No description
Find a file
Tianjie Xu 980f92ec00 InstallPackage now takes a package as parameter
Therefore InstallPackage() doesn't need to worry about the details of a
given Package.

Bug: 127071893
Test: run update from /bin/recovery --update_package=@path, sideload a package
Change-Id: I0caa36785b43924f884ee398e7ea640d7472a92e
2019-06-13 13:36:56 -07:00
applypatch Move off the Next ZipString overload. 2019-05-22 18:52:29 -07:00
boot_control Build boot control HAL with Android.bp 2018-08-09 22:15:01 -07:00
bootloader_message Add misc_writer. 2019-05-20 15:51:26 -07:00
edify Add UpdaterRuntime class 2019-05-20 18:03:27 -07:00
etc Start charger at /system/bin/charger. 2018-09-14 15:52:29 -07:00
fastboot recovery: report compliant reboot reason (Part Deux) 2019-05-23 13:58:53 -07:00
fonts more font improvements and cleanup 2013-03-07 13:34:24 -08:00
fuse_sideload Implement FuseBlockDataProvider 2019-05-01 12:09:38 -07:00
install InstallPackage now takes a package as parameter 2019-06-13 13:36:56 -07:00
minadbd minadbd: Support adb rescue getprop. 2019-06-04 15:09:41 -07:00
minui matches_locale no longer accept empty locales in the png file 2019-04-22 15:32:17 -07:00
misc_writer Add misc_writer. 2019-05-20 15:51:26 -07:00
otautil Implement an update simulator to verify BB OTA packages on host 2019-05-28 15:18:25 -07:00
recovery_ui recovery: report compliant reboot reason (Part Deux) 2019-05-23 13:58:53 -07:00
res-hdpi/images Add a logo to the fastbootd screen. 2019-02-11 19:22:03 -08:00
res-mdpi/images Add a logo to the fastbootd screen. 2019-02-11 19:22:03 -08:00
res-xhdpi/images Add a logo to the fastbootd screen. 2019-02-11 19:22:03 -08:00
res-xxhdpi/images Add a logo to the fastbootd screen. 2019-02-11 19:22:03 -08:00
res-xxxhdpi/images Add a logo to the fastbootd screen. 2019-02-11 19:22:03 -08:00
tests Implement an update simulator to verify BB OTA packages on host 2019-05-28 15:18:25 -07:00
tools Use icu4j instead of its deprecated legacy alias icu4j-host 2019-06-03 16:14:35 +01:00
uncrypt Add android::fs_mgr namespace for new Fstab code 2019-01-31 09:00:40 -08:00
update_verifier Append -verity when looking for verity device-mapper names. 2019-04-01 17:13:11 -07:00
updater Disable building simulator for mac 2019-05-30 10:49:18 -07:00
updater_sample Updater updater_sample/README.md - build instructions. 2019-02-25 16:19:55 -08:00
.clang-format Document the clang-format usage. 2018-05-10 13:12:59 -07:00
Android.bp Move wipe cache|data to libinstall 2019-04-15 12:22:11 -07:00
Android.mk e2fsck_static is no longer needed for remount 2019-01-16 23:42:55 +00:00
bootloader.h Create bootloader_message static library. 2016-06-30 11:02:38 -07:00
CleanSpec.mk tests: Merge recovery_component_test into recovery_unit_test. 2019-04-30 09:13:36 -07:00
common.h recovery: Remove SetUsbConfig() out of common.h. 2019-03-29 15:54:02 -07:00
fsck_unshare_blocks.cpp roots: Remove get_system_root and logical_partitions_mapped. 2019-05-10 10:42:56 -07:00
fsck_unshare_blocks.h recovery: add --fsck_unshare_blocks option for adb remount 2018-05-30 13:24:30 -07:00
interlace-frames.py Go back to the old ear-wiggling Android animation. 2016-04-21 14:26:14 -07:00
NOTICE Automated import from //branches/master/...@140824,140824 2009-03-24 18:36:42 -07:00
OWNERS Fix owner email address. 2017-10-12 10:45:04 -07:00
PREUPLOAD.cfg Add tools/ to the style-checking path. 2018-11-06 11:27:13 -08:00
README.md tests: Merge recovery_component_test into recovery_unit_test. 2019-04-30 09:13:36 -07:00
recovery-persist.cpp Move wipe cache|data to libinstall 2019-04-15 12:22:11 -07:00
recovery-persist.rc recovery: reduce overall boot time 2017-09-18 13:55:32 -07:00
recovery-refresh.cpp Move wipe cache|data to libinstall 2019-04-15 12:22:11 -07:00
recovery-refresh.rc recovery: reduce overall boot time 2017-09-18 13:55:32 -07:00
recovery.cpp InstallPackage now takes a package as parameter 2019-06-13 13:36:56 -07:00
recovery.h Move librecovery_ui to a sub-directory 2019-03-21 10:46:11 -07:00
recovery_main.cpp recovery: report compliant reboot reason (Part Deux) 2019-05-23 13:58:53 -07:00
TEST_MAPPING tests: Merge recovery_component_test into recovery_unit_test. 2019-04-30 09:13:36 -07:00

The Recovery Image

Quick turn-around testing

mm -j && m ramdisk-nodeps && m recoveryimage-nodeps

# To boot into the new recovery image
# without flashing the recovery partition:
adb reboot bootloader
fastboot boot $ANDROID_PRODUCT_OUT/recovery.img

Running the tests

# After setting up environment and lunch.
mmma -j bootable/recovery

# Running the tests on device.
adb root
adb sync data

# 32-bit device
adb shell /data/nativetest/recovery_unit_test/recovery_unit_test

# Or 64-bit device
adb shell /data/nativetest64/recovery_unit_test/recovery_unit_test

Running the manual tests

recovery-refresh and recovery-persist executables exist only on systems without /cache partition. And we need to follow special steps to run tests for them.

  • Execute the test on an A/B device first. The test should fail but it will log some contents to pmsg.

  • Reboot the device immediately and run the test again. The test should save the contents of pmsg buffer into /data/misc/recovery/inject.txt. Test will pass if this file has expected contents.

Using adb under recovery

When running recovery image from debuggable builds (i.e. -eng or -userdebug build variants, or ro.debuggable=1 in /prop.default), adbd service is enabled and started by default, which allows adb communication. A device should be listed under adb devices, either in recovery or sideload state.

$ adb devices
List of devices attached
1234567890abcdef    recovery

Although /system/bin/adbd is built from the same code base as the one in the normal boot, only a subset of adb commands are meaningful under recovery, such as adb root, adb shell, adb push, adb pull etc. Since Android Q, adb shell no longer requires manually mounting /system from recovery menu.

Troubleshooting

adb devices doesn't show the device.

$ adb devices
List of devices attached
  • Ensure adbd is built and running.

By default, adbd is always included into recovery image, as /system/bin/adbd. init starts adbd service automatically only in debuggable builds. This behavior is controlled by the recovery specific /init.rc, whose source code is at bootable/recovery/etc/init.rc.

The best way to confirm a running adbd is by checking the serial output, which shows a service start log as below.

[   18.961986] c1      1 init: starting service 'adbd'...
  • Ensure USB gadget has been enabled.

If adbd service has been started but device not shown under adb devices, use lsusb(8) (on host) to check if the device is visible to the host.

bootable/recovery/etc/init.rc disables Android USB gadget (via sysfs) as part of the fs action trigger, and will only re-enable it in debuggable builds (the on property rule will always run after on fs).

on fs
    write /sys/class/android_usb/android0/enable 0

# Always start adbd on userdebug and eng builds
on property:ro.debuggable=1
    write /sys/class/android_usb/android0/enable 1
    start adbd

If device is using configfs, check if configfs has been properly set up in init rc scripts. See the example configuration for Pixel 2 devices. Note that the flag set via sysfs (i.e. the one above) is no-op when using configfs.

adb devices shows the device, but in unauthorized state.

$ adb devices
List of devices attached
1234567890abcdef    unauthorized

recovery image doesn't honor the USB debugging toggle and the authorizations added under normal boot (because such authorization data stays in /data, which recovery doesn't mount), nor does it support authorizing a host device under recovery. We can use one of the following options instead.

  • Option 1 (Recommended): Authorize a host device with adb vendor keys.

For debuggable builds, an RSA keypair can be used to authorize a host device that has the private key. The public key, defined via PRODUCT_ADB_KEYS, will be copied to /adb_keys. When starting the host-side adbd, make sure the filename (or the directory) of the matching private key has been added to $ADB_VENDOR_KEYS.

$ export ADB_VENDOR_KEYS=/path/to/adb/private/key
$ adb kill-server
$ adb devices

-user builds filter out PRODUCT_ADB_KEYS, so no /adb_keys will be included there.

Note that this mechanism applies to both of normal boot and recovery modes.

  • Option 2: Allow adbd to connect without authentication.
    • adbd is compiled with ALLOW_ADBD_NO_AUTH (only on debuggable builds).
    • ro.adb.secure has a value of 0.

Both of the two conditions need to be satisfied. Although ro.adb.secure is a runtime property, its value is set at build time (written into /prop.default). It defaults to 1 on -user builds, and 0 for other build variants. The value is overridable via PRODUCT_DEFAULT_PROPERTY_OVERRIDES.