How To Guide April 2, 2024 AP1A.240405.002 Global - Root Pixel 6 Pro [Raven]

Search This thread

Lughnasadh

Senior Member
Mar 23, 2015
6,171
7,672
Google Nexus 5
Huawei Nexus 6P
PSA:

"Android 13 is rolling out to Pixel devices starting today.

If you’re currently enrolled in the Android Beta program, you’ll get the Android 13 final release and remain enrolled to receive ongoing Beta updates for Android 13 feature drops, starting later this year. If you’d like to opt out of ongoing Beta updates without needing to wipe your device, just visit the Android Beta site and opt out after you get the Android 13 final release and before taking the first beta for Android 13 feature drops
."

In other words, you won't be unenrolled automatically.

ADDENDUM: A13 QPR1 Beta due out in September.

 
Last edited:

roirraW "edor" ehT

Senior Moderator
Staff member

Android 13 Security Release Notes​


Published August 1, 2022 | Updated August 10, 2022
This Android Security Release Notes contains details of security vulnerabilities affecting Android devices which are addressed as part of Android 13. Android 13 devices with a security patch level of 2022-09-01 or later are protected against these issues (Android 13, as released on AOSP, will have a default security patch level of 2022-09-01). To learn how to check a device's security patch level, see Check and update your Android version.
Android partners are notified of all issues prior to publication. Source code patches for these issues will be released to the Android Open Source Project (AOSP) repository as part of the Android 13 release.
The severity assessment of issues in these release notes are based on the effect that exploiting the vulnerability would possibly have on an affected device, assuming the platform and service mitigations are turned off for development purposes or if successfully bypassed.
We have had no reports of active customer exploitation or abuse of these newly reported issues. Refer to the Android and Google Play Protect mitigations section for details on the Android security platform protections and Google Play Protect, which improve the security of the Android platform.

Announcements​

  • The issues described in this document are addressed as part of Android 13. This information is provided for reference and transparency.
  • We would like to acknowledge and thank the security research community for their continued contributions towards securing the Android ecosystem.

Android and Google service mitigations​

This is a summary of the mitigations provided by the Android security platform and service protections such as Google Play Protect. These capabilities reduce the likelihood that security vulnerabilities could be successfully exploited on Android.
  • Exploitation for many issues on Android is made more difficult by enhancements in newer versions of the Android platform. We encourage all users to update to the latest version of Android where possible.
  • The Android security team actively monitors for abuse through Google Play Protect and warns users about Potentially Harmful Applications. Google Play Protect is enabled by default on devices with Google Mobile Services, and is especially important for users who install apps from outside of Google Play.

Android 13 vulnerability details​

The sections below provide details for security vulnerabilities fixed as part of Android 13. Vulnerabilities are grouped under the component that they affect and include details such as the CVE, associated references, type of vulnerability, and severity.

Android runtime​

CVEReferencesTypeSeverity
CVE-2013-0340A-24901276DoSModerate

Framework​

CVEReferencesTypeSeverity
CVE-2022-20266A-211757348EoPHigh
CVE-2022-20301A-200956614EoPHigh
CVE-2022-20305A-199751623EoPHigh
CVE-2022-20270A-209005023IDHigh
CVE-2022-20294A-202160705IDHigh
CVE-2022-20295A-202160584IDHigh
CVE-2022-20296A-201794303IDHigh
CVE-2022-20298A-201416182IDHigh
CVE-2022-20299A-201415895IDHigh
CVE-2022-20300A-200956588IDHigh
CVE-2022-20303A-200573021IDHigh
CVE-2022-20304A-199751919IDHigh
CVE-2022-20260A-220865698DoSHigh
CVE-2022-20246A-230493191EoPModerate
CVE-2022-20250A-226134095EoPModerate
CVE-2022-20255A-222687217EoPModerate
CVE-2022-20268A-210468836EoPModerate
CVE-2022-20271A-207672635EoPModerate
CVE-2022-20281A-204083967EoPModerate
CVE-2022-20282A-204083104EoPModerate
CVE-2022-20312A-192244925EoPModerate
CVE-2022-20331A-181785557EoPModerate
CVE-2022-20338A-171966843EoPModerate
CVE-2021-0734A-189122911IDModerate
CVE-2021-0735A-188913056IDModerate
CVE-2021-0975A-180104273IDModerate
CVE-2022-20243A-190199986IDModerate
CVE-2022-20249A-226900861IDModerate
CVE-2022-20252A-224547584IDModerate
CVE-2022-20262A-218338453IDModerate
CVE-2022-20263A-217935264IDModerate
CVE-2022-20272A-207672568IDModerate
CVE-2022-20275A-205836975IDModerate
CVE-2022-20276A-205706731IDModerate
CVE-2022-20277A-205145497IDModerate
CVE-2022-20279A-204877302IDModerate
CVE-2022-20285A-230868108IDModerate
CVE-2022-20287A-204082784IDModerate
CVE-2022-20288A-204082360IDModerate
CVE-2022-20289A-203683960IDModerate
CVE-2022-20291A-203430648IDModerate
CVE-2022-20293A-202298672IDModerate
CVE-2022-20307A-198782887IDModerate
CVE-2022-20309A-194694094IDModerate
CVE-2022-20315A-191058227IDModerate
CVE-2022-20316A-190726121IDModerate
CVE-2022-20318A-194694069IDModerate
CVE-2022-20320A-187956596IDModerate
CVE-2022-20324A-187042120IDModerate
CVE-2022-20328A-184948501IDModerate
CVE-2022-20332A-180019130IDModerate
CVE-2022-20336A-177239688IDModerate
CVE-2022-20341A-162952629IDModerate
CVE-2022-20322A-187176993IDLow
CVE-2022-20323A-187176203IDLow
CVE-2022-20278A-205130113EoPModerate

Media Framework​

CVEReferencesTypeSeverity
CVE-2022-20290A-203549963EoPModerate
CVE-2022-20325A-186473060EoPModerate
CVE-2022-20247A-229858836IDModerate
CVE-2022-20317A-190199063IDModerate

Package​

CVEReferencesTypeSeverity
CVE-2022-20319A-189574230EoPModerate

Platform​

CVEReferencesTypeSeverity
CVE-2022-20302A-200746457EoPHigh
CVE-2022-20321A-187176859IDModerate

Platform​

CVEReferencesTypeSeverity
CVE-2022-20265A-212804898EoPModerate

System​

CVEReferencesTypeSeverity
CVE-2022-20283A-233069336RCECritical
CVE-2022-20292A-202975040EoPHigh
CVE-2022-20297A-201561699EoPHigh
CVE-2022-20330A-181962588EoPHigh
CVE-2021-0518A-176541017IDHigh
CVE-2022-20245A-215005011IDHigh
CVE-2022-20259A-221431393IDHigh
CVE-2022-20284A-231986341IDHigh
CVE-2022-20326A-185235527IDHigh
CVE-2022-20327A-185126813IDHigh
CVE-2022-20339A-171572148IDHigh
CVE-2022-20362A-230756082RCEModerate
CVE-2022-20244A-201083240EoPModerate
CVE-2022-20248A-227619193EoPModerate
CVE-2022-20254A-223377547EoPModerate
CVE-2022-20256A-222572821EoPModerate
CVE-2022-20257A-222289114EoPModerate
CVE-2022-20258A-221893030EoPModerate
CVE-2022-20267A-211646835EoPModerate
CVE-2022-20269A-209062898EoPModerate
CVE-2022-20274A-206470146EoPModerate
CVE-2022-20286A-230866011EoPModerate
CVE-2022-20306A-199680794EoPModerate
CVE-2022-20313A-192206329EoPModerate
CVE-2022-20314A-191876118EoPModerate
CVE-2022-20329A-183410556EoPModerate
CVE-2022-20335A-178014725EoPModerate
CVE-2022-20241A-217185011IDModerate
CVE-2022-20242A-231986212IDModerate
CVE-2022-20251A-225881167IDModerate
CVE-2022-20261A-219835125IDModerate
CVE-2022-20273A-206478022IDModerate
CVE-2022-20280A-204117261IDModerate
CVE-2022-20310A-192663798IDModerate
CVE-2022-20311A-192663553IDModerate
CVE-2022-20340A-166269532IDModerate
CVE-2022-20342A-143534321IDModerate
CVE-2022-20253A-224545125DoSModerate
CVE-2022-20308A-197874458DoSModerate
CVE-2022-20333A-179161657DoSModerate
CVE-2022-20334A-178800552DoSModerate

Common questions and answers​

This section answers common questions that may occur after reading this bulletin.
1. How do I determine if my device is updated to address these issues?
To learn how to check a device's security patch level, see Check and update your Android version.
Android 13, as released on AOSP, has a default security patch level of 2022-09-01. Android devices running Android 13 and with a security patch leve of 2022-09-01 or later address all issues contained in these security release notes.
2. What do the entries in the Type column mean?
Entries in the Type column of the vulnerability details table reference the classification of the security vulnerability.
AbbreviationDefinition
RCERemote code execution
EoPElevation of privilege
IDInformation disclosure
DoSDenial of service
N/AClassification not available
3. What do the entries in the References column mean?
Entries under the References column of the vulnerability details table may contain a prefix identifying the organization to which the reference value belongs.
PrefixReference
A-Android bug ID

Versions​

VersionDateNotes
1.0August 1, 2022Security Release Notes Published
1.1August 10, 2022Updated Issue List
 
  • Like
Reactions: Lughnasadh

roirraW "edor" ehT

Senior Moderator
Staff member
Ok, i know it is advised to do a fresh wipe for android version updates but is it absolutely necessary?
I rarely wipe my phone for any update at all. OTAs don't wipe the phone. Sure, it's possible that it'll run better if you wipe your phone, but not necessarily, and you can always wipe later if you must.
 

roirraW "edor" ehT

Senior Moderator
Staff member
I think this just means you won't be able to downgrade the bootloader itself. Don't take my word for it but I suspect that one could still run older versions on the new bootloader.

To test this, just download the factory zip and update the bootloader only.
You are correct.

I did:

Code:
adb reboot bootloader
fastboot flash bootloader bootloader-raven-slider-1.2-8739948.img
fastboot reboot

And I'm booted into Android 12 still just fine. Below is the command prompt output:
S:\platform-tools>adb reboot bootloader
* daemon not running; starting now at tcp:5037
* daemon started successfully

S:\platform-tools>fastboot flash bootloader bootloader-raven-slider-1.2-8739948.img
Sending 'bootloader_b' (11554 KB) OKAY [ 0.047s]
Writing 'bootloader_b' (bootloader) Flashing pack version slider-1.2-8739948
(bootloader) flashing platform gs101
(bootloader) Validating partition ufs
(bootloader) Validating partition ufs
(bootloader) Validating partition partition:0
(bootloader) Validating partition partition:1
(bootloader) Validating partition partition:2
(bootloader) Validating partition partition:3
(bootloader) Validating partition bl1_b
(bootloader) Validating partition pbl_b
(bootloader) Validating partition bl2_b
(bootloader) Validating partition abl_b
(bootloader) Validating partition bl31_b
(bootloader) Validating partition tzsw_b
(bootloader) Validating partition gsa_b
(bootloader) Validating partition ldfw_b
(bootloader) Flashing partition ufs
(bootloader) Flashing partition ufs
(bootloader) Flashing partition partition:0
(bootloader) Flashing partition partition:1
(bootloader) Flashing partition partition:2
(bootloader) Flashing partition partition:3
(bootloader) Flashing partition bl1_b
(bootloader) Flashing partition pbl_b
(bootloader) Flashing partition bl2_b
(bootloader) Flashing partition abl_b
(bootloader) Flashing partition bl31_b
(bootloader) Flashing partition tzsw_b
(bootloader) Flashing partition gsa_b
(bootloader) Flashing partition ldfw_b
(bootloader) Loading sideload ufsfwupdate
OKAY [ 2.766s]
Finished. Total time: 2.825s

S:\platform-tools>fastboot reboot
Rebooting OKAY [ 0.001s]
Finished. Total time: 0.002s

S:\platform-tools>

Note to anyone, if after upgrading to 13 you want to downgrade to 12 using a full factory image's flash-all.bat, you'll at minimum have to either remove Android 12's bootloader flash line from the file, or replace it with fastboot flash bootloader bootloader-raven-slider-1.2-8739948.img (and have the right bootloader file in the same folder). Either should work fine.
 

roirraW "edor" ehT

Senior Moderator
Staff member
Update 2: Different USB cable and port worked 100%

Hmmmm. Now, after having tested flashing only the bootloader and just now doing the flash-all.bat, I got this (TL;DR fastboot: error: Command failed):
S:\platform-tools>flash-all
Sending 'bootloader_b' (11554 KB) OKAY [ 0.051s]
Writing 'bootloader_b' (bootloader) Flashing pack version slider-1.2-8739948
(bootloader) flashing platform gs101
(bootloader) Validating partition ufs
(bootloader) Validating partition ufs
(bootloader) Validating partition partition:0
(bootloader) Validating partition partition:1
(bootloader) Validating partition partition:2
(bootloader) Validating partition partition:3
(bootloader) Validating partition bl1_b
(bootloader) Validating partition pbl_b
(bootloader) Validating partition bl2_b
(bootloader) Validating partition abl_b
(bootloader) Validating partition bl31_b
(bootloader) Validating partition tzsw_b
(bootloader) Validating partition gsa_b
(bootloader) Validating partition ldfw_b
(bootloader) Flashing partition ufs
(bootloader) Flashing partition ufs
(bootloader) Flashing partition partition:0
(bootloader) Flashing partition partition:1
(bootloader) Flashing partition partition:2
(bootloader) Flashing partition partition:3
(bootloader) Flashing partition bl1_b
(bootloader) Flashing partition pbl_b
(bootloader) Flashing partition bl2_b
(bootloader) Flashing partition abl_b
(bootloader) Flashing partition bl31_b
(bootloader) Flashing partition tzsw_b
(bootloader) Flashing partition gsa_b
(bootloader) Flashing partition ldfw_b
(bootloader) Loading sideload ufsfwupdate
OKAY [ 2.737s]
Finished. Total time: 2.800s
Rebooting into bootloader OKAY [ 0.000s]
Finished. Total time: 0.001s
< waiting for any device >
Sending 'radio_b' (82772 KB) OKAY [ 0.336s]
Writing 'radio_b' (bootloader) Flashing pack version g5123b-102852-220720-M-8851166
(bootloader) Flashing partition modem_b
OKAY [ 0.109s]
Finished. Total time: 0.457s
Rebooting into bootloader OKAY [ 0.000s]
Finished. Total time: 0.006s
< waiting for any device >
--------------------------------------------
Bootloader Version...: slider-1.2-8739948
Baseband Version.....: g5123b-102852-220720-B-8851166
Serial Number........:
--------------------------------------------
extracting android-info.txt (0 MB) to RAM...
Checking 'product' OKAY [ 0.001s]
Checking 'version-bootloader' OKAY [ 0.000s]
Checking 'version-baseband' OKAY [ 0.000s]
Setting current slot to 'b' OKAY [ 0.081s]
extracting boot.img (64 MB) to disk... took 0.213s
archive does not contain 'boot.sig'
Sending 'boot_b' (65536 KB) OKAY [ 0.266s]
Writing 'boot_b' OKAY [ 0.072s]
archive does not contain 'init_boot.img'
extracting dtbo.img (16 MB) to disk... took 0.037s
archive does not contain 'dtbo.sig'
Sending 'dtbo_b' (16384 KB) OKAY [ 0.067s]
Writing 'dtbo_b' OKAY [ 0.027s]
archive does not contain 'dt.img'
extracting pvmfw.img (1 MB) to disk... took 0.004s
archive does not contain 'pvmfw.sig'
Sending 'pvmfw_b' (1024 KB) OKAY [ 0.004s]
Writing 'pvmfw_b' OKAY [ 0.004s]
archive does not contain 'recovery.img'
extracting vbmeta.img (0 MB) to disk... took 0.001s
archive does not contain 'vbmeta.sig'
Sending 'vbmeta_b' (12 KB) OKAY [ 0.000s]
Writing 'vbmeta_b' OKAY [ 0.002s]
extracting vbmeta_system.img (0 MB) to disk... took 0.001s
archive does not contain 'vbmeta_system.sig'
Sending 'vbmeta_system_b' (4 KB) OKAY [ 0.000s]
Writing 'vbmeta_system_b' OKAY [ 0.002s]
extracting vbmeta_vendor.img (0 MB) to disk... took 0.002s
archive does not contain 'vbmeta_vendor.sig'
Sending 'vbmeta_vendor_b' (4 KB) OKAY [ 0.000s]
Writing 'vbmeta_vendor_b' OKAY [ 0.002s]
extracting vendor_boot.img (64 MB) to disk... took 0.229s
archive does not contain 'vendor_boot.sig'
Sending 'vendor_boot_b' (65536 KB) OKAY [ 0.268s]
Writing 'vendor_boot_b' OKAY [ 0.071s]
archive does not contain 'vendor_kernel_boot.img'
extracting super_empty.img (0 MB) to disk... took 0.001s
Rebooting into fastboot OKAY [ 0.000s]
< waiting for any device >
Sending 'super' (4 KB) FAILED (Write to device failed in SendBuffer() (Too many links))
fastboot: error: Command failed
Press any key to exit...

Going to try again.

Update: Thought it was getting farther the second time, but got the same thing. Time to try a different USB cable/port.
 
Last edited:

roirraW "edor" ehT

Senior Moderator
Staff member
Last edited:

V0latyle

Forum Moderator
Staff member
You are correct.

I did:

Code:
adb reboot bootloader
fastboot flash bootloader bootloader-raven-slider-1.2-8739948.img
fastboot reboot

And I'm booted into Android 12 still just fine. Below is the command prompt output:


Note to anyone, if after upgrading to 13 you want to downgrade to 12 using a full factory image's flash-all.bat, you'll at minimum have to either remove Android 12's bootloader flash line from the file, or replace it with fastboot flash bootloader bootloader-raven-slider-1.2-8739948.img (and have the right bootloader file in the same folder). Either should work fine.
The real trick will be if you can still flash the old factory image. Try to re-flash the July image (just the system image) and see if the bootloader rejects it.
 
  • Like
Reactions: roirraW "edor" ehT

Lughnasadh

Senior Member
Mar 23, 2015
6,171
7,672
Google Nexus 5
Huawei Nexus 6P
For those of you that updated to A13 - Has Google removed the ability in A13 to sideload non GP apps?
No, but they've restricted a few permissions for sideloaded apps (e.g. Notification Listener and Accessibility permissions). But those restrictions can be disabled by going to the app info page and clicking on the 3 dot menu on top right.
 
Last edited:

roirraW "edor" ehT

Senior Moderator
Staff member
The real trick will be if you can still flash the old factory image. Try to re-flash the July image (just the system image) and see if the bootloader rejects it.
There's no way I'll test that. Downgrading without wiping (because of updated app data, especially for system apps) is too much risk for me. I don't have the time to recover from. 😁

Anyone else?
 
Last edited:

Top Liked Posts

  • There are no posts matching your filters.
  • 2
    I did go through and successfully flashed my PX6 pro to AP1A.240405.002 with KSU using PixelFlasher 6.8.3.0
    I gather you're all good now?
    In the future please create post PF issues in PF thread to keep this thread tidy and focused, and always provide a support file.
    2
    I did go through and successfully flashed my PX6 pro to AP1A.240405.002 with KSU using PixelFlasher 6.8.3.0
  • 66
    Pixel 6 Pro [Raven]

    April 2, 2024:





    Note that this is mainly for the officially listed "Unlocked" Pixel 6 Pro, available directly from the Google Store. All of this will also apply to any other (carrier-specific) variant of the Pixel 6 Pro which you can achieve an unlocked bootloader on. This includes T-Mobile and AT&T variants. It's likely Verizon variants will never be able to unlock their bootloader, or if so it will require paying the right person to do so.

    Feel free to ask about general questions, but for anything that's specific to your variant, you should use one of the other already existing threads. You'll find Verizon, AT&T, and T-Mobile-related threads in those respective search results.

    Here there be dragons. 🐉 I am not responsible for anything at all. 😹

    Unlocking or locking the bootloader will wipe the device every single time, so be sure to have your data backed up before doing so, or better yet, just unlock it as soon as you get the device.


    Keep in mind that unlocking the bootloader or rooting might affect your phone's capability to use banking apps such as Google Pay, your local bank's app, or even the ability to install some apps like NetFlix. See @Pekempy's thread Working SafetyNet with Pixel 6 Pro Android 12

    If you're going to re-lock the bootloader, make sure the ROM you have on your phone is completely stock (by flashing the latest official firmware) BEFORE re-locking it.

    There are no negative consequences if you unlock or re-lock the bootloader other than it will wipe your phone, and while unlocked you get a brief screen when you boot the phone telling you (and anyone who sees your phone at the time) that the bootloader is unlocked. You will also continue to receive updates (if you've merely unlocked the bootloader, you can take updates as normal) unlike Samsung, Sony, et cetera, which have permanent major consequences with reduced functionality even if you un-root and re-lock your bootloader. If you're actually rooted (not just bootloader unlocked), you'll have to perform extra steps to manually update each month, and to keep root/re-root.


    All posts about Google Pay or banking will be reported to be deleted. Please keep this thread on-topic. There are at least one or two other How To Guide threads in this section in which folks discuss how to get around banking app restrictions when you're rooted or just have an unlocked bootloader. See @Pekempy's thread Working SafetyNet with Pixel 6 Pro Android 12
    If users persist in discussing banking apps in this thread, I will have this thread locked and only update this first post when there is new and updated information regarding the subjects of the title of the thread: Unlocking the Pixel 6 Pro bootloader, rooting, and TWRP. See @Pekempy's thread Working SafetyNet with Pixel 6 Pro Android 12

    Honorable mention to @Jawomo's aodNotify - Notification Light / LED for Pixel 6 Pro! (XDA link) / Notification light / LED for Pixel - aodNotify (Play Store link), which in my opinion restores useful functionality missing in most phones these days. It also solves some subjective issues some folks have with AOD (Always On Display), and/or solves/works around the problem where AOD is required for the optical fingerprint reader to work without the screen being on.​


    Check warranty status - *may* reveal if a phone is refurbished, only if the phone was refurbished through Google - thanks to @Alekos for making me aware of the site.
    Official Google Pixel Update and Software Repair (reported as of January 23, 2022 to still not be updated for the Pixel 6/Pro yet)

    Google's Help Page for Find problem apps by rebooting to safe mode - this can be a lifesaver and keep you from having to do a restore to 100% complete stock or even from having to do a factory reset. This will deactivate all Magisk modules, and they'll remain deactivated even after you boot normally after briefly booting to safe mode. You can reenable the Magisk modules as you wish to try to narrow down the problem if it was caused by a Magisk module. This can even get things working again after a Magisk Module wasn't finished installing and potentially causing a bootloop.

    Official Google Pixel Install fingerprint calibration software (also available at the bottom of the Update and Software Repair page above) - I believe this is only helpful if you've replaced the screen
    Official Google Android Flash Tool (OEM Unlocking needs to be toggled on - you may not have to manually unlock the bootloader - the "site" will do that on its own)
    OEM unlocking in developer options needs to be toggled on. I don't "believe" you have to actually do the "fastboot flashing unlock" command.

    ADB/Fastboot, Windows Drivers, and unlocking the bootloader (thanks @sidhaarthm for confirming unlocking the bootloader works as intended, be sure to thank him in his post)
    • You'll need this if you're going to unlock the bootloader on your Pixel 6 Pro: SDK Platform Tools (download links for Windows, Mac, and Linux). Note that you can find links to download the tools elsewhere, but I wouldn't trust them - you never know if they've been modified. Even if the person providing the link didn't do anything intentionally, the tools could be modified without them being aware. Why take a chance of putting your phone security further at risk?
    • For Windows, get Google's drivers here Get the Google USB Driver (ADB will likely work while the phone is fully booted, but if you're like me, you'll need these drivers for after you "adb reboot-bootloader", to be able to use ADB and Fastboot.
    • Thanks to @96carboard for posting the details of unlocking the bootloader, be sure to thank him in his post. Unlocking or locking the bootloader will wipe the device every single time, so be sure to have your data backed up before doing so, or better yet, just unlock it as soon as you get the device. Keep in mind that unlocking the bootloader or rooting might affect your phone's capability to use banking apps such as Google Pay, or your local bank's app. If you're going to re-lock the bootloader, make sure the ROM you have on your phone is completely stock (by flashing the latest official firmware) BEFORE re-locking it. My experience on my Pixel 1 was that there were no negative consequences if you unlock or re-lock the bootloader other than it will wipe your phone, and while unlocked you get a brief screen when you boot the phone telling you (and anyone who sees your phone at the time) that the bootloader is unlocked. All of this should still be the case. You will also continue to receive updates. Unlike Samsung, Sony, et cetera, which have major consequences with reduced functionality even if you un-root and re-lock your bootloader. If you're actually rooted (not just bootloader unlocked), you'll have to perform extra steps to keep root/re-root.:


      The unlock process works like this:

      1) Take brand new fresh phone out of box. Do NOT put sim card in it, just power it on (you can put a SIM card if you want, you just don't have to).
      2) When it starts harassing you to join Google, hit "skip" and "remind me tomorrow" as applicable until you reach home screen. YOU DO NOT need to plug in a google account.
      3) Settings --> About --> Build number. Repeatedly tap it until it says you're a developer.
      4) Back --> Network --> WiFi and connect it.
      5) Back --> System --> Developer --> OEM unlocking (check), USB debugging (check), plug in USB, authorize on the phone when requested.

      Using the Platform Tools previously mentioned in command line/terminal:
      6) #
      Code:
      adb reboot-bootloader
      7) #
      Code:
      fastboot flashing unlock

      Now that you've unlocked it, it has been wiped, so repeat 1-4, then disable all the google spyware, and go ahead and start using it while waiting for aosp and root.

      Official Instructions for Locking/Unlocking the Bootloader
    Personally, I would always use the official drivers Google provides unless they just don't work for whatever reason: Get the Google USB Driver (this is for Windows). They work for me. They are rarely updated, but they are every once in a great while, sometimes years in-between.
    I agree with this. be careful using drivers or adb/fastboot tools. Some are fine, but there's no need for it really anymore. Google has made it very easy to install drivers and Platform-Tools (adb/fastboot tool).

    Google provides the Fastboot/ADB tool (Platform-Tools) and Google USB Drivers (adb/fastboot interface). This will allow any Pixel to interface with Windows using the fastboot/adb protocol. Official Google USB Driver includes support for both the Fastboot and ADB driver interface. There are 3 main drivers (Fastboot, ADB and MTP/Portable File Transfer). The MTP/Portable File Transfer driver is built-in to Windows 7-11.

    Fastboot/ADB Driver Interface - Official Download Link:
    When flashing a full image or unlocking your bootloader, the fastboot interface is being used.

    First Download official Google USB Drivers (it's a zip file). Extract the zip (important!). Right-click on the android_winusb.inf file and hit install. You can then restart your phone to the Bootloader Screen (hold vol-down while it restarts or turns on). When you plug in your phone, Windows Device Manager will show a new device at the top: Android Device: Android Bootloader Interface.

    Using the ADB interface: It's the same driver. Enable USB Debugging on your phone, then plug it in to your computer. A prompt will appear on your phone (to allow USB Debugging). The driver in Device Manager will appear as Android Device: Android Composite ADB interface.

    Now you can download and use Platform-Tools to flash an Android Image, OTA or run adb/fastboot commands.
    Official Download Page
    "Android SDK Platform-Tools is a component for the Android SDK. It includes tools that interface with the Android platform, such as adb, fastboot, and systrace"

    It's best to make Platform-Tools available system-wide. Download Platform-Tools from the above link and extract it to your C:\ drive - that way you will have a folder to add to the PATH Environment under Window System Properties Menu, Advanced, Environment Variables, System Variables, PATH (google how to do this, very easy). What this does is allow adb/fastboot commands to be run from anywhere in the system, so you don't have to be in the platform-tools folder to run adb/fastboot commands and flash an Android Image (Official or Android Fork such as ProtonAOSP).

    Rooting-related


    No longer applies - Things that make rooting more complicated on Android 12
    @V0latyle posted a new thread with some very important and fascinating information about the increased difficulty to root Android 12: Read this before rooting. Be sure to thank him there.

    A list of the other important guides - be sure to thank the respective OPs
    For all relevant guide threads just click the yellow "How To Guide" quick filter above the list of threads in the Pixel 6 Pro section.


    TWRP (not made for the Pixel 6 Pro yet - will update when it has)
    I would guess that this should be the appropriate URL for official TWRP custom recovery for the Pixel 6 Pro, but who knows when/if that will actually be made available, and it may become available unofficially in these forum sections before being made official. I'll adjust this URL as needed. https://twrp.me/google/googlepixel6pro.html.

    Custom kernels for stock ROM(s)

    Factory Images (requires an unlocked bootloader)
    It's also handy to have to the full official firmware available, whether it's to recovery from accidents or for actual development. Note the official link to the general Factory Images for Nexus and Pixel Devices page. The following link goes directly to the Pixel 6 Pro (Raven) section: Pixel 6 Pro Factory Images. I prefer to actually bookmark a link to the device listed immediately below the device I want the firmware for, because Google dumbly (in my opinion) puts the latest firmware at the bottom of the list for each particular device, and that ends up making you scroll a lot after a year or two of monthly updates.

    Note: You can still get the December 2021 Factory Images and OTA from this thread, if you need them for any reason: Alternate links to December - all full factory images and OTAs available

    Full OTA Images (doesn't require an unlocked bootloader)

    The usefulness of having Verity and Verification enabled (now that it's not needed for root) - post #2 below.

    Regarding P6P 5G model numbers and capabilities - post #3 below.

    List of all Pixel monthly security bulletins and Play System Updates - post #4 below.

    How I root and update (which is identical whether rooting the first time or updating):
    • Use the latest Magisk Stable (in my case, I keep the app "hidden" / renamed)
    • Used the full firmware zip, extracted to the same folder as the latest Platform Tools (S:\platform-tools)
    • Extracted the new boot.img
    • Copied new boot.img to the phone
    • Patched the new boot.img with Magisk Stable
    • Renamed Magisk'd boot.img so I know what version of firmware it's for
    • Copied the Magisk'd boot.img back to the computer
    • Disabled all my Magisk Modules
    • Removed the "-w " from the flash-all.bat
    • Re-edited the flash-all.bat to verify I saved it with the "-w " taken out
    • Open a Command Prompt, navigated to S:\platform-tools
    • adb reboot bootloader
    • flash-all.bat
    • Let phone boot, unlock it, check that it's working, allow the update process to finish (gave it five minutes or so)
    • adb reboot bootloader
    • fastboot flash boot kernel.img (renamed Magisk'd boot.img)
    • fastboot reboot
    • Unlock, check everything's working
    • Re-enabled the most basic Magisk Modules which I was sure wouldn't cause a critical issue
    • Reboot, unlock, made sure everything's working
    Back to modding!

    I may append these first four posts with further useful information or links as needed.
    16
    The unlock process works like this;

    1) Take brand new fresh phone out of box. Do NOT put sim card in it, just power it on.
    2) When it starts harassing you to join google, hit "skip" and "remind me tomorrow" as applicable until you reach home screen. YOU DO NOT need to plug in a google account.
    3) Settings --> About --> Build number. Tap it until it says you're a developer.
    4) Back --> Network --> Wifi and connect it.
    5) Back --> System --> Developer --> OEM unlocking (check), USB debugging (check), plug in USB, authorize when requested.
    6) # adb reboot-bootloader
    7) # fastboot flashing unlock

    Now that you've unlocked it, it has been wiped, so repeat 1-4, then disable all the google spyware, and go ahead and start using it while waiting for aosp and root.
    16
    I'm less concerned about the steps/commands as I am with how you updated (auto OTA, sideload, factory image), whether you booted to Android 13, and what happened when you rolled back (I assume using the factory image)
    Used a factory image and booted into Android 13. Auto OTA and a sideload of the full OTA will end in the same result as both use update_engine. I did boot into Android 13 so the ARB counter did get incremented.
    Downgraded by just forcing Android 12 system image with a wipe, switched slots, and did it again. It might be able to be done with a full OTA, but I didn't test it because of the following issue:

    Android 12 doesn't work properly on the Android 13 bootloader.

    It boots up just fine, appears to work just fine, made and received calls and texts, however the issue @bush911 had with WebView crashing is true. It's more than just WebView, the media DRM APEX immediately crashes. WebView crashes sometime after launch when it tries to find out if ClearPlay or WideVine are functional, and DRM Info crashes immediately when I try to launch it. Without DRM working that means you won't be able to play some music or movies and won't be able to use Netflix or any other streaming app.
    There might be more systems or modules nonfunctional, but without working browsers your smartphone isn't going to be more useful than a dumbphone.

    @roirraW "edor" ehT
    So I guess it's time to retract that you can revert to Android 12, because until a modder comes along to cook up a custom Android 12 ROM with Android 13 APEXs or patched ones it won't work.
    15
    SDK Platform Tools updated to v33.0.1 (March 2022):

    33.0.1 (March 2022)​

    • adb
      • Fixes Windows mdns crashes.
      • Fixes enable-verity/disable-verity on old devices.
      • Fixes "install multiple" on old devices
      • Improves the help output to include all supported compression methods.
    13
    Just to let everyone know, updating to .037 and re-rooting (without wiping anything) worked with no problems. My method is to just replace -w with --disable-verity --disable-verification in the flash-all.bat file and run the flash-all command. I then let it reboot, patch the boot image, return to bootloader and flash the patched boot image.

    Canary 23014

    EDIT: Thank you @ipdev for confirming my inquiry that this method would work back on Nov. 4 👍