No description
Find a file
Kelvin Zhang c031e9d3d1 Fix sticky rescue party boot
When entering recovery via rescue party, recovery does not call
FinishRecovery() to reset BCB. This causes the rescue party command to
stick, and device keeps rebooting into rescue party mode after entering
bootloader mode and reboot.

Test: enter rescue party, reboot bootloader, fastboot reboot
Bug: 332621855
Change-Id: I958a77ccb2433d76aecb44f8c6f8fedebe08bbe0
2024-04-05 09:28:58 -07:00
applypatch Use the hermetic gzip instead of minigzip. 2023-06-21 10:10:42 -07:00
bootloader_message misctrl: use libbase combined logging 2024-02-21 22:44:48 +00:00
edify Add missing header include to libedify 2021-12-20 15:41:06 -08:00
etc Merge "Explicit init .rc user." 2023-04-24 18:19:00 +00:00
fastboot Fix removal of fastbootd logo for wear 2023-11-08 14:15:52 -08:00
fonts more font improvements and cleanup 2013-03-07 13:34:24 -08:00
fuse_sideload Fix non-ab fuse ota fail bug 2022-03-01 16:40:40 +08:00
install Check for build-tags before installing sideload OTA 2024-03-26 15:55:08 -07:00
minadbd Update recovery to use Health AIDL HAL V3. 2023-11-17 20:39:19 -08:00
minui support wrist orientation in recovery/fastbootd 2023-11-14 09:46:38 +01:00
otautil Fix memory leak in OTA verifier code 2022-05-25 14:05:48 -07:00
recovery_ui support wrist orientation in recovery/fastbootd 2023-11-14 09:46:38 +01:00
recovery_utils Reland "Only format /data in recovery if user specified a new fstype" 2024-01-13 13:51:57 -08:00
res-hdpi/images Add a logo to the fastbootd screen. 2019-02-11 19:22:03 -08:00
res-mdpi/images Add a logo to the fastbootd screen. 2019-02-11 19:22:03 -08:00
res-xhdpi/images Add a logo to the fastbootd screen. 2019-02-11 19:22:03 -08:00
res-xxhdpi/images Add a logo to the fastbootd screen. 2019-02-11 19:22:03 -08:00
res-xxxhdpi/images Add a logo to the fastbootd screen. 2019-02-11 19:22:03 -08:00
tests Fix connect() retry loop. 2024-03-19 01:42:58 +00:00
tools Import translations. DO NOT MERGE ANYWHERE 2023-08-30 19:25:13 -07:00
uncrypt Explicit init .rc user. 2023-04-14 16:12:23 +00:00
update_verifier Merge "recovery: Fix old reference to libsnapshot_snapuserd." into main 2023-08-04 20:14:54 +00:00
updater Fix the problem of incremental OTA upgrade failure (recovery part) 2024-01-08 20:19:35 +00:00
updater_sample updater_sample: tools: import AbOtaPropertyFiles from ota_utils 2023-12-05 09:10:27 +01:00
.clang-format Add add_slot_suffix function. 2020-05-19 15:20:14 -07:00
Android.bp Update recovery to use Health AIDL HAL V3. 2023-11-17 20:39:19 -08:00
Android.mk Add erofs tools in recovery mode 2021-12-03 19:37:56 +00:00
bootloader.h Create bootloader_message static library. 2016-06-30 11:02:38 -07:00
CleanSpec.mk Moving recovery resources from /system to /vendor 2019-10-04 00:04:56 +00:00
interlace-frames.py Go back to the old ear-wiggling Android animation. 2016-04-21 14:26:14 -07:00
METADATA Reclassify OFL as notice per cl/537072410 2023-06-01 22:11:19 +00:00
NOTICE Automated import from //branches/master/...@140824,140824 2009-03-24 18:36:42 -07:00
OWNERS Remove enh from OWNERS. 2021-09-23 14:03:55 -07:00
PREUPLOAD.cfg Warn on repo upload if you're not uploading to AOSP master. 2021-09-23 14:02:10 -07:00
README.md Stop mentioning about ALLOW_ADBD_NO_AUTH 2023-03-08 16:00:37 +00:00
recovery-persist.cpp Rotate logs on every boot 2023-05-30 06:39:56 -07:00
recovery-persist.rc recovery: reduce overall boot time 2017-09-18 13:55:32 -07:00
recovery-refresh.cpp otautil: Factor out the utils that're private to recovery. 2019-10-02 10:56:46 -07:00
recovery-refresh.rc recovery: reduce overall boot time 2017-09-18 13:55:32 -07:00
recovery.cpp Fix sticky rescue party boot 2024-04-05 09:28:58 -07:00
recovery.h Move librecovery_ui to a sub-directory 2019-03-21 10:46:11 -07:00
recovery_main.cpp recovery: Update logo after going back to recovery 2024-03-11 16:25:56 +01:00
TEST_MAPPING Clean up TEST_MAPPING after default update 2021-02-11 04:32:26 +00:00

The Recovery Image

Quick turn-around testing

  • Devices using recovery-as-boot (e.g. Pixels, which set BOARD_USES_RECOVERY_AS_BOOT)

    # After setting up environment and lunch.
    m -j bootimage
    adb reboot bootloader
    
    # Pixel devices don't support booting into recovery mode with `fastboot boot`.
    fastboot flash boot
    
    # Manually choose `Recovery mode` from bootloader menu.
    
  • Devices with a separate recovery image (e.g. Nexus)

    # After setting up environment and lunch.
    mm -j && m ramdisk-nodeps && m recoveryimage-nodeps
    adb reboot bootloader
    
    # To boot into the new recovery image without flashing the recovery partition:
    fastboot boot $ANDROID_PRODUCT_OUT/recovery.img
    

Running the tests

# After setting up environment and lunch.
mmma -j bootable/recovery

# Running the tests on device (under normal boot).
adb root
adb sync data

# 32-bit device
adb shell /data/nativetest/recovery_unit_test/recovery_unit_test

# Or 64-bit device
adb shell /data/nativetest64/recovery_unit_test/recovery_unit_test

Running the manual tests

recovery-refresh and recovery-persist executables exist only on systems without /cache partition. And we need to follow special steps to run tests for them.

  • Execute the test on an A/B device first. The test should fail but it will log some contents to pmsg.

  • Reboot the device immediately and run the test again. The test should save the contents of pmsg buffer into /data/misc/recovery/inject.txt. Test will pass if this file has expected contents.

Using adb under recovery

When running recovery image from debuggable builds (i.e. -eng or -userdebug build variants, or ro.debuggable=1 in /prop.default), adbd service is enabled and started by default, which allows adb communication. A device should be listed under adb devices, either in recovery or sideload state.

$ adb devices
List of devices attached
1234567890abcdef    recovery

Although /system/bin/adbd is built from the same code base as the one in the normal boot, only a subset of adb commands are meaningful under recovery, such as adb root, adb shell, adb push, adb pull etc. Since Android Q, adb shell no longer requires manually mounting /system from recovery menu.

Troubleshooting

adb devices doesn't show the device.

$ adb devices
List of devices attached
  • Ensure adbd is built and running.

By default, adbd is always included into recovery image, as /system/bin/adbd. init starts adbd service automatically only in debuggable builds. This behavior is controlled by the recovery specific /init.rc, whose source code is at bootable/recovery/etc/init.rc.

The best way to confirm a running adbd is by checking the serial output, which shows a service start log as below.

[   18.961986] c1      1 init: starting service 'adbd'...
  • Ensure USB gadget has been enabled.

If adbd service has been started but device not shown under adb devices, use lsusb(8) (on host) to check if the device is visible to the host.

bootable/recovery/etc/init.rc disables Android USB gadget (via sysfs) as part of the fs action trigger, and will only re-enable it in debuggable builds (the on property rule will always run after on fs).

on fs
    write /sys/class/android_usb/android0/enable 0

# Always start adbd on userdebug and eng builds
on property:ro.debuggable=1
    write /sys/class/android_usb/android0/enable 1
    start adbd

If device is using configfs, check if configfs has been properly set up in init rc scripts. See the example configuration for Pixel 2 devices. Note that the flag set via sysfs (i.e. the one above) is no-op when using configfs.

adb devices shows the device, but in unauthorized state.

$ adb devices
List of devices attached
1234567890abcdef    unauthorized

recovery image doesn't honor the USB debugging toggle and the authorizations added under normal boot (because such authorization data stays in /data, which recovery doesn't mount), nor does it support authorizing a host device under recovery. We can use one of the following options instead.

  • Option 1 (Recommended): Authorize a host device with adb vendor keys.

For debuggable builds, an RSA keypair can be used to authorize a host device that has the private key. The public key, defined via PRODUCT_ADB_KEYS, will be copied to /adb_keys. When starting the host-side adbd, make sure the filename (or the directory) of the matching private key has been added to $ADB_VENDOR_KEYS.

$ export ADB_VENDOR_KEYS=/path/to/adb/private/key
$ adb kill-server
$ adb devices

-user builds filter out PRODUCT_ADB_KEYS, so no /adb_keys will be included there.

Note that this mechanism applies to both of normal boot and recovery modes.

  • Option 2: Allow adbd to connect without authentication.
    • bootloader is unlocked (ro.boot.verifiedbootstate is orange) or debuggable build.
    • ro.adb.secure has a value of 0.

Both of the two conditions need to be satisfied. Although ro.adb.secure is a runtime property, its value is set at build time (written into /prop.default). It defaults to 1 on -user builds, and 0 for other build variants. The value is overridable via PRODUCT_DEFAULT_PROPERTY_OVERRIDES.

Localization of the background texts

The recovery image supports localization of several background texts, e.g. installing, error, factory reset warnings, etc. For devices using xxhdpi and xxxhdpi, the build system generates these localization images dynamically since android-10 when building the recovery image. While the static images under res-*dpi/images/ is used for other display resolutions and as a backup.

Check the invocation of the image_generator tool in the makefile. And the detailed usage of the image_generator is documented here.