.Execute( 100 self.dut.shell.Execute([ 106 results = self.dut.shell.Execute( 111 results = self.dut.shell.Execute( 114 results = self.dut.shell.Execute(
|
/test/framework/harnesses/host_controller/command_processor/ |
D | command_dut_test.py | 42 self.assertEqual(mock_adb_proxy.shell.mock_calls, [ 52 self.assertEqual(mock_adb_proxy.shell.mock_calls, [ 58 mock_adb_proxy.shell.mock_calls = [] 60 self.assertEqual(mock_adb_proxy.shell.mock_calls, [ 89 mock_adb_proxy.shell.assert_called_with("svc wifi enable") 104 mock_adb_proxy.shell.assert_any_call("svc wifi enable") 107 mock_adb_proxy.shell.assert_called_with( 122 mock_adb_proxy.shell.assert_any_call("svc wifi disable") 136 self.assertEqual(mock_adb_proxy.shell.mock_calls, 153 self.assertEqual(mock_adb_proxy.shell.mock_calls,
|
D | command_dut.py | 102 adb_proxy.shell("svc wifi enable") 106 adb_proxy.shell( 112 adb_proxy.shell("svc wifi disable") 115 adb_proxy.shell("input keyevent 25") 119 adb_proxy.shell("input keyevent 24") 141 adb_proxy.shell(adb_volume_command)
|
/test/vts-testcase/kernel/api/net/ |
D | VtsKernelNetTest.py | 48 self.shell = self.dut.adb.shell 59 self.shell('rm -rf %s' % path_utils.TargetDirName(self.target_bin_path)) 64 self.shell('mkdir -p %s' % path_utils.TargetDirName(self.target_bin_path)) 66 self.shell('chmod 777 %s' % self.target_bin_path) 69 result = self.shell(self.target_bin_path, no_except=True)
|
/test/vts/testcases/template/hal_hidl_host_test/ |
D | hal_hidl_host_test.py | 40 self.shell = self.dut.shell 53 self, self.dut, self.shell, self.run_as_compliance_test): 66 self.profiling.EnableVTSProfiling(self.shell) 90 self.profiling.EnableVTSProfiling(self.shell) 97 self.profiling.DisableVTSProfiling(self.shell) 147 self.shell, service, self.abi_bitness,
|
/test/vts/testcases/host/verify_dtbo/ |
D | VtsFirmwareDtboVerification.py | 66 self.shell = self.dut.shell 72 self.shell.Execute("mkdir %s -p" % self.device_path) 122 self.shell, BLOCK_DEV_PATH, current_dtbo_partition, "-type l") 146 overlay_idx_string = self.adb.shell( 161 self.shell.Execute("cp %s %s" % (FDT_PATH, final_dt_path)) 165 results = self.shell.Execute(chmod_cmd) 172 results = self.shell.Execute(cmd) 179 self.shell.Execute("rm -rf %s" % self.device_path)
|
/test/vts/testcases/host/shell_binary_crash_test/ |
D | ShellBinaryCrashTest.py | 39 self.dut.shell.InvokeTerminal("my_shell1") 41 results = self.dut.shell.my_shell1.Execute( 54 self.dut.shell.InvokeTerminal("my_shell1") 56 results = self.dut.shell.my_shell1.Execute( 75 self.dut.shell.InvokeTerminal(shell_name) 76 results = getattr(self.dut.shell, shell_name).Execute("which ls")
|
/test/vts/utils/python/profiling/ |
D | profiling_utils.py | 158 results = dut.shell.Execute("ls " + target_trace_file) 183 def EnableVTSProfiling(self, shell, hal_instrumentation_lib_path=None): argument 204 shell.Execute( 209 shell.Execute("chmod 777 " + TARGET_PROFILING_TRACE_PATH) 211 shell.Execute("setprop hal.instrumentation.lib.path.32 " + 213 shell.Execute("setprop hal.instrumentation.lib.path.64 " + 217 shell.Execute("setprop hal.instrumentation.profile.args true") 219 shell.Execute("setprop hal.instrumentation.profile.args false") 220 shell.Execute("setprop hal.instrumentation.enable true") 222 def DisableVTSProfiling(self, shell): argument [all …]
|
/test/vts-testcase/kernel/memory/ |
D | MemorySystemStressTest.py | 38 self.shell = self.dut.shell 40 self.shell.Execute(' '.join(cmd)) 44 meminfo_results = self.shell.Execute("cat /proc/meminfo") 57 results = self.shell.Execute(' '.join(cmd))
|
/test/vts-testcase/kernel/api/selinux/ |
D | VtsKernelSelinuxFileApiTest.py | 42 self.shell = self.dut.shell 53 target_file_utils.Exists(test_object.get_path(), self.shell), 59 test_object.get_path(), self.shell) 69 test_object.get_path(), self.shell)
|
/test/vts/testcases/vts_selftest/manual_tests/shell_performance/ |
D | VtsSelfTestShellPerformance.py | 36 self.shell = self.dut.shell 46 self.shell.Execute(cmd) 56 self.dut.adb.shell(cmd) 65 self.shell.Execute([cmd] * n)
|