Home | History | Annotate | only in /bootable/recovery
Up to higher level directory
NameDateSize
.clang-format22-Oct-20201.6K
Android.bp22-Oct-20203.4K
Android.mk22-Oct-20202.6K
applypatch/22-Oct-2020
boot_control/22-Oct-2020
bootloader.h22-Oct-2020775
bootloader_message/22-Oct-2020
CleanSpec.mk22-Oct-20202.6K
common.h22-Oct-20201.1K
edify/22-Oct-2020
etc/22-Oct-2020
fastboot/22-Oct-2020
fonts/22-Oct-2020
fsck_unshare_blocks.cpp22-Oct-20204.1K
fsck_unshare_blocks.h22-Oct-2020738
fuse_sideload/22-Oct-2020
install/22-Oct-2020
interlace-frames.py22-Oct-20203.5K
minadbd/22-Oct-2020
minui/22-Oct-2020
misc_writer/22-Oct-2020
NOTICE22-Oct-202010.4K
otautil/22-Oct-2020
OWNERS22-Oct-202051
PREUPLOAD.cfg22-Oct-2020336
README.md22-Oct-20205.2K
recovery-persist.cpp22-Oct-20206.5K
recovery-persist.rc22-Oct-2020127
recovery-refresh.cpp22-Oct-20202.6K
recovery-refresh.rc22-Oct-202076
recovery.cpp22-Oct-202034.8K
recovery.h22-Oct-2020797
recovery_main.cpp22-Oct-202016.9K
recovery_ui/22-Oct-2020
res-hdpi/22-Oct-2020
res-mdpi/22-Oct-2020
res-xhdpi/22-Oct-2020
res-xxhdpi/22-Oct-2020
res-xxxhdpi/22-Oct-2020
tests/22-Oct-2020
tools/22-Oct-2020
uncrypt/22-Oct-2020
update_verifier/22-Oct-2020
updater/22-Oct-2020
updater_sample/22-Oct-2020

README.md

      1 The Recovery Image
      2 ==================
      3 
      4 Quick turn-around testing
      5 -------------------------
      6 
      7     mm -j && m ramdisk-nodeps && m recoveryimage-nodeps
      8 
      9     # To boot into the new recovery image
     10     # without flashing the recovery partition:
     11     adb reboot bootloader
     12     fastboot boot $ANDROID_PRODUCT_OUT/recovery.img
     13 
     14 Running the tests
     15 -----------------
     16     # After setting up environment and lunch.
     17     mmma -j bootable/recovery
     18 
     19     # Running the tests on device.
     20     adb root
     21     adb sync data
     22 
     23     # 32-bit device
     24     adb shell /data/nativetest/recovery_unit_test/recovery_unit_test
     25     adb shell /data/nativetest/recovery_component_test/recovery_component_test
     26 
     27     # Or 64-bit device
     28     adb shell /data/nativetest64/recovery_unit_test/recovery_unit_test
     29     adb shell /data/nativetest64/recovery_component_test/recovery_component_test
     30 
     31 Running the manual tests
     32 ------------------------
     33 
     34 `recovery-refresh` and `recovery-persist` executables exist only on systems without
     35 /cache partition. And we need to follow special steps to run tests for them.
     36 
     37 - Execute the test on an A/B device first. The test should fail but it will log
     38   some contents to pmsg.
     39 
     40 - Reboot the device immediately and run the test again. The test should save the
     41   contents of pmsg buffer into /data/misc/recovery/inject.txt. Test will pass if
     42   this file has expected contents.
     43 
     44 Using `adb` under recovery
     45 --------------------------
     46 
     47 When running recovery image from debuggable builds (i.e. `-eng` or `-userdebug` build variants, or
     48 `ro.debuggable=1` in `/prop.default`), `adbd` service is enabled and started by default, which
     49 allows `adb` communication. A device should be listed under `adb devices`, either in `recovery` or
     50 `sideload` state.
     51 
     52     $ adb devices
     53     List of devices attached
     54     1234567890abcdef    recovery
     55 
     56 Although `/system/bin/adbd` is built from the same code base as the one in the normal boot, only a
     57 subset of `adb` commands are meaningful under recovery, such as `adb root`, `adb shell`, `adb push`,
     58 `adb pull` etc. Since Android Q, `adb shell` no longer requires manually mounting `/system` from
     59 recovery menu.
     60 
     61 ## Troubleshooting
     62 
     63 ### `adb devices` doesn't show the device.
     64 
     65     $ adb devices
     66     List of devices attached
     67 
     68  * Ensure `adbd` is built and running.
     69 
     70 By default, `adbd` is always included into recovery image, as `/system/bin/adbd`. `init` starts
     71 `adbd` service automatically only in debuggable builds. This behavior is controlled by the recovery
     72 specific `/init.rc`, whose source code is at `bootable/recovery/etc/init.rc`.
     73 
     74 The best way to confirm a running `adbd` is by checking the serial output, which shows a service
     75 start log as below.
     76 
     77     [   18.961986] c1      1 init: starting service 'adbd'...
     78 
     79  * Ensure USB gadget has been enabled.
     80 
     81 If `adbd` service has been started but device not shown under `adb devices`, use `lsusb(8)` (on
     82 host) to check if the device is visible to the host.
     83 
     84 `bootable/recovery/etc/init.rc` disables Android USB gadget (via sysfs) as part of the `fs` action
     85 trigger, and will only re-enable it in debuggable builds (the `on property` rule will always run
     86 _after_ `on fs`).
     87 
     88     on fs
     89         write /sys/class/android_usb/android0/enable 0
     90 
     91     # Always start adbd on userdebug and eng builds
     92     on property:ro.debuggable=1
     93         write /sys/class/android_usb/android0/enable 1
     94         start adbd
     95 
     96 If device is using [configfs](https://www.kernel.org/doc/Documentation/usb/gadget_configfs.txt),
     97 check if configfs has been properly set up in init rc scripts. See the [example
     98 configuration](https://android.googlesource.com/device/google/wahoo/+/master/init.recovery.hardware.rc)
     99 for Pixel 2 devices. Note that the flag set via sysfs (i.e. the one above) is no-op when using
    100 configfs.
    101 
    102 ### `adb devices` shows the device, but in `unauthorized` state.
    103 
    104     $ adb devices
    105     List of devices attached
    106     1234567890abcdef    unauthorized
    107 
    108 recovery image doesn't honor the USB debugging toggle and the authorizations added under normal boot
    109 (because such authorization data stays in /data, which recovery doesn't mount), nor does it support
    110 authorizing a host device under recovery. We can use one of the following options instead.
    111 
    112  * **Option 1 (Recommended):** Authorize a host device with adb vendor keys.
    113 
    114 For debuggable builds, an RSA keypair can be used to authorize a host device that has the private
    115 key. The public key, defined via `PRODUCT_ADB_KEYS`, will be copied to `/adb_keys`. When starting
    116 the host-side `adbd`, make sure the filename (or the directory) of the matching private key has been
    117 added to `$ADB_VENDOR_KEYS`.
    118 
    119     $ export ADB_VENDOR_KEYS=/path/to/adb/private/key
    120     $ adb kill-server
    121     $ adb devices
    122 
    123 `-user` builds filter out `PRODUCT_ADB_KEYS`, so no `/adb_keys` will be included there.
    124 
    125 Note that this mechanism applies to both of normal boot and recovery modes.
    126 
    127  * **Option 2:** Allow `adbd` to connect without authentication.
    128    * `adbd` is compiled with `ALLOW_ADBD_NO_AUTH` (only on debuggable builds).
    129    * `ro.adb.secure` has a value of `0`.
    130 
    131 Both of the two conditions need to be satisfied. Although `ro.adb.secure` is a runtime property, its
    132 value is set at build time (written into `/prop.default`). It defaults to `1` on `-user` builds, and
    133 `0` for other build variants. The value is overridable via `PRODUCT_DEFAULT_PROPERTY_OVERRIDES`.
    134