commit | 1d110d82eaf08ace9c754e581c9325e9eaf98d36 | [log] [tgz] |
---|---|---|
author | A. Cody Schuffelen <schuffelen@google.com> | Fri Oct 09 17:53:41 2020 -0700 |
committer | A. Cody Schuffelen <schuffelen@google.com> | Fri Oct 09 17:56:21 2020 -0700 |
tree | 34f2e9bc7104f5cfb4c7c2ebb0b103ed5d85a68e | |
parent | f2f481d786befd8e4049725304486082d5a3b4f2 [diff] |
Remove code disabling the sandbox when the bootloader is enabled. This code had no effect, because it was updating FLAGS_enable_sandbox after FLAGS_enable_sandbox was copied into the config object. Test: launch_cvd --use_bootloader=true --enable_sandbox=true Change-Id: Ie0df43ff440a0bcde150b57721cb47a040d3805b
Make sure virtualization with KVM is available.
grep -c -w "vmx\|svm" /proc/cpuinfo
This should return a non-zero value. If running on a cloud machine, this may take cloud-vendor-specific steps to enable. For Google Compute Engine specifically, see the GCE guide.
Download, build, and install the host debian package:
git clone https://github.com/google/android-cuttlefish cd android-cuttlefish debuild -i -us -uc -b sudo dpkg -i ../cuttlefish-common_*_amd64.deb || sudo apt-get install -f sudo reboot
The reboot will trigger installing additional kernel modules and applying udev rules.
Go to http://ci.android.com/
Enter a branch name. Start with aosp-master
if you don't know what you're looking for
Navigate to aosp_cf_x86_phone
and click on userdebug
for the latest build
Click on Artifacts
Scroll down to the OTA images. These packages look like aosp_cf_x86_phone-img-xxxxxx.zip
-- it will always have img
in the name. Download this file
Scroll down to cvd-host_package.tar.gz
. You should always download a host package from the same build as your images.
On your local system, combine the packages:
mkdir cf cd cf tar xvf /path/to/cvd-host_package.tar.gz unzip /path/to/aosp_cf_x86_phone-img-xxxxxx.zip
Launch cuttlefish with:
$ HOME=$PWD ./bin/launch_cvd
$ HOME=$PWD ./bin/stop_cvd
You can use adb
to debug it, just like a physical device:
$ ./bin/adb -e shell
You can use the TightVNC JViewer. Once you have downloaded the TightVNC Java Viewer JAR in a ZIP archive, run it with
$ java -jar tightvnc-jviewer.jar -ScalingFactor=50 -Tunneling=no -host=localhost -port=6444
Click "Connect" and you should see a lock screen!