-
Notifications
You must be signed in to change notification settings - Fork 0
TWRP failing to mount partition with ROM #2
Comments
Yes, mine is a stripped down basic functions only. If you decrypt /data and remove the force encrypt. It should be able to do backups. There is remove dm-verity- force encrypt project by zackptg5 https://forum.xda-developers.com/android/software/universal-dm-verity-forceencrypt-t3817389 |
Of course if you can make real decrypt work, please do. Good job by the way. |
If fallback uses /system vold. Will this give trouble if you change away from stock ROM? |
Possibly. I do not know enough. It seems like the TWRP builds are just missing something related to how Teracube or the manufacturer encrypts the data partition. So either Sharad could see if the manufacturer can provide the relevant blobs or building an image with If I had two Teracubes (one for dev and one for everyday use) I would probably flash the Google System Image and see what it uses for encryption there to see if the fallback method gives me trouble outside of the stock ROM. Perhaps Sharad could test a build of TWRP on his Teracube (since he is running the GSI) to see if the fallback method causes trouble. |
Still does not request password. Must be something different between our two builds where your build prompts for the password while mine does not. |
I plan to add those lines mentioned to my device mk file and build another one this morning. |
Well , this is not working. The 9.0 Omni tree is missing the statis_library files needed for vold_decrypt appearently. The commit you shared , and I tried to apply was for 7.1 branch. I know it's possible to have decrypt, but the method is above me, I guess. |
Alright, when I added "TW_CRYPTO_USE_SYSTEM_VOLD := true" the build failed, with missing so files. So, I compared my treacube tree to the tree for my daily phone. It has working decrypt. (Redmi Note 8). The BoardConfig from Redmi has "TW_INCLUDE_FBE := true" i added this line and it built. I didnt add any key-master libs, so might not work yet. but here is link to try please. |
I'll try this build, I also patched the errors I got with the vold_decrypt in this commit 17d8ef5 And I got a build for that here: https://github.com/gatlinnewhouse/Teracube_twrp-device-tree/releases/tag/v0.1.0-mrm-alpha I'll try both |
|
Found some leads: |
Made interesting progress with that guide for mediatek porting. I got the error: "decryption taking too long... killing" instead. https://gist.github.com/gatlinnewhouse/c2889989aca0a13ed143fde0da32fa46 |
Found someone trying to get decryption to work on the same chipset here: https://forum.xda-developers.com/android/help/help-twrp-mt6771v-ct-android-9-pie-t4061571 |
Found fstab. cat /vendor/nvdata/fstab.mt6771
# 1 "vendor/mediatek/proprietary/hardware/fstab/mt6771/fstab.in"
# 1 "<built-in>"
# 1 "<command-line>"
# 1 "/usr/include/stdc-predef.h" 1 3 4
# 1 "<command-line>" 2
# 1 "vendor/mediatek/proprietary/hardware/fstab/mt6771/fstab.in"
# 98 "vendor/mediatek/proprietary/hardware/fstab/mt6771/fstab.in"
/dev/block/platform/bootdevice/by-name/system / ext4 ro wait,verify,recoveryonly
/dev/block/platform/bootdevice/by-name/vendor /vendor ext4 ro wait,verify,recoveryonly
/dev/block/platform/bootdevice/by-name/userdata /data ext4 noatime,nosuid,nodev,noauto_da_alloc,errors=panic wait,check,formattable,quota,resize,reservedsize=128m,forcefdeorfbe=/dev/block/platform/bootdevice/by-name/metadata
/dev/block/platform/bootdevice/by-name/cache /cache ext4 noatime,nosuid,nodev,noauto_da_alloc,discard wait,check,formattable
/dev/block/platform/bootdevice/by-name/protect1 /mnt/vendor/protect_f ext4 noatime,nosuid,nodev,noauto_da_alloc,commit=1,nodelalloc wait,check,formattable
/dev/block/platform/bootdevice/by-name/protect2 /mnt/vendor/protect_s ext4 noatime,nosuid,nodev,noauto_da_alloc,commit=1,nodelalloc wait,check,formattable
/dev/block/platform/bootdevice/by-name/nvdata /mnt/vendor/nvdata ext4 noatime,nosuid,nodev,noauto_da_alloc,discard wait,check,formattable
/dev/block/platform/bootdevice/by-name/nvcfg /mnt/vendor/nvcfg ext4 noatime,nosuid,nodev,noauto_da_alloc,commit=1,nodelalloc wait,check,formattable
/dev/block/platform/bootdevice/by-name/persist /mnt/vendor/persist ext4 noatime,nosuid,nodev,noauto_da_alloc,commit=1,nodelalloc wait,check,formattable
/devices/platform/externdevice* auto auto defaults voldmanaged=sdcard1:auto,encryptable=userdata
/devices/platform/11200000.usb3_xhci* auto vfat defaults voldmanaged=usbotg:auto
/dev/block/platform/bootdevice/by-name/frp /persistent emmc defaults defaults
/dev/block/platform/bootdevice/by-name/nvram /nvram emmc defaults defaults
/dev/block/platform/bootdevice/by-name/proinfo /proinfo emmc defaults defaults
/dev/block/platform/bootdevice/by-name/lk /bootloader emmc defaults defaults
/dev/block/platform/bootdevice/by-name/lk2 /bootloader2 emmc defaults defaults
/dev/block/platform/bootdevice/by-name/para /misc emmc defaults defaults
/dev/block/platform/bootdevice/by-name/boot /boot emmc defaults defaults
/dev/block/platform/bootdevice/by-name/recovery /recovery emmc defaults defaults
/dev/block/platform/bootdevice/by-name/logo /logo emmc defaults defaults
/dev/block/platform/bootdevice/by-name/expdb /expdb emmc defaults defaults
/dev/block/platform/bootdevice/by-name/seccfg /seccfg emmc defaults defaults
/dev/block/platform/bootdevice/by-name/tee1 /tee1 emmc defaults defaults
/dev/block/platform/bootdevice/by-name/tee2 /tee2 emmc defaults defaults
/dev/block/platform/bootdevice/by-name/scp1 /scp1 emmc defaults defaults
/dev/block/platform/bootdevice/by-name/scp2 /scp2 emmc defaults defaults
/dev/block/platform/bootdevice/by-name/sspm_1 /sspm_1 emmc defaults defaults
/dev/block/platform/bootdevice/by-name/sspm_2 /sspm_2 emmc defaults defaults
/dev/block/platform/bootdevice/by-name/md1img /md1img emmc defaults defaults
/dev/block/platform/bootdevice/by-name/md1dsp /md1dsp emmc defaults defaults
/dev/block/platform/bootdevice/by-name/md1arm7 /md1arm7 emmc defaults defaults
/dev/block/platform/bootdevice/by-name/md3img /md3img emmc defaults defaults
/dev/block/platform/bootdevice/by-name/cam_vpu1 /cam_vpu1 emmc defaults defaults
/dev/block/platform/bootdevice/by-name/cam_vpu2 /cam_vpu2 emmc defaults defaults
/dev/block/platform/bootdevice/by-name/cam_vpu3 /cam_vpu3 emmc defaults defaults
/dev/block/platform/bootdevice/by-name/gz1 /gz1 emmc defaults defaults
/dev/block/platform/bootdevice/by-name/gz2 /gz2 emmc defaults defaults
/dev/block/platform/bootdevice/by-name/spmfw /spmfw emmc defaults defaults
/dev/block/platform/bootdevice/by-name/boot_para /boot_para emmc defaults defaults
/dev/block/platform/bootdevice/by-name/odmdtbo /odmdtbo emmc defaults defaults
/dev/block/platform/bootdevice/by-name/dtbo /dtbo emmc defaults defaults
/dev/block/platform/bootdevice/by-name/otp /otp emmc defaults defaults Why did I search for it? I needed to see what encryption flags the device is booting with to see if your comments on Specifically |
Or if I can find the kernel source of the Teracube and compile a kernel with dm-verity disabled in the fstab then maybe TWRP will be able to decrypt the partition without having to flash a newly patched |
Dm-verity really does not effect /data nor encryption |
This guy got decryption working on a similar device: https://forum.xda-developers.com/android/development/recovery-twrp3-3-1-umidigi-f1-play-t4007315 https://github.com/TeamWin/android_device_umidigi_f1_play/ I really think the encryption of the Teracube is similar to this device based on the Teracube's vendor fstab |
Got a boot log. Looking through it, it looks like it uses |
Teracube released their source code! Board dump. Unfortunately without knowing which config to use, building with the kernel source just throws this flag:
EDIT: Building a new recovery image with |
Errors building with the building with
building with
Smh. https://github.com/gatlinnewhouse/Teracube_twrp-device-tree/blob/v0.1.0-mrm-alpha/BoardConfig.mk Manufacturer is Vanzo out of China. Internal vanzo name is Here's a vanzo twrp build for another device: |
That other build linked is Android 5. So not likely to be compatible tree |
Kernel source builds went well. Using configs from your device tree with the kernel source resulted in a twrp img file which will not boot into twrp after choosing to boot into recovery. Using the config I already had laying around (in the master branch of this repo) I could get twrp to boot but no password prompt for mounting /data (also can't select data to mount manually in the twrp menu). |
The mounting issue would be related to the fstab. |
Okay, it prompts for a password now I entered the wrong password when testing it earlier but now have to run errands. Will test again and update here (and on teracube forums if it works). Still does not work with correct password. Grabbing logs |
Device settings say
Magisk Manager says
Interesting bit
Interesting bits
Will work on this more tomorrow. |
Same problem ! I tried everything like formatting data then I booted in Twrp again then I saw data is decrypted and I flashed dm-verity-force-encryption-disabler and It showed successfully flashed but when I setup my device and I booted into Twrp again the data was showing encrypted and _TWRP doesn't prompt for password to decrypt data _ What can I do now? Help me ! Device : Xiaomi MI 6 |
@ShitijHalder I am sorry but I am no closer to understanding why this is happening than you are. I know that Teracube has recently (in the past two weeks) released official kernel sources, but as of now I am not pursuing developing TWRP for Teracube One on Android 9. When a stable official release of Android 10 occurs then I might come back to trying to get a build working. Basically: here be dragons and I am just as lost as you. Sorry I cannot help. |
No Worry bro ! |
My compiled TWRP image cannot mount the encrypted partition. Does not prompt for a password.
@mrmazakblu's TWRP image will prompt for a password. Inputting my password that I use to start android does not decrypt the data. Can't backup a log file to the SD Card.
https://gist.github.com/gatlinnewhouse/fb21b268983a41ff1a375e5429d5f98f
The text was updated successfully, but these errors were encountered: