Ok, i know it is advised to do a fresh wipe for android version updates but is it absolutely necessary?
Android 13 Security Release Notes
Published August 1, 2022 | Updated August 10, 2022
This Android Security Release Notes contains details of security vulnerabilities affecting Android devices which are addressed as part of Android 13. Android 13 devices with a security patch level of 2022-09-01 or later are protected against these issues (Android 13, as released on AOSP, will have a default security patch level of 2022-09-01). To learn how to check a device's security patch level, see Check and update your Android version.
Android partners are notified of all issues prior to publication. Source code patches for these issues will be released to the Android Open Source Project (AOSP) repository as part of the Android 13 release.
The severity assessment of issues in these release notes are based on the effect that exploiting the vulnerability would possibly have on an affected device, assuming the platform and service mitigations are turned off for development purposes or if successfully bypassed.
We have had no reports of active customer exploitation or abuse of these newly reported issues. Refer to the Android and Google Play Protect mitigations section for details on the Android security platform protections and Google Play Protect, which improve the security of the Android platform.
Announcements
- The issues described in this document are addressed as part of Android 13. This information is provided for reference and transparency.
- We would like to acknowledge and thank the security research community for their continued contributions towards securing the Android ecosystem.
Android and Google service mitigations
This is a summary of the mitigations provided by the Android security platform and service protections such as Google Play Protect. These capabilities reduce the likelihood that security vulnerabilities could be successfully exploited on Android.
- Exploitation for many issues on Android is made more difficult by enhancements in newer versions of the Android platform. We encourage all users to update to the latest version of Android where possible.
- The Android security team actively monitors for abuse through Google Play Protect and warns users about Potentially Harmful Applications. Google Play Protect is enabled by default on devices with Google Mobile Services, and is especially important for users who install apps from outside of Google Play.
Android 13 vulnerability details
The sections below provide details for security vulnerabilities fixed as part of Android 13. Vulnerabilities are grouped under the component that they affect and include details such as the CVE, associated references, type of vulnerability, and severity.
Android runtime
CVE References Type Severity CVE-2013-0340 A-24901276 DoS Moderate Framework
CVE References Type Severity CVE-2022-20266 A-211757348 EoP High CVE-2022-20301 A-200956614 EoP High CVE-2022-20305 A-199751623 EoP High CVE-2022-20270 A-209005023 ID High CVE-2022-20294 A-202160705 ID High CVE-2022-20295 A-202160584 ID High CVE-2022-20296 A-201794303 ID High CVE-2022-20298 A-201416182 ID High CVE-2022-20299 A-201415895 ID High CVE-2022-20300 A-200956588 ID High CVE-2022-20303 A-200573021 ID High CVE-2022-20304 A-199751919 ID High CVE-2022-20260 A-220865698 DoS High CVE-2022-20246 A-230493191 EoP Moderate CVE-2022-20250 A-226134095 EoP Moderate CVE-2022-20255 A-222687217 EoP Moderate CVE-2022-20268 A-210468836 EoP Moderate CVE-2022-20271 A-207672635 EoP Moderate CVE-2022-20281 A-204083967 EoP Moderate CVE-2022-20282 A-204083104 EoP Moderate CVE-2022-20312 A-192244925 EoP Moderate CVE-2022-20331 A-181785557 EoP Moderate CVE-2022-20338 A-171966843 EoP Moderate CVE-2021-0734 A-189122911 ID Moderate CVE-2021-0735 A-188913056 ID Moderate CVE-2021-0975 A-180104273 ID Moderate CVE-2022-20243 A-190199986 ID Moderate CVE-2022-20249 A-226900861 ID Moderate CVE-2022-20252 A-224547584 ID Moderate CVE-2022-20262 A-218338453 ID Moderate CVE-2022-20263 A-217935264 ID Moderate CVE-2022-20272 A-207672568 ID Moderate CVE-2022-20275 A-205836975 ID Moderate CVE-2022-20276 A-205706731 ID Moderate CVE-2022-20277 A-205145497 ID Moderate CVE-2022-20279 A-204877302 ID Moderate CVE-2022-20285 A-230868108 ID Moderate CVE-2022-20287 A-204082784 ID Moderate CVE-2022-20288 A-204082360 ID Moderate CVE-2022-20289 A-203683960 ID Moderate CVE-2022-20291 A-203430648 ID Moderate CVE-2022-20293 A-202298672 ID Moderate CVE-2022-20307 A-198782887 ID Moderate CVE-2022-20309 A-194694094 ID Moderate CVE-2022-20315 A-191058227 ID Moderate CVE-2022-20316 A-190726121 ID Moderate CVE-2022-20318 A-194694069 ID Moderate CVE-2022-20320 A-187956596 ID Moderate CVE-2022-20324 A-187042120 ID Moderate CVE-2022-20328 A-184948501 ID Moderate CVE-2022-20332 A-180019130 ID Moderate CVE-2022-20336 A-177239688 ID Moderate CVE-2022-20341 A-162952629 ID Moderate CVE-2022-20322 A-187176993 ID Low CVE-2022-20323 A-187176203 ID Low CVE-2022-20278 A-205130113 EoP Moderate Media Framework
CVE References Type Severity CVE-2022-20290 A-203549963 EoP Moderate CVE-2022-20325 A-186473060 EoP Moderate CVE-2022-20247 A-229858836 ID Moderate CVE-2022-20317 A-190199063 ID Moderate Package
CVE References Type Severity CVE-2022-20319 A-189574230 EoP Moderate Platform
CVE References Type Severity CVE-2022-20302 A-200746457 EoP High CVE-2022-20321 A-187176859 ID Moderate Platform
CVE References Type Severity CVE-2022-20265 A-212804898 EoP Moderate System
CVE References Type Severity CVE-2022-20283 A-233069336 RCE Critical CVE-2022-20292 A-202975040 EoP High CVE-2022-20297 A-201561699 EoP High CVE-2022-20330 A-181962588 EoP High CVE-2021-0518 A-176541017 ID High CVE-2022-20245 A-215005011 ID High CVE-2022-20259 A-221431393 ID High CVE-2022-20284 A-231986341 ID High CVE-2022-20326 A-185235527 ID High CVE-2022-20327 A-185126813 ID High CVE-2022-20339 A-171572148 ID High CVE-2022-20362 A-230756082 RCE Moderate CVE-2022-20244 A-201083240 EoP Moderate CVE-2022-20248 A-227619193 EoP Moderate CVE-2022-20254 A-223377547 EoP Moderate CVE-2022-20256 A-222572821 EoP Moderate CVE-2022-20257 A-222289114 EoP Moderate CVE-2022-20258 A-221893030 EoP Moderate CVE-2022-20267 A-211646835 EoP Moderate CVE-2022-20269 A-209062898 EoP Moderate CVE-2022-20274 A-206470146 EoP Moderate CVE-2022-20286 A-230866011 EoP Moderate CVE-2022-20306 A-199680794 EoP Moderate CVE-2022-20313 A-192206329 EoP Moderate CVE-2022-20314 A-191876118 EoP Moderate CVE-2022-20329 A-183410556 EoP Moderate CVE-2022-20335 A-178014725 EoP Moderate CVE-2022-20241 A-217185011 ID Moderate CVE-2022-20242 A-231986212 ID Moderate CVE-2022-20251 A-225881167 ID Moderate CVE-2022-20261 A-219835125 ID Moderate CVE-2022-20273 A-206478022 ID Moderate CVE-2022-20280 A-204117261 ID Moderate CVE-2022-20310 A-192663798 ID Moderate CVE-2022-20311 A-192663553 ID Moderate CVE-2022-20340 A-166269532 ID Moderate CVE-2022-20342 A-143534321 ID Moderate CVE-2022-20253 A-224545125 DoS Moderate CVE-2022-20308 A-197874458 DoS Moderate CVE-2022-20333 A-179161657 DoS Moderate CVE-2022-20334 A-178800552 DoS Moderate Common questions and answers
This section answers common questions that may occur after reading this bulletin.
1. How do I determine if my device is updated to address these issues?
To learn how to check a device's security patch level, see Check and update your Android version.
Android 13, as released on AOSP, has a default security patch level of 2022-09-01. Android devices running Android 13 and with a security patch leve of 2022-09-01 or later address all issues contained in these security release notes.
2. What do the entries in the Type column mean?
Entries in the Type column of the vulnerability details table reference the classification of the security vulnerability.
3. What do the entries in the References column mean?
Abbreviation Definition RCE Remote code execution EoP Elevation of privilege ID Information disclosure DoS Denial of service N/A Classification not available
Entries under the References column of the vulnerability details table may contain a prefix identifying the organization to which the reference value belongs.
Prefix Reference A- Android bug ID Versions
Version Date Notes 1.0 August 1, 2022 Security Release Notes Published 1.1 August 10, 2022 Updated Issue List
I rarely wipe my phone for any update at all. OTAs don't wipe the phone. Sure, it's possible that it'll run better if you wipe your phone, but not necessarily, and you can always wipe later if you must.Ok, i know it is advised to do a fresh wipe for android version updates but is it absolutely necessary?
You are correct.I think this just means you won't be able to downgrade the bootloader itself. Don't take my word for it but I suspect that one could still run older versions on the new bootloader.
To test this, just download the factory zip and update the bootloader only.
adb reboot bootloader
fastboot flash bootloader bootloader-raven-slider-1.2-8739948.img
fastboot reboot
S:\platform-tools>adb reboot bootloader
* daemon not running; starting now at tcp:5037
* daemon started successfully
S:\platform-tools>fastboot flash bootloader bootloader-raven-slider-1.2-8739948.img
Sending 'bootloader_b' (11554 KB) OKAY [ 0.047s]
Writing 'bootloader_b' (bootloader) Flashing pack version slider-1.2-8739948
(bootloader) flashing platform gs101
(bootloader) Validating partition ufs
(bootloader) Validating partition ufs
(bootloader) Validating partition partition:0
(bootloader) Validating partition partition:1
(bootloader) Validating partition partition:2
(bootloader) Validating partition partition:3
(bootloader) Validating partition bl1_b
(bootloader) Validating partition pbl_b
(bootloader) Validating partition bl2_b
(bootloader) Validating partition abl_b
(bootloader) Validating partition bl31_b
(bootloader) Validating partition tzsw_b
(bootloader) Validating partition gsa_b
(bootloader) Validating partition ldfw_b
(bootloader) Flashing partition ufs
(bootloader) Flashing partition ufs
(bootloader) Flashing partition partition:0
(bootloader) Flashing partition partition:1
(bootloader) Flashing partition partition:2
(bootloader) Flashing partition partition:3
(bootloader) Flashing partition bl1_b
(bootloader) Flashing partition pbl_b
(bootloader) Flashing partition bl2_b
(bootloader) Flashing partition abl_b
(bootloader) Flashing partition bl31_b
(bootloader) Flashing partition tzsw_b
(bootloader) Flashing partition gsa_b
(bootloader) Flashing partition ldfw_b
(bootloader) Loading sideload ufsfwupdate
OKAY [ 2.766s]
Finished. Total time: 2.825s
S:\platform-tools>fastboot reboot
Rebooting OKAY [ 0.001s]
Finished. Total time: 0.002s
S:\platform-tools>
fastboot flash bootloader bootloader-raven-slider-1.2-8739948.img
(and have the right bootloader file in the same folder). Either should work fine.I've NEVER done a wipe, for an update from one version to the other. I guess it's "better", but I don't want to spend the time setting it all back up again.Ok, i know it is advised to do a fresh wipe for android version updates but is it absolutely necessary?
fastboot: error: Command failed
):S:\platform-tools>flash-all
Sending 'bootloader_b' (11554 KB) OKAY [ 0.051s]
Writing 'bootloader_b' (bootloader) Flashing pack version slider-1.2-8739948
(bootloader) flashing platform gs101
(bootloader) Validating partition ufs
(bootloader) Validating partition ufs
(bootloader) Validating partition partition:0
(bootloader) Validating partition partition:1
(bootloader) Validating partition partition:2
(bootloader) Validating partition partition:3
(bootloader) Validating partition bl1_b
(bootloader) Validating partition pbl_b
(bootloader) Validating partition bl2_b
(bootloader) Validating partition abl_b
(bootloader) Validating partition bl31_b
(bootloader) Validating partition tzsw_b
(bootloader) Validating partition gsa_b
(bootloader) Validating partition ldfw_b
(bootloader) Flashing partition ufs
(bootloader) Flashing partition ufs
(bootloader) Flashing partition partition:0
(bootloader) Flashing partition partition:1
(bootloader) Flashing partition partition:2
(bootloader) Flashing partition partition:3
(bootloader) Flashing partition bl1_b
(bootloader) Flashing partition pbl_b
(bootloader) Flashing partition bl2_b
(bootloader) Flashing partition abl_b
(bootloader) Flashing partition bl31_b
(bootloader) Flashing partition tzsw_b
(bootloader) Flashing partition gsa_b
(bootloader) Flashing partition ldfw_b
(bootloader) Loading sideload ufsfwupdate
OKAY [ 2.737s]
Finished. Total time: 2.800s
Rebooting into bootloader OKAY [ 0.000s]
Finished. Total time: 0.001s
< waiting for any device >
Sending 'radio_b' (82772 KB) OKAY [ 0.336s]
Writing 'radio_b' (bootloader) Flashing pack version g5123b-102852-220720-M-8851166
(bootloader) Flashing partition modem_b
OKAY [ 0.109s]
Finished. Total time: 0.457s
Rebooting into bootloader OKAY [ 0.000s]
Finished. Total time: 0.006s
< waiting for any device >
--------------------------------------------
Bootloader Version...: slider-1.2-8739948
Baseband Version.....: g5123b-102852-220720-B-8851166
Serial Number........:
--------------------------------------------
extracting android-info.txt (0 MB) to RAM...
Checking 'product' OKAY [ 0.001s]
Checking 'version-bootloader' OKAY [ 0.000s]
Checking 'version-baseband' OKAY [ 0.000s]
Setting current slot to 'b' OKAY [ 0.081s]
extracting boot.img (64 MB) to disk... took 0.213s
archive does not contain 'boot.sig'
Sending 'boot_b' (65536 KB) OKAY [ 0.266s]
Writing 'boot_b' OKAY [ 0.072s]
archive does not contain 'init_boot.img'
extracting dtbo.img (16 MB) to disk... took 0.037s
archive does not contain 'dtbo.sig'
Sending 'dtbo_b' (16384 KB) OKAY [ 0.067s]
Writing 'dtbo_b' OKAY [ 0.027s]
archive does not contain 'dt.img'
extracting pvmfw.img (1 MB) to disk... took 0.004s
archive does not contain 'pvmfw.sig'
Sending 'pvmfw_b' (1024 KB) OKAY [ 0.004s]
Writing 'pvmfw_b' OKAY [ 0.004s]
archive does not contain 'recovery.img'
extracting vbmeta.img (0 MB) to disk... took 0.001s
archive does not contain 'vbmeta.sig'
Sending 'vbmeta_b' (12 KB) OKAY [ 0.000s]
Writing 'vbmeta_b' OKAY [ 0.002s]
extracting vbmeta_system.img (0 MB) to disk... took 0.001s
archive does not contain 'vbmeta_system.sig'
Sending 'vbmeta_system_b' (4 KB) OKAY [ 0.000s]
Writing 'vbmeta_system_b' OKAY [ 0.002s]
extracting vbmeta_vendor.img (0 MB) to disk... took 0.002s
archive does not contain 'vbmeta_vendor.sig'
Sending 'vbmeta_vendor_b' (4 KB) OKAY [ 0.000s]
Writing 'vbmeta_vendor_b' OKAY [ 0.002s]
extracting vendor_boot.img (64 MB) to disk... took 0.229s
archive does not contain 'vendor_boot.sig'
Sending 'vendor_boot_b' (65536 KB) OKAY [ 0.268s]
Writing 'vendor_boot_b' OKAY [ 0.071s]
archive does not contain 'vendor_kernel_boot.img'
extracting super_empty.img (0 MB) to disk... took 0.001s
Rebooting into fastboot OKAY [ 0.000s]
< waiting for any device >
Sending 'super' (4 KB) FAILED (Write to device failed in SendBuffer() (Too many links))
fastboot: error: Command failed
Press any key to exit...
Depends on how you update it, but for the more conventional update methods, yes, you'll have to re-root.Noob question: If I upgrade from 12 to 13, do I need to re-root it?
Just as @Lughnasadh said, and to add: only just as much as you have to re-root every month's update when you flash it, depending on your method.Noob question: If I upgrade from 12 to 13, do I need to re-root it?
^
The real trick will be if you can still flash the old factory image. Try to re-flash the July image (just the system image) and see if the bootloader rejects it.You are correct.
I did:
Code:adb reboot bootloader fastboot flash bootloader bootloader-raven-slider-1.2-8739948.img fastboot reboot
And I'm booted into Android 12 still just fine. Below is the command prompt output:
Note to anyone, if after upgrading to 13 you want to downgrade to 12 using a full factory image's flash-all.bat, you'll at minimum have to either remove Android 12's bootloader flash line from the file, or replace it withfastboot flash bootloader bootloader-raven-slider-1.2-8739948.img
(and have the right bootloader file in the same folder). Either should work fine.
No, but they've restricted a few permissions for sideloaded apps (e.g. Notification Listener and Accessibility permissions). But those restrictions can be disabled by going to the app info page and clicking on the 3 dot menu on top right.For those of you that updated to A13 - Has Google removed the ability in A13 to sideload non GP apps?
Thank You for the quick replyNo, but they've restricted a few permissions for sideloaded apps (e.g. Notification access & Accessibility). But those restrictions can be disabled by going to the app info page and clicking on the 3 dot menu on top right.
There's no way I'll test that. Downgrading without wiping (because of updated app data, especially for system apps) is too much risk for me. I don't have the time to recover from.The real trick will be if you can still flash the old factory image. Try to re-flash the July image (just the system image) and see if the bootloader rejects it.
Leaving the past in the rear view mirror, sir...There's no way I'll test that. Downgrading without wiping (because of updated app data, especially for system apps) is to much risk for me. I don't have the time to recover from.
Anyone else?
Haven't seen anyone get V4A working on A13 on the Pixel 6 series. JamesDSP, however, does work.
I gather you're all good now?I did go through and successfully flashed my PX6 pro to AP1A.240405.002 with KSU using PixelFlasher 6.8.3.0
I did go through and successfully flashed my PX6 pro to AP1A.240405.002 with KSU using PixelFlasher 6.8.3.0
Note that this is mainly for the officially listed "Unlocked" Pixel 6 Pro, available directly from the Google Store. All of this will also apply to any other (carrier-specific) variant of the Pixel 6 Pro which you can achieve an unlocked bootloader on. This includes T-Mobile and AT&T variants. It's likely Verizon variants will never be able to unlock their bootloader, or if so it will require paying the right person to do so.
Feel free to ask about general questions, but for anything that's specific to your variant, you should use one of the other already existing threads. You'll find Verizon, AT&T, and T-Mobile-related threads in those respective search results.
Unlocking or locking the bootloader will wipe the device every single time, so be sure to have your data backed up before doing so, or better yet, just unlock it as soon as you get the device.
Keep in mind that unlocking the bootloader or rooting might affect your phone's capability to use banking apps such as Google Pay, your local bank's app, or even the ability to install some apps like NetFlix. See @Pekempy's thread Working SafetyNet with Pixel 6 Pro Android 12
If you're going to re-lock the bootloader, make sure the ROM you have on your phone is completely stock (by flashing the latest official firmware) BEFORE re-locking it.
There are no negative consequences if you unlock or re-lock the bootloader other than it will wipe your phone, and while unlocked you get a brief screen when you boot the phone telling you (and anyone who sees your phone at the time) that the bootloader is unlocked. You will also continue to receive updates (if you've merely unlocked the bootloader, you can take updates as normal) unlike Samsung, Sony, et cetera, which have permanent major consequences with reduced functionality even if you un-root and re-lock your bootloader. If you're actually rooted (not just bootloader unlocked), you'll have to perform extra steps to manually update each month, and to keep root/re-root.
All posts about Google Pay or banking will be reported to be deleted. Please keep this thread on-topic. There are at least one or two other How To Guide threads in this section in which folks discuss how to get around banking app restrictions when you're rooted or just have an unlocked bootloader. See @Pekempy's thread Working SafetyNet with Pixel 6 Pro Android 12
If users persist in discussing banking apps in this thread, I will have this thread locked and only update this first post when there is new and updated information regarding the subjects of the title of the thread: Unlocking the Pixel 6 Pro bootloader, rooting, and TWRP. See @Pekempy's thread Working SafetyNet with Pixel 6 Pro Android 12
Honorable mention to @Jawomo's aodNotify - Notification Light / LED for Pixel 6 Pro! (XDA link) / Notification light / LED for Pixel - aodNotify (Play Store link), which in my opinion restores useful functionality missing in most phones these days. It also solves some subjective issues some folks have with AOD (Always On Display), and/or solves/works around the problem where AOD is required for the optical fingerprint reader to work without the screen being on.
OEM unlocking in developer options needs to be toggled on. I don't "believe" you have to actually do the "fastboot flashing unlock" command.
- You'll need this if you're going to unlock the bootloader on your Pixel 6 Pro: SDK Platform Tools (download links for Windows, Mac, and Linux). Note that you can find links to download the tools elsewhere, but I wouldn't trust them - you never know if they've been modified. Even if the person providing the link didn't do anything intentionally, the tools could be modified without them being aware. Why take a chance of putting your phone security further at risk?
- You can alternately use the tools from the SDK Manager, but most of us will want to stick to the basic tools-only without the complications of the full development manager.
- For Windows, get Google's drivers here Get the Google USB Driver (ADB will likely work while the phone is fully booted, but if you're like me, you'll need these drivers for after you "adb reboot-bootloader", to be able to use ADB and Fastboot.
- Thanks to @96carboard for posting the details of unlocking the bootloader, be sure to thank him in his post. Unlocking or locking the bootloader will wipe the device every single time, so be sure to have your data backed up before doing so, or better yet, just unlock it as soon as you get the device. Keep in mind that unlocking the bootloader or rooting might affect your phone's capability to use banking apps such as Google Pay, or your local bank's app. If you're going to re-lock the bootloader, make sure the ROM you have on your phone is completely stock (by flashing the latest official firmware) BEFORE re-locking it. My experience on my Pixel 1 was that there were no negative consequences if you unlock or re-lock the bootloader other than it will wipe your phone, and while unlocked you get a brief screen when you boot the phone telling you (and anyone who sees your phone at the time) that the bootloader is unlocked. All of this should still be the case. You will also continue to receive updates. Unlike Samsung, Sony, et cetera, which have major consequences with reduced functionality even if you un-root and re-lock your bootloader. If you're actually rooted (not just bootloader unlocked), you'll have to perform extra steps to keep root/re-root.:
The unlock process works like this:
1) Take brand new fresh phone out of box. Do NOT put sim card in it, just power it on (you can put a SIM card if you want, you just don't have to).
2) When it starts harassing you to join Google, hit "skip" and "remind me tomorrow" as applicable until you reach home screen. YOU DO NOT need to plug in a google account.
3) Settings --> About --> Build number. Repeatedly tap it until it says you're a developer.
4) Back --> Network --> WiFi and connect it.
5) Back --> System --> Developer --> OEM unlocking (check), USB debugging (check), plug in USB, authorize on the phone when requested.
Using the Platform Tools previously mentioned in command line/terminal:
6) #7) #Code:adb reboot-bootloader
Code:fastboot flashing unlock
Now that you've unlocked it, it has been wiped, so repeat 1-4, then disable all the google spyware, and go ahead and start using it while waiting for aosp and root.
Official Instructions for Locking/Unlocking the Bootloader
Personally, I would always use the official drivers Google provides unless they just don't work for whatever reason: Get the Google USB Driver (this is for Windows). They work for me. They are rarely updated, but they are every once in a great while, sometimes years in-between.
I agree with this. be careful using drivers or adb/fastboot tools. Some are fine, but there's no need for it really anymore. Google has made it very easy to install drivers and Platform-Tools (adb/fastboot tool).
Google provides the Fastboot/ADB tool (Platform-Tools) and Google USB Drivers (adb/fastboot interface). This will allow any Pixel to interface with Windows using the fastboot/adb protocol. Official Google USB Driver includes support for both the Fastboot and ADB driver interface. There are 3 main drivers (Fastboot, ADB and MTP/Portable File Transfer). The MTP/Portable File Transfer driver is built-in to Windows 7-11.
Fastboot/ADB Driver Interface - Official Download Link:
When flashing a full image or unlocking your bootloader, the fastboot interface is being used.
First Download official Google USB Drivers (it's a zip file). Extract the zip (important!). Right-click on the android_winusb.inf file and hit install. You can then restart your phone to the Bootloader Screen (hold vol-down while it restarts or turns on). When you plug in your phone, Windows Device Manager will show a new device at the top: Android Device: Android Bootloader Interface.
Using the ADB interface: It's the same driver. Enable USB Debugging on your phone, then plug it in to your computer. A prompt will appear on your phone (to allow USB Debugging). The driver in Device Manager will appear as Android Device: Android Composite ADB interface.
Now you can download and use Platform-Tools to flash an Android Image, OTA or run adb/fastboot commands.
Official Download Page
"Android SDK Platform-Tools is a component for the Android SDK. It includes tools that interface with the Android platform, such as adb, fastboot, and systrace"
It's best to make Platform-Tools available system-wide. Download Platform-Tools from the above link and extract it to your C:\ drive - that way you will have a folder to add to the PATH Environment under Window System Properties Menu, Advanced, Environment Variables, System Variables, PATH (google how to do this, very easy). What this does is allow adb/fastboot commands to be run from anywhere in the system, so you don't have to be in the platform-tools folder to run adb/fastboot commands and flash an Android Image (Official or Android Fork such as ProtonAOSP).
@V0latyle posted a new thread with some very important and fascinating information about the increased difficulty to root Android 12: Read this before rooting. Be sure to thank him there.
I would guess that this should be the appropriate URL for official TWRP custom recovery for the Pixel 6 Pro, but who knows when/if that will actually be made available, and it may become available unofficially in these forum sections before being made official. I'll adjust this URL as needed. https://twrp.me/google/googlepixel6pro.html.
@Freak07's Kirisakura-Kernel for the Pixel 6 Pro (and possibly the Pixel 6)
@DespairFactor's Despair Kernel (I believe also for both the P6P and P6)
@tbalden's CleanSlate Kernel
@acuicultor's Radioactive Kernel
It's also handy to have to the full official firmware available, whether it's to recovery from accidents or for actual development. Note the official link to the general Factory Images for Nexus and Pixel Devices page. The following link goes directly to the Pixel 6 Pro (Raven) section: Pixel 6 Pro Factory Images. I prefer to actually bookmark a link to the device listed immediately below the device I want the firmware for, because Google dumbly (in my opinion) puts the latest firmware at the bottom of the list for each particular device, and that ends up making you scroll a lot after a year or two of monthly updates.
Note: You can still get the December 2021 Factory Images and OTA from this thread, if you need them for any reason: Alternate links to December - all full factory images and OTAs available
Back to modding!
- Use the latest Magisk Stable (in my case, I keep the app "hidden" / renamed)
- Used the full firmware zip, extracted to the same folder as the latest Platform Tools (S:\platform-tools)
- Extracted the new boot.img
- Copied new boot.img to the phone
- Patched the new boot.img with Magisk Stable
- Renamed Magisk'd boot.img so I know what version of firmware it's for
- Copied the Magisk'd boot.img back to the computer
- Disabled all my Magisk Modules
- Removed the "-w " from the flash-all.bat
- Re-edited the flash-all.bat to verify I saved it with the "-w " taken out
- Open a Command Prompt, navigated to S:\platform-tools
- adb reboot bootloader
- flash-all.bat
- Let phone boot, unlock it, check that it's working, allow the update process to finish (gave it five minutes or so)
- adb reboot bootloader
- fastboot flash boot kernel.img (renamed Magisk'd boot.img)
- fastboot reboot
- Unlock, check everything's working
- Re-enabled the most basic Magisk Modules which I was sure wouldn't cause a critical issue
- Reboot, unlock, made sure everything's working
I may append these first four posts with further useful information or links as needed.
Used a factory image and booted into Android 13. Auto OTA and a sideload of the full OTA will end in the same result as both useI'm less concerned about the steps/commands as I am with how you updated (auto OTA, sideload, factory image), whether you booted to Android 13, and what happened when you rolled back (I assume using the factory image)
update_engine
. I did boot into Android 13 so the ARB counter did get incremented.33.0.1 (March 2022)
- adb
- Fixes Windows mdns crashes.
- Fixes enable-verity/disable-verity on old devices.
- Fixes "install multiple" on old devices
- Improves the help output to include all supported compression methods.