Home
last modified time | relevance | path

Searched refs:recovery (Results 1 – 22 of 22) sorted by relevance

/bootable/recovery/
DAndroid.bp93 "recovery.cpp",
102 name: "recovery",
103 recovery: true,
124 "e2fsdroid.recovery",
127 "mke2fs.conf.recovery",
128 "mke2fs.recovery",
135 name: "recovery-persist",
142 "recovery-persist.cpp",
157 "recovery-persist.rc",
163 name: "recovery-refresh",
[all …]
DAndroid.mk47 librecovery_ui.recovery
61 make_f2fs.recovery \
62 sload_f2fs.recovery
70 LOCAL_REQUIRED_MODULES += recovery-persist
72 LOCAL_REQUIRED_MODULES += recovery-refresh
DREADME.md9 # To boot into the new recovery image
10 # without flashing the recovery partition:
12 fastboot boot $ANDROID_PRODUCT_OUT/recovery.img
17 mmma -j bootable/recovery
34 `recovery-refresh` and `recovery-persist` executables exist only on systems without
41 contents of pmsg buffer into /data/misc/recovery/inject.txt. Test will pass if
44 Using `adb` under recovery
47 When running recovery image from debuggable builds (i.e. `-eng` or `-userdebug` build variants, or
49 allows `adb` communication. A device should be listed under `adb devices`, either in `recovery` or
54 1234567890abcdef recovery
[all …]
Drecovery-persist.rc2 mkdir /data/misc/recovery 0770 system log
3 exec_background - system log -- /system/bin/recovery-persist
DCleanSpec.mk49 $(call add-clean-step, rm -rf $(PRODUCT_OUT)/recovery/root/sbin)
52 $(call add-clean-step, rm -rf $(PRODUCT_OUT)/recovery/root/system/lib64/libinstall.so)
Drecovery-refresh.rc2 exec_background - system log -- /system/bin/recovery-refresh
D.clang-format1 # bootable/recovery project uses repohook to apply `clang-format` to the changed lines, with the
13 # default behavior for bootable/recovery project.
Drecovery_main.cpp119 boot.recovery[sizeof(boot.recovery) - 1] = '\0'; // Ensure termination in get_args()
120 std::string boot_recovery(boot.recovery); in get_args()
128 } else if (boot.recovery[0] != 0) { in get_args()
/bootable/recovery/tests/component/
Dbootloader_message_test.cpp36 strlcpy(boot.recovery, "message1\nmessage2\n", sizeof(boot.recovery)); in TEST()
58 strlcpy(boot.recovery, "random message", sizeof(boot.recovery)); in TEST()
68 ASSERT_EQ(expected, std::string(boot.recovery)); in TEST()
86 ASSERT_EQ("recovery\n", std::string(boot.recovery)); in TEST()
108 ASSERT_GE(expected.size(), sizeof(boot.recovery)); in TEST()
112 ASSERT_EQ(expected.substr(0, sizeof(boot.recovery) - 1), std::string(boot.recovery)); in TEST()
113 ASSERT_EQ('\0', boot.recovery[sizeof(boot.recovery) - 1]); in TEST()
Dapplypatch_modes_test.cpp61 recovery = GetEmmcTargetString(recovery_file); in SetUp()
62 ASSERT_FALSE(recovery.empty()); in SetUp()
73 std::string recovery; member in ApplyPatchModesTest
184 ASSERT_EQ(0, InvokeApplyPatchModes({ "applypatch", "--check", recovery })); in TEST_F()
Duncrypt_test.cpp137 ASSERT_EQ(message_in_bcb, std::string(boot.recovery)); in SetupOrClearBcb()
140 ASSERT_LE(message_in_bcb.size(), sizeof(boot.recovery)); in SetupOrClearBcb()
141 size_t left = sizeof(boot.recovery) - message_in_bcb.size(); in SetupOrClearBcb()
142 ASSERT_EQ(std::string(left, '\0'), std::string(&boot.recovery[message_in_bcb.size()], left)); in SetupOrClearBcb()
/bootable/recovery/bootloader_message/
Dbootloader_message.cpp197 memset(boot->recovery, 0, sizeof(boot->recovery)); in update_bootloader_message_in_struct()
200 strlcpy(boot->recovery, "recovery\n", sizeof(boot->recovery)); in update_bootloader_message_in_struct()
202 strlcat(boot->recovery, s.c_str(), sizeof(boot->recovery)); in update_bootloader_message_in_struct()
204 strlcat(boot->recovery, "\n", sizeof(boot->recovery)); in update_bootloader_message_in_struct()
/bootable/recovery/tools/image_generator/
DImageGenerator.mf1 Main-Class: com.android.recovery.tools.ImageGenerator
DREADME.md5 under recovery mode. And thus we don't need to do the manual work by running
20 strings in xml format, e.g. bootable/recovery/tools/recovery_l10n/res/
DImageGenerator.java17 package com.android.recovery.tools;
/bootable/recovery/tests/manual/
Drecovery_test.cpp51 TEST(recovery, refresh) { in TEST() argument
69 TEST(recovery, persist) { in TEST() argument
/bootable/recovery/etc/
Dinit.rc1 import /init.recovery.${ro.hardware}.rc
80 service recovery /system/bin/recovery
81 socket recovery stream 422 system system
82 seclabel u:r:recovery:s0
84 service adbd /system/bin/adbd --root_seclabel=u:r:su:s0 --device_banner=recovery
/bootable/recovery/tools/recovery_l10n/
DREADME.md5 cd bootable/recovery && mma -j32
34 image works by running graphic tests under the recovery mode.
/bootable/recovery/bootloader_message/include/bootloader_message/
Dbootloader_message.h67 char recovery[768]; member
/bootable/recovery/minadbd/
DAndroid.bp65 recovery: true,
/bootable/recovery/tests/
DAndroid.bp23 "bootable/recovery",
/bootable/recovery/updater_sample/
DREADME.md164 1. Compile the app `mmma -j bootable/recovery/updater_sample`.