commit | 500637484bd7f25489036a9ac9520a18d16d7c2b | [log] [tgz] |
---|---|---|
author | Alistair Delva <adelva@google.com> | Tue May 12 16:44:44 2020 -0700 |
committer | Alistair Delva <adelva@google.com> | Tue May 12 17:07:08 2020 -0700 |
tree | b27877833762f61ee8bda3b22e2fcb43a00f4158 | |
parent | 69a8779646d416a43fa701e508ebf2c1c490aed4 [diff] |
Avoid denial on dumpstate Cuttlefish uses a reference implementation of the neural networking HAL called hal_neuralnetworks_sample, which is not included in public sepolicy. This means when the dumpstate call is made to the server process, it generates a denial. This should fix failures with the CTS test: android.security.cts.SELinuxHostTest#testNoBugreportDenials Bug: 156418420 Change-Id: I2b1303192d3c98f2e092fc09588d11399ec0e168
git clone https://github.com/google/android-cuttlefish cd android-cuttlefish debuild -i -us -uc -b sudo dpkg -i ../cuttlefish-common_*_amd64.deb sudo apt-get install -f
aosp-master
if you don't know what you're looking foraosp_cf_x86_phone
and click on userdebug
for the latest buildArtifacts
aosp_cf_x86_phone-img-xxxxxx.zip
-- it will always have img
in the name. Download this filecvd-host_package.tar.gz
. You should always download a host package from the same build as your images.mkdir cf cd cf tar xvf /path/to/cvd-host_package.tar.gz unzip /path/to/aosp_cf_x86_phone-img-xxxxxx.zip
Launch cuttlefish with:
$ HOME=$PWD ./bin/launch_cvd
Stop cuttlefish with:
$ HOME=$PWD ./bin/stop_cvd
You can use adb
to debug it, just like a physical device:
$ ./bin/adb -e shell
You can use the TightVNC JViewer. Once you have downloaded the TightVNC Java Viewer JAR in a ZIP archive, run it with
$ java -jar tightvnc-jviewer.jar -ScalingFactor=50 -Tunneling=no -host=localhost -port=6444
Click "Connect" and you should see a lock screen!