Searched refs:Execute (Results 1 – 25 of 54) sorted by relevance
123
38 results = self.dut.shell.Execute("which ls")47 results = self.dut.shell.my_shell2.Execute(["which ls"] *60 results = self.dut.shell.my_shell3.Execute("which ls")76 results = self.dut.shell.command_sequence_cd.Execute(cmd)86 results = self.dut.shell.command_sequence_export.Execute(97 results = self.dut.shell.command_sequence_mktemp.Execute(108 results = current_shell.Execute("which ls")
74 self.dut.shell.Execute(self.START_COMMAND)80 result = self.dut.shell.Execute(self.CHECK_COMMAND)106 permission_result = self.dut.shell.Execute("getenforce")109 self.dut.shell.Execute("setenforce permissive")115 self.dut.shell.Execute("mkdir " + self.TEST_DIR_PATH)168 self.dut.shell.Execute("rm -rf " + self.TEST_DIR_PATH)172 self.dut.shell.Execute("setenforce enforcing")
158 results = dut.shell.Execute("ls " + target_trace_file)204 shell.Execute(209 shell.Execute("chmod 777 " + TARGET_PROFILING_TRACE_PATH)211 shell.Execute("setprop hal.instrumentation.lib.path.32 " +213 shell.Execute("setprop hal.instrumentation.lib.path.64 " +217 shell.Execute("setprop hal.instrumentation.profile.args true")219 shell.Execute("setprop hal.instrumentation.profile.args false")220 shell.Execute("setprop hal.instrumentation.enable true")228 shell.Execute("setprop hal.instrumentation.lib.path \"\"")229 shell.Execute("setprop hal.instrumentation.profile.args \"\"")[all …]
98 self.dut.shell.Execute(100 self.dut.shell.Execute([106 results = self.dut.shell.Execute(111 results = self.dut.shell.Execute(114 results = self.dut.shell.Execute(
44 res1 = self.shell1.Execute(command)45 res2 = self.shell2.Execute(command)58 res1 = self.shell1.Execute(command)59 res2 = self.shell2.Execute(command)
36 self.shell.Execute("svc nfc disable") # Turn off41 self.shell.Execute(44 self.shell.Execute(60 self.shell.Execute("svc nfc disable") # make sure it's off
76 self.dut.shell.Execute("stop")77 self.dut.shell.Execute("setprop sys.boot_completed 0")89 self.dut.shell.Execute("start")111 results = self.dut.shell.Execute([
78 self.dut.shell.Execute("stop")79 self.dut.shell.Execute("setprop sys.boot_completed 0")91 self.dut.shell.Execute("start")115 results = self.dut.shell.Execute([
71 results = self._shell.Execute("cat /sys/devices/system/cpu/present")105 results = self._shell.Execute(138 results = self._shell.Execute(target_cmd)154 results = self._shell.Execute(target_cmd)202 results = self._shell.Execute([
72 self.shell.Execute("mkdir %s -p" % self.device_path)161 self.shell.Execute("cp %s %s" % (FDT_PATH, final_dt_path))165 results = self.shell.Execute(chmod_cmd)172 results = self.shell.Execute(cmd)179 self.shell.Execute("rm -rf %s" % self.device_path)
40 self.shell.Execute(' '.join(cmd))44 meminfo_results = self.shell.Execute("cat /proc/meminfo")57 results = self.shell.Execute(' '.join(cmd))
37 results = shell.Execute(cmd)87 results = shell.Execute(cmd)112 results = shell.Execute(cmd)136 results = shell.Execute(cmd)
66 self._shell.Execute("rm -rf %s" % config.KSFT_DIR)75 self._shell.Execute("mkdir %s -p" % config.KSFT_DIR)104 result = self._shell.Execute(cmd)131 result = self._shell.Execute(cmd)
41 results = self.dut.shell.my_shell1.Execute(56 results = self.dut.shell.my_shell1.Execute(76 results = getattr(self.dut.shell, shell_name).Execute("which ls")
245 self.shell.Execute('echo %s > %s' % (lock_name, _WAKE_LOCK_PATH))248 results = self.shell.Execute('cat %s' % _WAKE_LOCK_PATH)254 self.shell.Execute('echo %s > %s' % (lock_name, _WAKE_UNLOCK_PATH))257 results = self.shell.Execute('cat %s' % _WAKE_LOCK_PATH)261 results = self.shell.Execute('cat %s' % _WAKE_UNLOCK_PATH)
48 void Execute(const ExecSpec &);50 void Execute(const FuncCall &);
84 results = self.dut.shell.Execute([99 results = self.dut.shell.Execute([106 self.dut.shell.Execute("kill -9 `pidof mq_benchmark_service%s`" %
35 results = self.shell.Execute(45 results = self.shell.Execute(["echo hello", "echo world"])
45 pm_list = self.shell.Execute("pm list features")48 …vintf_list = self.shell.Execute("grep android\\.hardware\\.wifi\\.hostapd /vendor/etc/vintf/manife…
65 cmd_results = shell.Execute("ps -A")127 cmd_results = shell.Execute("LD_LIBRARY_PATH= pm list features")208 cmd_results = shell.Execute('getprop %s' % sysprop_key)
152 permission_result = self.shell.Execute(permission_command)183 self.shell.Execute(bin_path_exist_commands)[const.EXIT_CODE])187 self.shell.Execute(bin_path_exist_commands)[const.EXIT_CODE])
67 if not definition.Execute():76 results = self.shell.Execute('cat %s' %
46 self.shell.Execute(cmd)65 self.shell.Execute([cmd] * n)
44 results = self.dut.shell.Execute("which ls")83 results = self.dut.shell.Execute([
37 results = self.dut.shell.Execute("getprop " + prop)58 results = self.dut.shell.Execute("printenv " + env)