commit | 47451cebab8dbceece048d6b263df1f1dfe3fad2 | [log] [tgz] |
---|---|---|
author | Paul Kirth <[email protected]> | Mon Jul 13 17:42:08 2020 +0000 |
committer | Paul Kirth <[email protected]> | Tue Aug 04 23:14:01 2020 +0000 |
tree | c263ea8b26757fe576378b5734d7f8ea382abce8 | |
parent | 1ca67409630ccb9e1f28763789e4862a9a4c7f7c [diff] |
Create common utilities for allocd clients/servers Adds utilities for sending and receiving data from SharedFds that checks for socket errors and logs failures. Also provides a set of convenience APIs for sending/receiving JSON mesages through a SharedFd. SendAll() API will send the entire contents of a string message on the provided socket. In case of error, the send operation will abort, and SendAll will return false. Similarly, RecvAll() Reads a string message of size 'count' on the provided socket. On failure, it returns an empty string, and on success it returns a new std::string with the sent message. Bug: 148823285 Test: make -j Change-Id: I0cefc74cb68bc3e489d7d10cdfbfa742e54b07d9
git clone https://github.com/google/android-cuttlefish cd android-cuttlefish debuild -i -us -uc -b sudo dpkg -i ../cuttlefish-common_*_amd64.deb sudo apt-get install -f
aosp-master
if you don‘t know what you’re looking foraosp_cf_x86_phone
and click on userdebug
for the latest buildArtifacts
aosp_cf_x86_phone-img-xxxxxx.zip
-- it will always have img
in the name. Download this filecvd-host_package.tar.gz
. You should always download a host package from the same build as your images.mkdir cf cd cf tar xvf /path/to/cvd-host_package.tar.gz unzip /path/to/aosp_cf_x86_phone-img-xxxxxx.zip
Launch cuttlefish with:
$ HOME=$PWD ./bin/launch_cvd
Stop cuttlefish with:
$ HOME=$PWD ./bin/stop_cvd
You can use adb
to debug it, just like a physical device:
$ ./bin/adb -e shell
You can use the TightVNC JViewer. Once you have downloaded the TightVNC Java Viewer JAR in a ZIP archive, run it with
$ java -jar tightvnc-jviewer.jar -ScalingFactor=50 -Tunneling=no -host=localhost -port=6444
Click “Connect” and you should see a lock screen!