/cts/apps/CameraITS/build/ |
envsetup.sh | 25 command -v adb >/dev/null 2>&1 || \ 26 echo ">> Require adb executable to be in path" >&2
|
/external/chromium-trace/catapult/devil/devil/android/ |
device_temp_file.py | 19 def __init__(self, adb, suffix='', prefix='temp_file', dir='/data/local/tmp'): 25 adb: An instance of AdbWrapper 37 self._adb = adb
|
install_commands.py | 37 device_serial=device.adb.GetDeviceSerial()) 55 device.adb.Push(
|
flag_changer_devicetest.py | 32 self.adb = adb_wrapper.AdbWrapper(self.serial) 33 self.adb.WaitForDevice() 35 self.adb, default_timeout=10, default_retries=0)
|
/external/flatbuffers/android/ |
build_apk.sh | 105 adb devices -l | \ 124 # Find and run "adb". 125 adb() { function 127 for path in "$(which adb 2>/dev/null)" \ 128 "${ANDROID_SDK_HOME}/sdk/platform-tools/adb" \ 129 "${android_root}/prebuilts/sdk/platform-tools/adb"; do 136 echo -e "Unable to find adb." \ 324 # or an empty string. If $3 is an empty string adb will fail when multiple 331 adb ${adb_device} uninstall "${uninstall_package_name}" 1>&2 > /dev/null || \ 335 # NOTE: The following works around adb not returning an error code whe [all...] |
/external/flatbuffers/samples/android/ |
build_apk.sh | 105 adb devices -l | \ 124 # Find and run "adb". 125 adb() { function 127 for path in "$(which adb 2>/dev/null)" \ 128 "${ANDROID_SDK_HOME}/sdk/platform-tools/adb" \ 129 "${android_root}/prebuilts/sdk/platform-tools/adb"; do 136 echo -e "Unable to find adb." \ 324 # or an empty string. If $3 is an empty string adb will fail when multiple 331 adb ${adb_device} uninstall "${uninstall_package_name}" 1>&2 > /dev/null || \ 335 # NOTE: The following works around adb not returning an error code whe [all...] |
/external/libmojo/third_party/catapult/devil/devil/android/ |
device_temp_file.py | 19 def __init__(self, adb, suffix='', prefix='temp_file', dir='/data/local/tmp'): 25 adb: An instance of AdbWrapper 30 self._adb = adb
|
install_commands.py | 37 device_serial=device.adb.GetDeviceSerial()) 54 device.adb.Push(
|
/external/parameter-framework/upstream/tools/xmlGenerator/ |
updateRoutageDomains.sh | 83 adb remount 99 adb pull "$PFWtest_RemoteOutputFile" "$PFWtest_LocalOutputFile"
|
/external/skia/tools/skpbench/ |
_hardware_android.py | 12 def __init__(self, adb): 15 self._adb = adb 53 print("WARNING: no adb root access; results may be unreliable.",
|
skpbench.py | 9 from _adb import Adb 34 __argparse.add_argument('--adb', 35 action='store_true', help="execute skpbench over adb") 37 help="if using adb, ID of the specific device to target " 66 if FLAGS.adb: 111 if FLAGS.adb: 113 ARGV[:0] = ['adb', 'shell'] 115 ARGV[:0] = ['adb', '-s', FLAGS.device_serial, 'shell'] 280 if FLAGS.adb: 281 adb = Adb(FLAGS.device_serial, echo=(FLAGS.verbosity >= 5) [all...] |
/external/vogar/bin/ |
vogar | 15 adb_path=`which adb`
|
/frameworks/base/core/tests/systemproperties/ |
run_core_systemproperties_test.sh | 19 COMMAND="adb install -r $TESTAPP" 24 adb shell am instrument -w -e class android.os.SystemPropertiesTest com.android.frameworks.coretests.systemproperties/android.test.InstrumentationTestRunner
|
/system/bt/test/ |
run_unit_tests.sh | 96 adb=( "adb" ) 98 adb+=( "-s" "${device}" ) 107 push_command=( "${adb[@]}" push {"${ANDROID_PRODUCT_OUT}",}"${binary}" ) 108 test_command=( "${adb[@]}" shell "${binary}" )
|
/system/core/init/ |
grab-bootchart.sh | 4 # All options are passed to adb, for better or for worse. 17 adb "${@}" pull $LOGROOT/$f $TMPDIR/$f 2>&1 > /dev/null
|
/system/extras/simpleperf/scripts/ |
binary_cache_builder.py | 52 self.adb = AdbHelper(config['adb_path']) 206 if self.adb.run(['pull', device_path, host_path]): 211 if (self.adb.run(['shell', 'cp', device_path, '/data/local/tmp']) and 212 self.adb.run(['pull', '/data/local/tmp/' + filename, host_path])): 213 self.adb.run(['shell', 'rm', '/data/local/tmp/' + filename]) 223 if self.adb.switch_to_root(): 224 self.adb.run(['shell', '"echo 0 >/proc/sys/kernel/kptr_restrict"']) 225 self.adb.run(['pull', '/proc/kallsyms', file])
|
/test/vts-testcase/security/poc/host/ |
SecurityPoCKernelTest.py | 27 from vts.utils.python.controllers import adb 60 self._dut.adb.shell("rm -rf %s" % config.POC_TEST_DIR) 63 """adb pushes related file to target.""" 64 self._dut.adb.shell("mkdir %s -p" % config.POC_TEST_DIR) 71 self._dut.adb.push("%s %s" % (push_src, config.POC_TEST_DIR)) 84 out = self._dut.adb.shell("getprop ro.product.model") 143 self._dut.adb.shell(chmod_cmd) 152 stdout = self._dut.adb.shell(test_cmd) 158 except adb.AdbError as e:
|
/tools/test/connectivity/acts/tests/google/bt/ |
BtKillProcessTest.py | 34 return (self.dut.adb.shell("ps | grep {} | {}".format( 70 self.dut.adb.shell("kill -9 {}".format(pid))
|
/external/chromium-trace/catapult/devil/devil/android/tools/ |
device_recovery.py | 36 if 'adb' in p.name: 58 if device_status.IsBlacklisted(device.adb.GetDeviceSerial(), 79 device.adb.Root() 82 # what device.adb.Root() returns. If the sysrq reboot fails an 84 device.adb.Shell('echo b > /proc/sysrq-trigger', expect_status=None, 89 blacklist.Extend([device.adb.GetDeviceSerial()], 94 blacklist.Extend([device.adb.GetDeviceSerial()], 103 blacklist.Extend([device.adb.GetDeviceSerial()], 108 blacklist.Extend([device.adb.GetDeviceSerial()], 137 logger.debug('Should restart ADB for:' [all...] |
/external/libmojo/third_party/catapult/devil/devil/android/tools/ |
device_recovery.py | 33 if 'adb' in p.name: 55 if device_status.IsBlacklisted(device.adb.GetDeviceSerial(), 75 device.adb.Root() 76 device.adb.Shell('echo b > /proc/sysrq-trigger', expect_status=None, 81 blacklist.Extend([device.adb.GetDeviceSerial()], 86 blacklist.Extend([device.adb.GetDeviceSerial()], 94 blacklist.Extend([device.adb.GetDeviceSerial()], 99 blacklist.Extend([device.adb.GetDeviceSerial()], 128 logging.debug('Should restart ADB for:') 159 parser.add_argument('--adb-path' [all...] |
/development/testrunner/test_defs/ |
instrumentation_test.py | 91 def Run(self, options, adb): 94 Builds up an adb instrument command using provided input arguments. 98 adb: adb_interface to device under test 137 adb_cmd = adb.PreviewInstrumentationCommand( 144 coverage_gen = coverage.CoverageGenerator(adb) 149 self._CheckInstrumentationInstalled(adb) 153 (test_results, status_map) = adb.StartInstrumentationForPackage( 174 self._CheckInstrumentationInstalled(adb) 175 adb.StartInstrumentationNoResults(package_name=self.GetPackageName(), 182 def _CheckInstrumentationInstalled(self, adb) [all...] |
/sdk/bash_completion/ |
adb.bash | 68 local devices=$(command adb devices 2> /dev/null | grep -v "List of devices" | awk '{ print $1 }') 198 paths=$(command adb ${args[@]} shell echo '$'PATH 2> /dev/null | tr -d '\r' | tr : '\n') 199 COMMAND=$(command adb ${args[@]} shell ls $paths '2>' /dev/null | tr -d '\r' | { 254 candidates=$(command adb ${args[@]} shell dumpsys -l 2> /dev/null | sed -e '1d;s/^ *//' | tr -d '\r') 341 command adb ${args[@]} shell pm list packages '2>' /dev/null 2> /dev/null | tr -d '\r' | { 407 if [[ $( command adb ${args[@]} shell ls -dF / '2>/dev/null' | tr -d '\r' ) == "d /" ]] ; then 409 command adb ${args[@]} shell ls -dF ${file}"*" '2>' /dev/null 2> /dev/null | tr -d '\r' | { 423 command adb ${args[@]} shell ls -dp ${file}"*" '2>/dev/null' 2> /dev/null | tr -d '\r' 486 complete -F _adb adb 488 complete -o nospace -F _adb adb [all...] |
/cts/hostsidetests/aadb/ |
Android.mk | 22 # Adb test cases, but name 'aadb' ensures adb tests run before all other modules depending on adb
|
/development/samples/USB/AdbTest/src/com/android/adb/ |
AdbSocket.java | 17 package com.android.adb; 19 /* This class represents an adb socket. adb supports multiple independent 21 * for each adb command that is executed.
|
/external/objenesis/tck-android/ |
Android.mk | 23 # adb install -r ${ANDROID_PRODUCT_OUT}/data/app/ObjenesisTck/ObjenesisTck.apk 24 # adb shell am instrument -w org.objenesis.tck.android/.TckInstrumentation
|