#!/bin/bash # # Copyright (C) 2015 The Android Open Source Project # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # The work does by this script is (mostly) undone by tools/buildbot-teardown-device.sh. # Make sure to keep these files in sync. . "$(dirname $0)/buildbot-utils.sh" if [ "$1" = --verbose ]; then verbose=true else verbose=false fi # Testing on a Linux VM requires special setup. if [[ -n "$ART_TEST_ON_VM" ]]; then [[ -d "$ART_TEST_VM_DIR" ]] || { msgfatal "no VM found in $ART_TEST_VM_DIR"; } $ART_SSH_CMD "true" || { msgerror "no VM (tried \"$ART_SSH_CMD true\""; } $ART_SSH_CMD " mkdir $ART_TEST_CHROOT mkdir $ART_TEST_CHROOT/apex mkdir $ART_TEST_CHROOT/bin mkdir -p $ART_TEST_CHROOT/data/local/tmp mkdir $ART_TEST_CHROOT/dev mkdir $ART_TEST_CHROOT/etc mkdir $ART_TEST_CHROOT/lib mkdir $ART_TEST_CHROOT/linkerconfig mkdir $ART_TEST_CHROOT/proc mkdir $ART_TEST_CHROOT/sys mkdir $ART_TEST_CHROOT/system mkdir $ART_TEST_CHROOT/tmp mkdir -p $ART_TEST_CHROOT/usr/lib mkdir -p $ART_TEST_CHROOT/usr/share/gdb sudo mount -t proc /proc $ART_TEST_CHROOT_BASENAME/proc sudo mount -t sysfs /sys $ART_TEST_CHROOT_BASENAME/sys sudo mount --bind /dev $ART_TEST_CHROOT_BASENAME/dev sudo mount --bind /bin $ART_TEST_CHROOT_BASENAME/bin sudo mount --bind /lib $ART_TEST_CHROOT_BASENAME/lib sudo mount --bind /lib $ART_TEST_CHROOT_BASENAME/usr/lib sudo mount --bind /usr/share/gdb $ART_TEST_CHROOT_BASENAME/usr/share/gdb $ART_CHROOT_CMD echo \"Hello from chroot! I am \$(uname -a).\" " exit 0 fi # Regular Android device. Setup as root, as some actions performed here require it. adb version adb root adb wait-for-device msginfo "Date on host" date msginfo "Date on device" adb shell date host_seconds_since_epoch=$(date -u +%s) # Get the device time in seconds, but filter the output as some # devices emit CRLF at the end of the command which then breaks the # time comparisons in this script (Hammerhead, MRA59G 2457013). device_seconds_since_epoch=$(adb shell date -u +%s | tr -c -d '[:digit:]') abs_time_difference_in_seconds=$(expr $host_seconds_since_epoch - $device_seconds_since_epoch) if [ $abs_time_difference_in_seconds -lt 0 ]; then abs_time_difference_in_seconds=$(expr 0 - $abs_time_difference_in_seconds) fi seconds_per_hour=3600 # b/187295147 : Disable live-lock kill daemon. # It can confuse long running processes for issues and kill them. # This usually manifests as temporarily lost adb connection. msginfo "Killing llkd, seen killing adb" adb shell setprop ctl.stop llkd-0 adb shell setprop ctl.stop llkd-1 product_name=$(adb shell getprop ro.build.product) if [ "x$product_name" = xfugu ]; then # Kill logd first, so that when we set the adb buffer size later in this file, # it is brought up again. msginfo "Killing logd, seen leaking on fugu/N" adb shell pkill -9 -U logd logd && msginfo "...logd killed" fi # Update date on device if the difference with host is more than one hour. if [ $abs_time_difference_in_seconds -gt $seconds_per_hour ]; then msginfo "Update date on device" adb shell date -u @$host_seconds_since_epoch fi msginfo "Turn off selinux" adb shell setenforce 0 $verbose && adb shell getenforce msginfo "Setting local loopback" adb shell ifconfig lo up $verbose && adb shell ifconfig if $verbose; then msginfo "List properties" adb shell getprop msginfo "Uptime" adb shell uptime msginfo "Battery info" adb shell dumpsys battery fi # Fugu only handles buffer size up to 16MB. if [ "x$product_name" = xfugu ]; then buffer_size=16MB else buffer_size=32MB fi msginfo "Setting adb buffer size to ${buffer_size}" adb logcat -G ${buffer_size} $verbose && adb logcat -g msginfo "Removing adb spam filter" adb logcat -P "" $verbose && adb logcat -p msginfo "Kill stalled dalvikvm processes" # 'ps' on M can sometimes hang. timeout 5s adb shell "ps" >/dev/null if [[ $? == 124 ]] && [[ "$ART_TEST_RUN_ON_ARM_FVP" != true ]]; then msginfo "Rebooting device to fix 'ps'" adb reboot adb wait-for-device root else processes=$(adb shell "ps" | grep dalvikvm | awk '{print $2}') for i in $processes; do adb shell kill -9 $i; done fi # Chroot environment. # =================== if [[ -n "$ART_TEST_CHROOT" ]]; then # Prepare the chroot dir. msginfo "Prepare the chroot dir in $ART_TEST_CHROOT" # Check that ART_TEST_CHROOT is correctly defined. [[ "x$ART_TEST_CHROOT" = x/* ]] || { echo "$ART_TEST_CHROOT is not an absolute path"; exit 1; } # Create chroot. adb shell mkdir -p "$ART_TEST_CHROOT" # Provide property_contexts file(s) in chroot. # This is required to have Android system properties work from the chroot. # Notes: # - In Android N, only '/property_contexts' is expected. # - In Android O+, property_context files are expected under /system and /vendor. # (See bionic/libc/bionic/system_properties.cpp or # bionic/libc/system_properties/contexts_split.cpp for more information.) property_context_files="/property_contexts \ /system/etc/selinux/plat_property_contexts \ /vendor/etc/selinux/nonplat_property_context \ /plat_property_contexts \ /nonplat_property_contexts" for f in $property_context_files; do adb shell test -f "$f" \ "&&" mkdir -p "$ART_TEST_CHROOT$(dirname $f)" \ "&&" cp -f "$f" "$ART_TEST_CHROOT$f" done # Create directories required for ART testing in chroot. adb shell mkdir -p "$ART_TEST_CHROOT/tmp" adb shell mkdir -p "$ART_TEST_CHROOT/data/dalvik-cache" adb shell mkdir -p "$ART_TEST_CHROOT/data/local/tmp" # Populate /etc in chroot with required files. adb shell mkdir -p "$ART_TEST_CHROOT/system/etc" adb shell test -L "$ART_TEST_CHROOT/etc" \ || adb shell ln -s system/etc "$ART_TEST_CHROOT/etc" # Provide /proc in chroot. adb shell mkdir -p "$ART_TEST_CHROOT/proc" adb shell mount | grep -q "^proc on $ART_TEST_CHROOT/proc type proc " \ || adb shell mount -t proc proc "$ART_TEST_CHROOT/proc" # Provide /sys in chroot. adb shell mkdir -p "$ART_TEST_CHROOT/sys" adb shell mount | grep -q "^sysfs on $ART_TEST_CHROOT/sys type sysfs " \ || adb shell mount -t sysfs sysfs "$ART_TEST_CHROOT/sys" # Provide /sys/kernel/debug in chroot. adb shell mount | grep -q "^debugfs on $ART_TEST_CHROOT/sys/kernel/debug type debugfs " \ || adb shell mount -t debugfs debugfs "$ART_TEST_CHROOT/sys/kernel/debug" # Provide /sys/kernel/tracing in chroot. Using a bind mount is important, # otherwise mounting tracefs multiple times confuses the # android.hardware.atrace service. adb shell mount | grep -q "^tracefs on $ART_TEST_CHROOT/sys/kernel/tracing type tracefs " \ || adb shell mount -o bind /sys/kernel/tracing "$ART_TEST_CHROOT/sys/kernel/tracing" # Provide /dev in chroot. adb shell mkdir -p "$ART_TEST_CHROOT/dev" adb shell mount | grep -q "^tmpfs on $ART_TEST_CHROOT/dev type tmpfs " \ || adb shell mount -o bind /dev "$ART_TEST_CHROOT/dev" adb shell mount | grep -q "^devpts on $ART_TEST_CHROOT/dev/pts type devpts " \ || adb shell mount -o bind /dev/pts "$ART_TEST_CHROOT/dev/pts" adb shell mount | grep -q " on $ART_TEST_CHROOT/dev/cpuset type cgroup " \ || adb shell mount -o bind /dev/cpuset "$ART_TEST_CHROOT/dev/cpuset" # Create /apex directory in chroot. adb shell mkdir -p "$ART_TEST_CHROOT/apex" # Create /linkerconfig directory in chroot. adb shell mkdir -p "$ART_TEST_CHROOT/linkerconfig" # Create /bin symlink for shebang compatibility. adb shell test -L "$ART_TEST_CHROOT/bin" \ || adb shell ln -s system/bin "$ART_TEST_CHROOT/bin" fi