Home
last modified time | relevance | path

Searched refs:adb (Results 1 – 25 of 246) sorted by relevance

12345678910

/external/chromium-trace/catapult/devil/devil/utils/
Dmock_calls_test.py50 self.adb = _DummyAdb()
54 raise ValueError('(device %s) command %r is not nice' % (self.adb, cmd))
66 self.assertEquals(self.adb.Shell,
67 self.call_target(self.call.adb.Shell))
75 self.call_target(self.call.adb.Run)
79 self.call_target(self.call.adb.RunShell('cmd').append)
88 with self.patch_call(self.call.adb.Shell, return_value='hello'):
89 self.assertEquals('hello', self.adb.Shell('echo hello'))
96 with self.patch_call(self.call.adb.Shell, side_effect=ValueError):
98 self.adb.Shell('echo hello')
[all …]
/external/vulkan-validation-layers/build-android/
Dtest_APK.sh75 if [[ $(adb devices) != *"$serial"* ]]
83 echo Using device $(adb get-serialno)
112 adb $serialFlag shell input keyevent "KEYCODE_MENU"
113 adb $serialFlag shell input keyevent "KEYCODE_HOME"
142 adb $serialFlag logcat -c
145 adb $serialFlag shell am force-stop com.example.VulkanLayerValidationTests
150 adb $serialFlag shell pm list packages | grep com.example.VulkanLayerValidationTests
153 adb $serialFlag uninstall com.example.VulkanLayerValidationTests
162 adb $serialFlag install -r bin/VulkanLayerValidationTests.apk
168 adb $serialFlag shell am start -a android.intent.action.MAIN -c android-intent.category.LAUNCH -n c…
[all …]
/external/nos/test/system-test-harness/scripts/
DREADME5 adb root && adb disable-verity && adb reboot
6 && adb wait-for-device root && adb remount
8 adb push ec.bin /data/local/tmp/ec.bin \
9 && adb exec-out '/vendor/bin/hw/citadel_updater -v --rw --ro \
11 && adb exec-out '/vendor/bin/hw/citadel_updater \
13 && adb shell rm /data/local/tmp/ec.bin
Drelease-tests.sh8 adb shell stop || return 1
9 adb sync || return 1
10 adb shell start || return 1
11 adb shell \
27 adb sync data || return 1
28 adb shell \
61 adb root && adb remount
/external/chromium-trace/catapult/devil/devil/android/sdk/
Dadb_wrapper_test.py23 self.adb = adb_wrapper.AdbWrapper(self.device_serial)
27 self.adb,
33 self.adb.DisableVerity()
39 self.adb.DisableVerity()
43 self.adb.EnableVerity()
49 self.adb.EnableVerity()
54 device_errors.AdbCommandFailedError, self.adb.EnableVerity)
59 device_errors.AdbCommandFailedError, self.adb.DisableVerity)
66 device_errors.DeviceUnreachableError, self.adb.Shell, '/bin/true')
72 device_errors.DeviceUnreachableError, self.adb.Shell, '/bin/true')
/external/syzkaller/vm/adb/
Dadb.go6 package adb package
112 if _, err := inst.adb("shell", "rm -Rf /data/syzkaller*"); err != nil {
115 inst.adb("shell", "echo 0 > /proc/sys/kernel/kptr_restrict")
134 func findConsole(adb, dev string) string { argument
140 con, err := findConsoleImpl(adb, dev)
155 func findConsoleImpl(adb, dev string) (string, error) { argument
197 cmd := osutil.Command(adb, "-s", dev, "shell", "echo", "\"<1>", unique, "\"", ">", "/dev/kmsg")
236 _, err = inst.adb("reverse", fmt.Sprintf("tcp:%v", devicePort), fmt.Sprintf("tcp:%v", port))
244 func (inst *instance) adb(args ...string) ([]byte, error) { func
265 if _, err := inst.adb("shell", "reboot"); err != nil {
[all …]
/external/chromium-trace/catapult/devil/devil/android/
Ddevice_utils_test.py83 self.assertEqual(serial_as_str, d.adb.GetDeviceSerial())
88 self.assertEqual(serial_as_unicode, d.adb.GetDeviceSerial())
94 self.assertEqual(serial, d.adb.GetDeviceSerial())
183 adb = mock.Mock(spec=adb_wrapper.AdbWrapper)
184 adb.__str__ = mock.Mock(return_value=test_serial)
185 adb.GetDeviceSerial.return_value = test_serial
186 adb.is_ready = is_ready
187 return adb
193 self.adb = _AdbWrapperMock('0123456789abcdef')
195 self.adb, default_timeout=10, default_retries=0)
[all …]
Ddevice_utils_devicetest.py38 self.adb = adb_wrapper.AdbWrapper(self.serial)
39 self.adb.WaitForDevice()
41 self.adb, default_timeout=10, default_retries=0)
89 self.adb.Push(host_file_path, device_file_path)
101 self.adb.Push(host_file_path, device_file_path)
119 self.adb.Push(host_file_path, device_file_path)
139 self.adb.Push(host_file_path1, device_file_path1)
140 self.adb.Push(host_file_path2, device_file_path2)
180 self.adb.Push(host_file_path1, device_file_path1)
181 self.adb.Push(host_file_path2, device_file_path2)
[all …]
/external/toybox/
Drun-tests-on-android.sh4 adb shell mkdir /data/local/tmp/toybox-tests/
5 adb push tests/ /data/local/tmp/toybox-tests/
6 adb push scripts/runtest.sh /data/local/tmp/toybox-tests/
9 tmp_dir=`adb shell TMPDIR=/data/local/tmp mktemp --directory`
16 location=$(adb shell "which $toy")
24 implementation=$(adb shell "realpath $location")
29 adb shell -t "export FILES=/data/local/tmp/toybox-tests/tests/files/ ; \
/external/v8/tools/
Dadb-d8.py63 def TransferD8ToDevice(adb, build_dir, device_d8_dir, verbose): argument
75 adb, "shell",
91 adb, "push",
97 def AdbForwardDeviceToLocal(adb, device_port, server_port, verbose): argument
103 adb, "reverse",
109 def AdbRunD8(adb, device_d8_dir, device_port, d8_args, verbose): argument
120 cmd = [adb, "shell", "-t", d8_str]
122 cmd = [adb, "shell", d8_str]
159 adb = os.path.join(
206 TransferD8ToDevice(adb, build_dir, device_d8_dir, verbose)
[all …]
Dandroid-ll-prof.sh53 adb -p "$DEPLOY" sync data
55 adb shell "cd /data/local/tmp/v8;\
59 adb pull /data/local/tmp/v8/v8.log .
60 adb pull /data/local/tmp/v8/v8.log.ll .
61 adb pull /data/perf.data .
/external/tensorflow/tensorflow/contrib/makefile/samples/
Dbuild_and_run_inception_hexagon.sh60 if ! type adb >/dev/null 2>&1; then
64 if ! adb shell ls /system/lib/rfsa/adsp/testsig* >/dev/null 2>&1; then
220 adb push "${GEN_LIBS_DIR}/libhexagon_controller.so" "/data/local/tmp"
221 adb push "${GEN_LIBS_DIR}/libhexagon_nn_skel.so" "/vendor/lib/rfsa/adsp"
223 adb push -p \
226 adb wait-for-device
227 adb shell chmod "${ANDROID_EXEC_FILE_MODE}" \
229 adb wait-for-device
232 adb shell 'LD_LIBRARY_PATH=/data/local/tmp:$LD_LIBRARY_PATH' \
/external/libusb/android/
DREADME62 adb shell su -c "mount -o remount,rw /system"
65 adb push obj/local/armeabi/libusb1.0.so /sdcard/
66 adb shell su -c "cat > /system/lib/libusb1.0.so < /sdcard/libusb1.0.so"
67 adb shell rm /sdcard/libusb1.0.so
72 adb push "obj/local/armeabi/$B" /sdcard/
73 adb shell su -c "cat > /system/bin/$B < /sdcard/$B"
74 adb shell su -c "chmod 0755 /system/bin/$B"
75 adb shell rm "/sdcard/$B"
79 adb shell su -c "mount -o remount,ro /system"
82 adb shell su -c "listdevs"
[all …]
/external/skqp/tools/skqp/
Dtest_apk.sh37 adb install -r "$APK" || exit 2
38 adb logcat -c
40 adb logcat TestRunner org.skia.skqp skia DEBUG "*:S" | tee "${TDIR}/logcat.txt" &
47 adb shell am instrument $ARGS -w org.skia.skqp \
61 if ! adb shell "test -d '$ODIR'" ; then
68 adb pull "${ODIR}" "${TDIR}/${odir_basename}"
Drun_skqp_exe14 def adb(*args): function
23 adb('shell', 'rm -rf /data/local/tmp/skqp; mkdir -p /data/local/tmp/skqp')
25 adb('push',
29 adb('push', os.path.join(build, 'skqp'), '/data/local/tmp/skqp/skqp')
37 adb('pull', "/data/local/tmp/report", tmpdir)
/external/skia/tools/skqp/
Dtest_apk.sh37 adb install -r "$APK" || exit 2
38 adb logcat -c
40 adb logcat TestRunner org.skia.skqp skia DEBUG "*:S" | tee "${TDIR}/logcat.txt" &
47 adb shell am instrument $ARGS -w org.skia.skqp \
61 if ! adb shell "test -d '$ODIR'" ; then
68 adb pull "${ODIR}" "${TDIR}/${odir_basename}"
Drun_skqp_exe14 def adb(*args): function
23 adb('shell', 'rm -rf /data/local/tmp/skqp; mkdir -p /data/local/tmp/skqp')
25 adb('push',
29 adb('push', os.path.join(build, 'skqp'), '/data/local/tmp/skqp/skqp')
37 adb('pull', "/data/local/tmp/report", tmpdir)
/external/skia/infra/skqp/
Drun_skqp.sh20 timeout 60 adb wait-for-device shell 'while [[ -z $(getprop sys.boot_completed) ]]; do sleep 1; don…
24 adb install -r /OUT/skqp-universal-debug.apk
25 adb logcat -c
29 adb shell am instrument -w org.skia.skqp | tee "$tmp_file" | fold -s
31 adb logcat -d TestRunner org.skia.skqp skia DEBUG "*:S"
/external/skqp/infra/skqp/
Drun_skqp.sh20 timeout 60 adb wait-for-device shell 'while [[ -z $(getprop sys.boot_completed) ]]; do sleep 1; don…
24 adb install -r /OUT/skqp-universal-debug.apk
25 adb logcat -c
29 adb shell am instrument -w org.skia.skqp | tee "$tmp_file" | fold -s
31 adb logcat -d TestRunner org.skia.skqp skia DEBUG "*:S"
/external/boringssl/src/crypto/asn1/
Dtasn_utl.c223 const ASN1_ADB *adb; in asn1_do_adb() local
233 adb = ASN1_ADB_ptr(tt->item); in asn1_do_adb()
236 sfld = offset2ptr(*pval, adb->offset); in asn1_do_adb()
240 if (!adb->null_tt) { in asn1_do_adb()
243 return adb->null_tt; in asn1_do_adb()
260 for (atbl = adb->tbl, i = 0; i < adb->tblcount; i++, atbl++) { in asn1_do_adb()
269 if (!adb->default_tt) { in asn1_do_adb()
272 return adb->default_tt; in asn1_do_adb()
/external/gemmlowp/scripts/
Dtest-android.sh59 adb root
66 adb shell mkdir -p /data/local/tmp
73 adb push $EXE /data/local/tmp
80 echo adb shell "/data/local/tmp/$EXE $TESTARGS"
82 adb shell "/data/local/tmp/$EXE $TESTARGS" | tee "log-$EXE"
/external/chromium-trace/catapult/systrace/atrace_helper/
DMakefile13 adb push libs/armeabi-v7a/atrace_helper /data/local/tmp/atrace_helper
16 adb shell /data/local/tmp/atrace_helper -c 1
19 adb shell /data/local/tmp/atrace_helper -c 1 -m system_server -g -s -o /data/local/tmp/dump.json
20 adb pull /data/local/tmp/dump.json /tmp/dump.json
24 adb shell "time /data/local/tmp/atrace_helper -c 1 -m -o /dev/null"
/external/skia/bin/
Ddroid27 adb shell "cd \"$dst_dir\"; mkdir -p $dirs"
28 adb push --sync resources "${dst_dir}/"
29 adb push --sync "$path" "${dst_dir}/${name}"
30 adb shell "cd \"$dst_dir\"; chmod +x \"$name\"; \"./$name\" $*"
/external/skqp/bin/
Ddroid27 adb shell "cd \"$dst_dir\"; mkdir -p $dirs"
28 adb push --sync resources "${dst_dir}/"
29 adb push --sync "$path" "${dst_dir}/${name}"
30 adb shell "cd \"$dst_dir\"; chmod +x \"$name\"; \"./$name\" $*"
/external/perfetto/tools/
Dpull_ftrace_format_files.py31 def adb(*cmd, **kwargs): function
46 serials = [s.split('\t')[0] for s in adb('devices').split('\n')[1:] if s]
99 output = adb('shell', cmd, serial=serial)
113 build_id = adb('shell', 'getprop', 'ro.build.id', serial=serial).strip()
114 product = adb('shell', 'getprop', 'ro.build.product', serial=serial).strip()
115 kernel = adb('shell', 'uname', '-r', serial=serial).split('-')[0].strip()

12345678910