This one (obviously) doesn’t work for A.0023 anymore and we require a new magisk patched boot image for that version.
Since I’m eager to learn, given that I have an A.0023 boot.img, Magisk, development tools and a somewhat okay understanding of c/c++, what would one need to do to create such a patched boot image?
@TeamB58 Thanks for confirming, I already made some progress regarding LOS, unfortunately I wasn’t able to get decryption working on /e/ yet.
Thanks @AnotherElk and @d2w for testing.
I haven’t had the time yet to commit the changes and and create new releases.
Regarding this, I assume it was done to avoid having to update the bootloader and breaking ROMs that don’t use dynamic partitions. I does however go against googles recomendations: For Android 10 devices, the bootloader MUST NOT pass skip_initramfs to the kernel command-line. Instead, bootloader should pass androidboot.force_normal_boot=1 to skip recovery and boot normal Android. Devices
(https://source.android.com/docs/core/ota/dynamic_partitions/implement#system-as-root-changes)
AFAIK TWRP does not yet support decryption on Android 13 unfortunately.
You don’t need TWRP for root however. A fix for Magisk supporting FPOS with retrofitted dynamic partitions has just been merged yesterday.
Until a new Magisk release is out, you can use this
However, I do need to ask a noob-question: After installing this apk, I only need to use it to patch the boot.img of Android 13 Fairphone-OS, right? Or is there more I have to do?
Just for feedback: It worked! For slot b, that is, slot a would just not boot. I suspect that it wasn’t (properly) updated to Android 13. Guess I’ll manually flash all images on that slot completely new and try again.
Edit: Nope, slot a remains a diva. Not sure what’s wrong there, even after I ran the Fairphone flash script and then flashed the patched boot.img, only slot b can boot and has root. Slot a just has a bootloop
Edit2: Well this is getting strange. I ran the Fairphone flash script again, and made sure both slots can boot into vanilla FP OS. Then I did the entire “boot into fastboot, determine slot, flash to other slot, check if it works, then try again with other slot” routine. Now Slot A boots perfectly fine and has root, but Slot B is the diva that cannot even boot if I flash the original boot.img to boot_b, no matter how often I try.
Fairphone’s official flash script erases several partitions on slot b, making slot b unbootable and setting slot a to active, regardless which slot was active previously.
I guess they did that to prevent booting a different android version from a different slot, which could corrupt userdata, while also saving some time by not flashing the large partitions twice.
Thanks for still spending time on this, much appreciated.
It’s great to see decryption working again at least as long as /e/OS still didn’t make the jump to Android 13.
I wasn’t able to permanently flash this image. When I tried the “Flash Current TWRP” option it complained that ramdisk files have been modified, and when I tried “Install Recovery Ramdisk” it caused a bootloop.
The bootloop was similar to the one caused by Magisk not working with Fairphone’s retrofitted partitions before it was patched (see history of this topic). Apparently TWRP uses magiskboot for both operations, could it be that the version it uses is outdated and as such still has that issue?