/art/tools/jvmti-agents/field-counts/ |
D | count-fields.py | 71 device = adb.device.get_device(out.serial) 73 device.root() 76 device.shell("setenforce 0".split()) 79 lib32 = device.shell("mktemp".split())[0].strip() 80 lib64 = device.shell("mktemp".split())[0].strip() 83 device.push(out.lib32, lib32) 86 device.push(out.lib64, lib64) 93 new_env["ANDROID_SERIAL"] = device.serial 94 p = subprocess.Popen([device.adb_path, "jdwp"], env=new_env, stdout=subprocess.PIPE) 102 device.shell("logcat -c".split()) [all …]
|
/art/tools/jvmti-agents/field-null-percent/ |
D | check-null-fields.py | 70 device = adb.device.get_device(out.serial) 72 device.root() 75 device.shell("setenforce 0".split()) 78 lib32 = device.shell("mktemp".split())[0].strip() 79 lib64 = device.shell("mktemp".split())[0].strip() 82 device.push(out.lib32, lib32) 85 device.push(out.lib64, lib64) 93 new_env["ANDROID_SERIAL"] = device.serial 94 p = subprocess.Popen([device.adb_path, "jdwp"], env=new_env, stdout=subprocess.PIPE) 102 device.shell("logcat -c".split()) [all …]
|
/art/tools/dexfuzz/src/dexfuzz/executors/ |
D | Executor.java | 40 protected Device device; field in Executor 45 Device device, boolean needsCleanCodeCache, boolean isBisectable) { in Executor() argument 57 this.device = device; in Executor() 78 return device.executeCommand(timeoutString + device.getExecutionShellPrefix() + command, in executeCommandWithTimeout() 108 commandBuilder.append("--boot-image=").append(device.getAndroidProductOut()); in verifyOnHost() 109 if (device.noBootImageAvailable()) { in verifyOnHost() 116 commandBuilder.append("--android-root=").append(device.getAndroidHostOut()).append(" "); in verifyOnHost() 120 ExecutionResult verificationResult = device.executeCommand(commandBuilder.toString(), true, in verifyOnHost() 149 device.executeCommand("rm output.oat", false); in verifyOnHost() 159 device.pushProgramToDevice(programName, testLocation); in prepareProgramForExecution() [all …]
|
D | ArmInterpreterExecutor.java | 23 public ArmInterpreterExecutor(BaseListener listener, Device device) { in ArmInterpreterExecutor() argument 24 super("ARM Interpreter", 30, listener, Architecture.ARM, device, in ArmInterpreterExecutor() 32 if (device.noBootImageAvailable()) { in constructCommand()
|
D | Arm64InterpreterExecutor.java | 23 public Arm64InterpreterExecutor(BaseListener listener, Device device) { in Arm64InterpreterExecutor() argument 24 super("ARM64 Interpreter", 30, listener, Architecture.ARM64, device, in Arm64InterpreterExecutor() 32 if (device.noBootImageAvailable()) { in constructCommand()
|
D | ArmOptimizingBackendExecutor.java | 23 public ArmOptimizingBackendExecutor(BaseListener listener, Device device) { in ArmOptimizingBackendExecutor() argument 24 super("ARM Optimizing Backend", 5, listener, Architecture.ARM, device, in ArmOptimizingBackendExecutor() 35 if (device.noBootImageAvailable()) { in constructCommand()
|
D | Arm64OptimizingBackendExecutor.java | 23 public Arm64OptimizingBackendExecutor(BaseListener listener, Device device) { in Arm64OptimizingBackendExecutor() argument 24 super("ARM64 Optimizing Backend", 5, listener, Architecture.ARM64, device, in Arm64OptimizingBackendExecutor() 35 if (device.noBootImageAvailable()) { in constructCommand()
|
D | X86InterpreterExecutor.java | 24 public X86InterpreterExecutor(BaseListener listener, Device device) { in X86InterpreterExecutor() argument 25 super("x86 Interpreter", 30, listener, Architecture.X86, device, in X86InterpreterExecutor() 34 commandBuilder.append(device.getHostExecutionFlags()).append(" "); in constructCommand()
|
D | X86OptimizingBackendExecutor.java | 24 public X86OptimizingBackendExecutor(BaseListener listener, Device device) { in X86OptimizingBackendExecutor() argument 25 super("x86 Optimizing Backend", 5, listener, Architecture.X86, device, in X86OptimizingBackendExecutor() 37 commandBuilder.append(device.getHostExecutionFlags()).append(" "); in constructCommand()
|
D | X86_64InterpreterExecutor.java | 23 public X86_64InterpreterExecutor(BaseListener listener, Device device) { in X86_64InterpreterExecutor() argument 24 super("x86_64 Interpreter", 30, listener, Architecture.X86_64, device, in X86_64InterpreterExecutor()
|
D | X86_64OptimizingBackendExecutor.java | 23 public X86_64OptimizingBackendExecutor(BaseListener listener, Device device) { in X86_64OptimizingBackendExecutor() argument 24 super("x86_64 Optimizing Backend", 5, listener, Architecture.X86_64, device, in X86_64OptimizingBackendExecutor()
|
/art/test/ |
D | README.chroot.md | 3 This file documents the use of a chroot environment in on-device testing of the 5 a locally built source tree on a device running (almost any) system image and 6 does not interfere with the Runtime installed in the device's system partition. 12 `/data/local` (e.g. `ART_TEST_CHROOT=/data/local/art-test-chroot`) on a device, 14 shell chroot $ART_TEST_CHROOT <command>` to execute commands on the device 20 system") running on the device. This has some benefits: 22 * no need to build and flash a whole device to do ART testing (or "overwriting" 28 functional Android Runtime is necessary to properly boot a device); 32 Note that using this chroot-based approach requires root access to the device 71 4. Clean up the device: [all …]
|
D | README.md | 73 gtests can be run by executing `m test-art-host-gtest`. On device, the 82 run on the build host, on a USB-attached device, or using the build host 85 ART also supports running target (device) tests in a chroot environment (see 101 ## Running all tests on the target device 113 ## Running all gtests on the target device 125 ## Running all run-tests on the target device 137 ## Running one run-test on the target device
|
/art/tools/ |
D | run-libcore-tests.sh | 67 --mode=device|host|jvm Specify where tests should be run. 70 --debug Use debug version of ART (device|host only). 73 --no-jit Disable JIT (device|host only). 74 --Xgc:gcstress Enable GC stress configuration (device|host only). 87 2. Run full test suite on device: 88 ${me} --mode=device 90 3. Run tests only from the libcore.java.lang package on device: 91 ${me} --mode=device -- libcore.java.lang 185 --mode=device)
|
D | libcore_failures.txt | 41 777 all directories on path to socket (on device without su).", 56 description: "Issue with incorrect device time (1970)", 65 description: "Issue with incorrect device time (1970). Test assumes that DateTime.now() 110 description: "Needs the newest cat version on the device", 116 description: "Needs kernel updates on host/device", 205 description: "Host implementation of android_getaddrinfo differs from device implementation", 265 description: "Fails on device",
|
/art/tools/bisection_search/ |
D | README.md | 29 If used in device mode, the command has to exec a dalvikvm instance. Bisection 40 [--64] [--device] [--device-serial DEVICE_SERIAL] 62 --device run on device 63 --device-serial DEVICE_SERIAL device serial number, implies --device
|
/art/tools/dexfuzz/ |
D | README | 18 ADB-connected Android device, and it will fuzz these seed files, and execute the 19 resulting new tests on the Android device. 24 DexFuzz can run its test programs on either an ADB-connected device, or a host-build of 27 Execution on an ADB-connected device 31 2. Make sure you have an Android device connected via ADB, that is capable of 37 5. Create a directory on your device that mutated test files can be pushed to and 40 your device using "adb devices -l". 56 Note that if you wanted to test both ARM and ARM64 on an ARM64 device, you can use 65 Add in --device=<device name, e.g. device:generic> if you want to specify a device. 66 Add in --execute-dir=<dir on device> if you want to specify an execution directory.
|
/art/tools/dexfuzz/src/dexfuzz/fuzzers/ |
D | Fuzzer.java | 114 private void addExecutorsForArchitecture(Device device, Class<? extends Executor> optimizing, in addExecutorsForArchitecture() argument 124 executors.add(constructor.newInstance(listener, device)); in addExecutorsForArchitecture() 129 executors.add(constructor.newInstance(listener, device)); in addExecutorsForArchitecture() 145 Device device = null; in addExecutors() local 147 device = new Device(); in addExecutors() 149 device = new Device(Options.deviceName, Options.noBootImage); in addExecutors() 153 addExecutorsForArchitecture(device, Arm64OptimizingBackendExecutor.class, in addExecutors() 158 addExecutorsForArchitecture(device, ArmOptimizingBackendExecutor.class, in addExecutors() 163 addExecutorsForArchitecture(device, X86_64OptimizingBackendExecutor.class, in addExecutors() 168 addExecutorsForArchitecture(device, X86OptimizingBackendExecutor.class, in addExecutors()
|
/art/test/utils/ |
D | get-device-test-native-lib-path | 19 Determine the 32- or 64-bit architecture of a device and print the path to 20 native libraries installed on the device for testing purposes.
|
D | get-device-isa | 19 Determine and print the 32- or 64-bit architecture of a device. 47 adb wait-for-device
|
/art/tools/jfuzz/ |
D | run_jfuzz_test.py | 45 def GetExecutionModeRunner(dexer, debug_info, device, mode): argument 65 return TestRunnerArtIntOnTarget(dexer, debug_info, device) 67 return TestRunnerArtOptOnTarget(dexer, debug_info, device) 255 def __init__(self, dexer, debug_info, device, extra_args=None): argument 265 self._test_env = DeviceTestEnv('jfuzz_', specific_device=device) 269 self._device = device 298 def __init__(self, dexer, debug_info, device): argument 306 super().__init__(dexer, debug_info, device, ['-Xint']) 323 def __init__(self, dexer, debug_info, device): argument 331 super().__init__(dexer, debug_info, device, None) [all …]
|
D | run_dex_fuzz_test.py | 43 def __init__(self, num_tests, num_inputs, device, dexer, debug_info): argument 55 self._device = device 188 args.device,
|
D | README.md | 50 [--device=DEVICE] 61 --device : target device serial number (passed to adb -s) 93 [--device=DEVICE] 101 --device : target device serial number (passed to adb -s)
|
/art/test/175-alloc-big-bignums/ |
D | info.txt | 10 to exhaust device memory, and kill off all processes on the device, including the
|
/art/build/apex/ |
D | Android.bp | 14 // - Base requirements (binaries for which a 32-bit version is preferred on device, but for which 22 // Note: ART on-device chroot-based testing and benchmarking is not yet using 67 // - Debug variants (binaries for which a 32-bit version is preferred on device, but for which 99 // Tools common to both device APEX and host APEX. Derived from art-tools in art/Android.mk. 105 // Tools common to both device and host debug APEXes. 118 // Tools exclusively for the device APEX derived from art-tools in art/Android.mk. 151 // Note: ART on-device chroot-based testing and benchmarking is not yet using 209 // Default values shared by device ART APEXes. 240 // Default values shared by (device) Debug and Testing ART APEXes.
|