Home
last modified time | relevance | path

Searched refs:shell (Results 1 – 25 of 110) sorted by relevance

12345

/test/vts-testcase/kernel/checkpoint/
DVtsKernelCheckpointTest.py35 extension = self.dut.adb.shell("getprop ro.boot." + prop, no_except = True)
41 contents = self.dut.adb.shell("cat " + filename + extension, no_except = True)
66 self.shell = self.dut.shell
87 self.dut.adb.shell("ls");
94 result = self.dut.adb.shell("getprop sys.boot_completed")
105 result = self.dut.adb.shell("getprop ro.product.first_api_level")
124 self.dut.adb.shell("setprop persist.vold.dont_commit_checkpoint 1")
125 self.dut.adb.shell("echo " + self._ORIGINALVALUE + " > " + self._CHECKPOINTTESTFILE)
126 result = self.dut.adb.shell("vdc checkpoint startCheckpoint 1", no_except = True)
131 self.dut.adb.shell("echo " + self._MODIFIEDVALUE + " > " + self._CHECKPOINTTESTFILE)
[all …]
/test/vts/utils/python/precondition/
Dprecondition_utils.py29 shell=None, argument
43 if shell is None:
44 dut.shell.InvokeTerminal("check_hal_preconditions")
45 shell = dut.shell.check_hal_preconditions
65 cmd_results = shell.Execute("ps -A")
80 if not target_file_utils.Exists(path_prefix, shell):
91 shell, hal, bitness, run_as_compliance_test)
97 def CheckFeaturePrecondition(test_instance, dut, shell=None): argument
123 if shell is None:
124 dut.shell.InvokeTerminal("check_feature_precondition")
[all …]
/test/vts-testcase/kernel/api/sysfs/
DKernelApiSysfsTest.py35 self.shell = self.dut.shell
73 permission = target_file_utils.GetPermission(path, self.shell)
104 def tryReadFileContent(self, f, shell): argument
110 content = target_file_utils.ReadFileContent(f, self.shell)
120 contents = target_file_utils.ReadFileContent(state, self.shell).strip()
134 content = target_file_utils.ReadFileContent(filepath, self.shell)
146 present_cpus = target_file_utils.ReadFileContent(f, self.shell)
164 content = self.tryReadFileContent(f, self.shell)
170 content = self.tryReadFileContent(f, self.shell)
176 content = self.tryReadFileContent(f, self.shell)
[all …]
/test/mlts/benchmark/
Dbuild_and_run_benchmark.sh150 BUILD_DESCRIPTION=`adb shell getprop ro.build.description`
160 BUILD_VERSION_RELEASE=`adb shell getprop ro.build.version.release`
169 …while ! adb shell "am start -W $TEST_EXTENRAL_STORAGE && rm /sdcard/mlts_write_external_storage" >…
178 adb shell "pm grant com.android.nn.benchmark.app android.permission.WRITE_EXTERNAL_STORAGE"
180 if ! adb shell test -f /data/local.prop; then
181 adb shell 'echo ro.setupwizard.mode=DISABLED > /data/local.prop'
182 adb shell 'chmod 644 /data/local.prop'
183 adb shell 'settings put global device_provisioned 1*'
184 adb shell 'settings put secure user_setup_complete 1'
194 adb shell 'echo testing > /data/local/enable_menu_key'
[all …]
/test/vts/utils/python/file/
Dtarget_file_utils.py26 def _Test(shell, *args): argument
37 results = shell.Execute(cmd)
41 def Exists(filepath, shell): argument
51 return _Test(shell, "-e", filepath)
54 def IsDirectory(path, shell): argument
64 return _Test(shell, "-d", path)
67 def FindFiles(shell, path, name_pattern, options=None): argument
87 results = shell.Execute(cmd)
98 def ReadFileContent(filepath, shell): argument
112 results = shell.Execute(cmd)
[all …]
/test/vts/script/
Dstart-agent.sh2 adb shell chmod 755 /data/local/tmp/32/vts_shell_driver32
3 adb shell chmod 755 /data/local/tmp/64/vts_shell_driver64
4 adb shell killall vts_hal_driver32 > /dev/null 2&>1
5 adb shell killall vts_hal_driver64 > /dev/null 2&>1
6 adb shell killall vts_shell_driver32 > /dev/null 2&>1
7 adb shell killall vts_shell_driver64 > /dev/null 2&>1
8 adb shell rm -f /data/local/tmp/vts_driver_*
9 adb shell rm -f /data/local/tmp/vts_agent_callback*
10 adb shell LD_LIBRARY_PATH=/data/local/tmp/64 \
Drun_cts_with_profiling.sh43 adb -s $serial_no shell setenforce 0
44 adb -s $serial_no shell chmod 777 -R data/local/tmp
66 adb -s $serial_no shell rm /data/local/tmp/*.vts.trace
67 …adb -s $serial_no shell ./data/local/tmp/vts_profiling_configure enable /vendor/lib/ /vendor/lib64/
73 adb -s $serial_no shell setenforce 0
74 adb -s $serial_no shell ls /data/local/tmp/*.vts.trace > temp
/test/vts/testcases/host/shell/
DSampleShellTest.py37 self.dut.shell.InvokeTerminal("my_shell1")
38 results = self.dut.shell.Execute("which ls")
46 self.dut.shell.InvokeTerminal("my_shell2")
47 results = self.dut.shell.my_shell2.Execute(["which ls"] *
58 self.dut.shell.InvokeTerminal("my_shell3")
60 results = self.dut.shell.my_shell3.Execute("which ls")
71 self.dut.shell.InvokeTerminal("command_sequence_cd")
76 results = self.dut.shell.command_sequence_cd.Execute(cmd)
84 self.dut.shell.InvokeTerminal("command_sequence_export")
86 results = self.dut.shell.command_sequence_export.Execute(
[all …]
/test/vts/runners/host/
Dutils.py337 cmd, stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True)
451 shell=True,
458 shell=True,
614 ad.adb.shell("settings put global airplane_mode_on {}".format(
632 ad.adb.shell("dumpsys battery unplug")
633 ad.adb.shell("dumpsys deviceidle enable")
634 if (ad.adb.shell("dumpsys deviceidle force-idle") !=
639 adb_shell_result = ad.adb.shell("dumpsys deviceidle step")
645 ad.adb.shell("dumpsys battery").decode('utf-8'),
646 ad.adb.shell("dumpsys deviceidle").decode('utf-8')))
[all …]
/test/vts-testcase/kernel/ltp/shell_environment/
Dshell_environment.py36 def __init__(self, shell): argument
37 self.shell = shell
51 def shell(self): member in ShellEnvironment
55 @shell.setter
56 def shell(self, shell): member in ShellEnvironment
57 self._shell = shell
76 results = self.shell.Execute('cat %s' %
/test/vts-testcase/kernel/api/proc/
DVtsKernelProcFileApiTest.py134 self.shell = self.dut.shell
146 asserts.skipIf(not target_file_utils.Exists(filepath, self.shell) and
147 test_object.file_optional(shell=self.shell, dut=self.dut),
150 self.shell, filepath, test_object.get_permission_checker())
155 test_object.prepare_test(self.shell, self.dut), "Setup failed!")
185 results = self.shell.Execute(cmd)
197 self.dut.adb.shell("which incident_helper")
203 result = self.shell.Execute("cat %s | incident_helper -s 2001" % filepath)
213 self.dut.adb.shell("echo u > %s" % filepath)
216 self.dut.adb.shell("echo b > %s" % filepath)
[all …]
/test/vts-testcase/kernel/ltp/
Denvironment_requirement_checker.py56 def __init__(self, shell): argument
57 self.shell = shell
60 self._shell_env = shell_environment.ShellEnvironment(self.shell)
64 def shell(self): member in EnvironmentRequirementChecker
68 @shell.setter
69 def shell(self, shell): member in EnvironmentRequirementChecker
71 self._shell = shell
152 permission_result = self.shell.Execute(permission_command)
183 self.shell.Execute(bin_path_exist_commands)[const.EXIT_CODE])
187 self.shell.Execute(bin_path_exist_commands)[const.EXIT_CODE])
DKernelLtpTest.py97 self.shell = self._dut.shell
98 self.shell.SetConnTimeout(TIMEOUT_TCP_IN_SECS)
101 self.shell)
102 self._shell_env = shell_environment.ShellEnvironment(self.shell)
119 def shell(self): member in KernelLtpTest
123 @shell.setter
124 def shell(self, shell): argument
126 self._shell = shell
167 self.shell.Execute("mkdir %s -p" % ltp_configs.LTPDIR)
168 self.shell.Execute("restorecon -F -R %s" % ltp_configs.LTPDIR)
[all …]
/test/vts/testcases/codelab/hidl_handle_test/
DVtsCodelabHidlHandleTest.py74 self.dut.shell.Execute(self.START_COMMAND)
80 result = self.dut.shell.Execute(self.CHECK_COMMAND)
106 permission_result = self.dut.shell.Execute("getenforce")
109 self.dut.shell.Execute("setenforce permissive")
113 if not target_file_utils.Exists(self.TEST_DIR_PATH, self.dut.shell):
115 self.dut.shell.Execute("mkdir " + self.TEST_DIR_PATH)
118 self.dut.shell):
168 self.dut.shell.Execute("rm -rf " + self.TEST_DIR_PATH)
172 self.dut.shell.Execute("setenforce enforcing")
190 self.dut.shell):
/test/vts-testcase/performance/audio_loopback_test/
DAudioLoopbackTest.py45 self.dut.adb.shell("mkdir -p %s" % self.FULL_DATA_DIR_PATH)
47 self.dut.adb.shell("pm install -r -g /data/local/tmp/Loopback.apk")
50 self.dut.adb.shell("rm -rf %s" % self.FULL_DATA_DIR_PATH)
98 self.dut.shell.Execute(
100 self.dut.shell.Execute([
106 results = self.dut.shell.Execute(
111 results = self.dut.shell.Execute(
114 results = self.dut.shell.Execute(
/test/framework/harnesses/host_controller/command_processor/
Dcommand_dut_test.py42 self.assertEqual(mock_adb_proxy.shell.mock_calls, [
52 self.assertEqual(mock_adb_proxy.shell.mock_calls, [
58 mock_adb_proxy.shell.mock_calls = []
60 self.assertEqual(mock_adb_proxy.shell.mock_calls, [
89 mock_adb_proxy.shell.assert_called_with("svc wifi enable")
104 mock_adb_proxy.shell.assert_any_call("svc wifi enable")
107 mock_adb_proxy.shell.assert_called_with(
122 mock_adb_proxy.shell.assert_any_call("svc wifi disable")
136 self.assertEqual(mock_adb_proxy.shell.mock_calls,
153 self.assertEqual(mock_adb_proxy.shell.mock_calls,
Dcommand_dut.py102 adb_proxy.shell("svc wifi enable")
106 adb_proxy.shell(
112 adb_proxy.shell("svc wifi disable")
115 adb_proxy.shell("input keyevent 25")
119 adb_proxy.shell("input keyevent 24")
141 adb_proxy.shell(adb_volume_command)
/test/vts-testcase/kernel/api/net/
DVtsKernelNetTest.py48 self.shell = self.dut.adb.shell
59 self.shell('rm -rf %s' % path_utils.TargetDirName(self.target_bin_path))
64 self.shell('mkdir -p %s' % path_utils.TargetDirName(self.target_bin_path))
66 self.shell('chmod 777 %s' % self.target_bin_path)
69 result = self.shell(self.target_bin_path, no_except=True)
/test/vts/testcases/template/hal_hidl_host_test/
Dhal_hidl_host_test.py40 self.shell = self.dut.shell
53 self, self.dut, self.shell, self.run_as_compliance_test):
66 self.profiling.EnableVTSProfiling(self.shell)
90 self.profiling.EnableVTSProfiling(self.shell)
97 self.profiling.DisableVTSProfiling(self.shell)
147 self.shell, service, self.abi_bitness,
/test/vts/testcases/host/verify_dtbo/
DVtsFirmwareDtboVerification.py66 self.shell = self.dut.shell
72 self.shell.Execute("mkdir %s -p" % self.device_path)
122 self.shell, BLOCK_DEV_PATH, current_dtbo_partition, "-type l")
146 overlay_idx_string = self.adb.shell(
161 self.shell.Execute("cp %s %s" % (FDT_PATH, final_dt_path))
165 results = self.shell.Execute(chmod_cmd)
172 results = self.shell.Execute(cmd)
179 self.shell.Execute("rm -rf %s" % self.device_path)
/test/vts/testcases/host/shell_binary_crash_test/
DShellBinaryCrashTest.py39 self.dut.shell.InvokeTerminal("my_shell1")
41 results = self.dut.shell.my_shell1.Execute(
54 self.dut.shell.InvokeTerminal("my_shell1")
56 results = self.dut.shell.my_shell1.Execute(
75 self.dut.shell.InvokeTerminal(shell_name)
76 results = getattr(self.dut.shell, shell_name).Execute("which ls")
/test/vts/utils/python/profiling/
Dprofiling_utils.py158 results = dut.shell.Execute("ls " + target_trace_file)
183 def EnableVTSProfiling(self, shell, hal_instrumentation_lib_path=None): argument
204 shell.Execute(
209 shell.Execute("chmod 777 " + TARGET_PROFILING_TRACE_PATH)
211 shell.Execute("setprop hal.instrumentation.lib.path.32 " +
213 shell.Execute("setprop hal.instrumentation.lib.path.64 " +
217 shell.Execute("setprop hal.instrumentation.profile.args true")
219 shell.Execute("setprop hal.instrumentation.profile.args false")
220 shell.Execute("setprop hal.instrumentation.enable true")
222 def DisableVTSProfiling(self, shell): argument
[all …]
/test/vts-testcase/kernel/memory/
DMemorySystemStressTest.py38 self.shell = self.dut.shell
40 self.shell.Execute(' '.join(cmd))
44 meminfo_results = self.shell.Execute("cat /proc/meminfo")
57 results = self.shell.Execute(' '.join(cmd))
/test/vts-testcase/kernel/api/selinux/
DVtsKernelSelinuxFileApiTest.py42 self.shell = self.dut.shell
53 target_file_utils.Exists(test_object.get_path(), self.shell),
59 test_object.get_path(), self.shell)
69 test_object.get_path(), self.shell)
/test/vts/testcases/vts_selftest/manual_tests/shell_performance/
DVtsSelfTestShellPerformance.py36 self.shell = self.dut.shell
46 self.shell.Execute(cmd)
56 self.dut.adb.shell(cmd)
65 self.shell.Execute([cmd] * n)

12345