In the previous two articles, described the compilation of Android source code and kernel source code, this article based on the previous, not clear please first move:
Source code Compilation
Kernel compilation
---------------------------------------------------------------------------------------------
After the emulator has been started with the following command:
Export path= $PATH:/usr/local/android/android2.3.7/out/host/linux-x86/bin
Export Android_product_out=/usr/local/android/android_2.3.7/out/target/product/generic
Emulator-kernel./kernel/private_guo/kernel/arch/arm/boot/zimage
How do we use the ADB to connect to our simulator? In fact, the above command can be slightly modified:
Emulator-kernel./kernel/private_guo/kernel/arch/arm/boot/zimage &
This,& is intended to allow the emulator to run in the background so that we can use the ADB command to connect to the emulator at the same terminal.
In general, the SDK will have the ADB command, in fact, our compiled source has provided the command in: Android/out/host/linux-x86/bin, we in the above command, in the current shell set the location of the environment variables, So you can use it directly.
1. View the settings and emulator of the connection, 5554 is the emulator I'm starting now
2. The emulator can then be connected
3. You can do a lot of things after connecting, such as viewing the kernel version.
Because when I started, I used to compile my own kernel source code, compile, the use of the ARM-EABI-GCC is 4.4.3 version. See the kernel compilation for this specific
4. You can also view the CPU architecture. When compiling the kernel, if the CPU architecture version is arm V5, the Goldfish_defconfig file is used, and if the arm V7 version is used, the Goldfish_armv7_defconfig file is used. This can also be found in kernel compilation.
For the above view kernel version and cup architecture version, are under the/proc folder, of course, there are many things to do, such as delete password lock and so on.
5. Delete the lock screen password, I then set the password lock on the emulator, and then enter the/data/system directory:
Can see Gesture.key is the password lock file, as long as the file deleted, password lock is not valid, if you are connected to the real machine, then the device must be root.
That's it, so it's still a bit worse to feel Android's security. When we connect to the device shell and get root privileges, then we are omnipotent God!
To exit the current device connection, enter it directly in the root directory: Exit. So you can go back to Ubuntu.
Use ADB to connect to Android emulator under Linux to view kernel version, CPU architecture version, delete password lock