commit | 467e96a843212338e0f51a08f31e360d8b012f40 | [log] [tgz] |
---|---|---|
author | Bowgo Tsai <[email protected]> | Mon Feb 22 11:15:14 2021 +0800 |
committer | Bowgo Tsai <[email protected]> | Mon Feb 22 03:21:30 2021 +0000 |
tree | a7ada648915741896b8de0eea6df930b5a0b4298 | |
parent | 24db1d7cde6643c1ebd1af2e68504cbbd2fbfeb2 [diff] |
Use sha256 to build the hashtree in avb image Similar to I9f1d3bcf241bc65adf10376cc5ae7ab1986216fa, which enables sha256 for Pixel devices, we should do the same thing for CuttleFish. Bug: 178983355 Test: `adb -s 0.0.0.0:6520 shell dmctl list devices -v | grep sha`, and checks sha256 is used for dm-verity partitions. Change-Id: I60eec09432a963c6ce6071cf474c72cd567aaa41
Make sure virtualization with KVM is available.
grep -c -w "vmx\|svm" /proc/cpuinfo
This should return a non-zero value. If running on a cloud machine, this may take cloud-vendor-specific steps to enable. For Google Compute Engine specifically, see the GCE guide.
Download, build, and install the host debian package:
git clone https://github.com/google/android-cuttlefish cd android-cuttlefish debuild -i -us -uc -b sudo dpkg -i ../cuttlefish-common_*_amd64.deb || sudo apt-get install -f sudo reboot
The reboot will trigger installing additional kernel modules and applying udev rules.
Go to http://ci.android.com/
Enter a branch name. Start with aosp-master
if you don‘t know what you’re looking for
Navigate to aosp_cf_x86_phone
and click on userdebug
for the latest build
Click on Artifacts
Scroll down to the OTA images. These packages look like aosp_cf_x86_phone-img-xxxxxx.zip
-- it will always have img
in the name. Download this file
Scroll down to cvd-host_package.tar.gz
. You should always download a host package from the same build as your images.
On your local system, combine the packages:
mkdir cf cd cf tar xvf /path/to/cvd-host_package.tar.gz unzip /path/to/aosp_cf_x86_phone-img-xxxxxx.zip
Launch cuttlefish with:
$ HOME=$PWD ./bin/launch_cvd
$ HOME=$PWD ./bin/stop_cvd
You can use adb
to debug it, just like a physical device:
$ ./bin/adb -e shell
You can use the TightVNC JViewer. Once you have downloaded the TightVNC Java Viewer JAR in a ZIP archive, run it with
$ java -jar tightvnc-jviewer.jar -ScalingFactor=50 -Tunneling=no -host=localhost -port=6444
Click “Connect” and you should see a lock screen!