katerpanne
Members
- Apr 19, 2014
- 3,445
- 332
i try to help as far as i can… but i dont know where is your challenge…I know this was passive-aggressive but thanks anyway![]()
i try to help as far as i can… but i dont know where is your challenge…I know this was passive-aggressive but thanks anyway![]()
Mi 11 Ultra has a Global model, so if you're using our ROM, "OK Google" (Voice Match) should work fine when the screen is off.Does this mean that "Ok Google" won't work when the screen is off on Chinese phones? Particularly interested whether it will work on Chinese version of Mi 11 Ultra?
Thanks for answer. As far as I know Mi 11 Ultra has not only Global model but Chinese model too. So I desperately trying to find out if it be possible to use "OK Google" (Voice Match) when the screen is off with your ROM on Chinese model from Ali...)).Mi 11 Ultra has a Global model, so if you're using our ROM, "OK Google" (Voice Match) should work fine when the screen is off.
What I told him was relevant to Mi 10T Lite (gauguin) which supports Voice Match when the screen is off, while the Chinese model Redmi Note 9 Pro 5G (gauguinpro) does not, due to different codenames.
Then I answered your question. Both Chinese and Global models of Mi 11 Ultra are codename star, so Voice Match will work the same.Thanks for answer. As far as I know Mi 11 Ultra has not only Global model but Chinese model too. So I desperately trying to find out if it be possible to use "OK Google" (Voice Match) when the screen is off with your ROM on Chinese model from Ali...)).
look here…Hi everyone, if I am in version 12 can i update to 13 by recovery without losing data? In a poco f3, Thanks!
So... Sorry for upping this message but I didnt get an answerHello everyone.
Can I update from 12.5 to 13 via recovery? If so which data I will loose?
Make a screenshot and postSo, you boot to OFox, it asks for a decryption pattern, I input the pattern, it says it doesn't work and after I hit the back button it still drops to the OFox menu and I can browse the files, I can manage backups, I can even go to the app manager in OFox and it sees all my apps, etc, so ___seemingly___ the pattern did work and it was able to decrypt + mount everything but still, there was an error message etc..
When I remove the pattern is doesn't ask for anything, just drops me to the file browser. When I add back the pattern and all my fingerprints it starting this again. Even after formating /data.
Hope this helps to understand the situation.
If I read well:
Yes, once you will be upgrading from the Recovery type ROMOTA uptades? You mean, is it possible that after installing the latest rom, the next will come like a regular udpate? No need for computer, and twrp? Or did I misunderstand?
yes i update and i didnt loose data, you can uploadSo... Sorry for upping this message but I didnt get an answerIf I can find info somewhere please give me a link.
Make a screenshot and post
Press in parallel Vol- and Pow for screenshot in OF/TWRP
It should say Successful decryption for User 0 but Failed for User 999 - and that's ok
Then strangePlease read back properly and check post #5432 and see the screenshots under the spoiler tag: it's not the second space (or whatever other) user (999) issue, it says decryption of user 0 was unsuccessful.
/dev/block/bootdevice/by-name/userdata /data f2fs noatime,nosuid,nodev,discard,inlinecrypt,reserve_root=32768,resgid=1065,fsync_mode=nobarrier latemount,wait,check,formattable,fileencryption=aes-256-xts:aes-256-cts:v2+emmc_optimized+wrappedkey_v0,keydirectory=/metadata/vold/metadata_encryption,metadata_encryption=aes-256-xts:wrappedkey_v0,quota,reservedsize=128M,sysfs_path=/sys/devices/platform/soc/1d84000.ufshc,checkpoint=fs
Thanks for your reply!Then strange
But the answer to your other question:
Inspect /vendor/etc/fstab.* file (by MiXPlorer with root or copy the file to Download folder by TWRP/OF)
Inside, find the filesystem definition for userdata:
(scroll to the right to read...)Code:/dev/block/bootdevice/by-name/userdata /data f2fs noatime,nosuid,nodev,discard,inlinecrypt,reserve_root=32768,resgid=1065,fsync_mode=nobarrier latemount,wait,check,formattable,fileencryption=aes-256-xts:aes-256-cts:v2+emmc_optimized+wrappedkey_v0,keydirectory=/metadata/vold/metadata_encryption,metadata_encryption=aes-256-xts:wrappedkey_v0,quota,reservedsize=128M,sysfs_path=/sys/devices/platform/soc/1d84000.ufshc,checkpoint=fs
In my case, above, it is f2fs with aes-256 encryption
joyeuse:/ # grep "/dev/block/bootdevice/by-name/userdata" /vendor/etc/fstab.*
/vendor/etc/fstab.default:/dev/block/bootdevice/by-name/userdata /data f2fs noatime,nosuid,nodev,discard,reserve_root=32768,resgid=1065,fsync_mode=nobarrier,inlinecrypt latemount,wait,check,formattable,fileencryption=ice,wrappedkey,quota,reservedsize=128M,checkpoint=fs
/vendor/etc/fstab.emmc:/dev/block/bootdevice/by-name/userdata /data f2fs noatime,nosuid,nodev,discard,reserve_root=32768,resgid=1065,fsync_mode=nobarrier,inlinecrypt latemount,wait,check,formattable,fileencryption=ice,wrappedkey,quota,reservedsize=128M,checkpoint=fs
Thanks for your reply!
Do you have a joyeuse, too? Because my fstab is really different compared to yours:
Code:joyeuse:/ # grep "/dev/block/bootdevice/by-name/userdata" /vendor/etc/fstab.* /vendor/etc/fstab.default:/dev/block/bootdevice/by-name/userdata /data f2fs noatime,nosuid,nodev,discard,reserve_root=32768,resgid=1065,fsync_mode=nobarrier,inlinecrypt latemount,wait,check,formattable,fileencryption=ice,wrappedkey,quota,reservedsize=128M,checkpoint=fs /vendor/etc/fstab.emmc:/dev/block/bootdevice/by-name/userdata /data f2fs noatime,nosuid,nodev,discard,reserve_root=32768,resgid=1065,fsync_mode=nobarrier,inlinecrypt latemount,wait,check,formattable,fileencryption=ice,wrappedkey,quota,reservedsize=128M,checkpoint=fs
For example even though it is f2fs it has no metadata_encryption specified and fileencryption is ice not aes-256-xts:aes-256-cts:v2+emmc_optimized+wrappedkey_v0 as I see in your output..
Thanks. userdata is what I should look for?mount | grep '/data'
/dev/block/bootdevice/by-name/userdata on /data type f2fs (rw,lazytime,seclabel,nosuid,nodev,noatime,background_gc=on,gc_merge,discard,no_heap,user_xattr,inline_xattr,acl,inline_data,inline_dentry,flush_merge,extent_cache,mode=adaptive,active_logs=6,reserve_root=23056,resuid=0,resgid=1065,inlinecrypt,alloc_mode=default,checkpoint_merge,fsync_mode=nobarrier)
/dev/block/bootdevice/by-name/userdata on /data/user/0 type f2fs (rw,lazytime,seclabel,nosuid,nodev,noatime,background_gc=on,gc_merge,discard,no_heap,user_xattr,inline_xattr,acl,inline_data,inline_dentry,flush_merge,extent_cache,mode=adaptive,active_logs=6,reserve_root=23056,resuid=0,resgid=1065,inlinecrypt,alloc_mode=default,checkpoint_merge,fsync_mode=nobarrier)
I have Lisa (device was originally launched with A11)Thanks for your reply!
Do you have a joyeuse, too? Because my fstab is really different compared to yours:
Code:joyeuse:/ # grep "/dev/block/bootdevice/by-name/userdata" /vendor/etc/fstab.* /vendor/etc/fstab.default:/dev/block/bootdevice/by-name/userdata /data f2fs noatime,nosuid,nodev,discard,reserve_root=32768,resgid=1065,fsync_mode=nobarrier,inlinecrypt latemount,wait,check,formattable,fileencryption=ice,wrappedkey,quota,reservedsize=128M,checkpoint=fs /vendor/etc/fstab.emmc:/dev/block/bootdevice/by-name/userdata /data f2fs noatime,nosuid,nodev,discard,reserve_root=32768,resgid=1065,fsync_mode=nobarrier,inlinecrypt latemount,wait,check,formattable,fileencryption=ice,wrappedkey,quota,reservedsize=128M,checkpoint=fs
For example even though it is f2fs it has no metadata_encryption specified and fileencryption is ice not aes-256-xts:aes-256-cts:v2+emmc_optimized+wrappedkey_v0 as I see in your output..
Indeed, joyeuse been released running Android 10 originally. It's clear that it's FBEv1 but not clear how && why now, running on A12 MIUI 13 OFox runs to an error even though decrypt by OFox seems to work anyway..Seems that your device was originally launched with A10 (or lower) - search in the document for:
fileencryption=ice
Strange but have you tested scenarios like:Indeed, joyeuse been released running Android 10 originally. It's clear that it's FBEv1 but not clear how && why now, running on A12 MIUI 13 OFox runs to an error even though decrypt by OFox seems to work anyway..
I already answered all these questions here in #5,432Maybe, decryption works correctly (it decrypts only if you enter correct pin/pattern) but it just prints an error instead of success
I think this is OK.Thanks. userdata is what I should look for?
Code:/dev/block/bootdevice/by-name/userdata on /data type f2fs (rw,lazytime,seclabel,nosuid,nodev,noatime,background_gc=on,gc_merge,discard,no_heap,user_xattr,inline_xattr,acl,inline_data,inline_dentry,flush_merge,extent_cache,mode=adaptive,active_logs=6,reserve_root=23056,resuid=0,resgid=1065,inlinecrypt,alloc_mode=default,checkpoint_merge,fsync_mode=nobarrier) /dev/block/bootdevice/by-name/userdata on /data/user/0 type f2fs (rw,lazytime,seclabel,nosuid,nodev,noatime,background_gc=on,gc_merge,discard,no_heap,user_xattr,inline_xattr,acl,inline_data,inline_dentry,flush_merge,extent_cache,mode=adaptive,active_logs=6,reserve_root=23056,resuid=0,resgid=1065,inlinecrypt,alloc_mode=default,checkpoint_merge,fsync_mode=nobarrier)
Instead of making assumptions, one possibility is to make a good copy of your data (outside the device) and install via fastboot the latest stable stock rom release for your device.I already answered all these questions here in #5,432
- you don't enter pin/pattern, does OF still decrypts, ie, do you still see correct file names
--> If I don't enter a pin / pattern then internal storage and /data is unreadable (I mean: filenames are gibberish)
- you enter wrong pin/pattern, does OF still decrypts,
ie, do you still see correct file names
--> If enter a wrong pin / pattern then internal storage and /data is unreadable (I mean: filenames are gibberish)
And yes, that's my idea, too, that "it just prints an error instead of success" but without knowing what's the trigger for the error message I won't rely on it (i.e. what if I make a /data backup and I want to use it.. shall I trust the backup or not? Shall I trust the error message or not?). Sorry for being OffTopic but it seems that it does this only with /data encrypted by Xiaomi.EU (and more than likely with Xiaomi factory ROM, too).
I'm thinking about this, too, although this unit in my hands never saw anything else just the factory A10 ROM, upgraded to A11 ROM and then the A11 Xiaomi.EU ROM and now the A12 - so this unit never had any AOSP or LOS based ROM or anything else.Instead of making assumptions, one possibility is to make a good copy of your data (outside the device) and install via fastboot the latest stable stock rom release for your device.
Then install xiaomi.eu again (I think xiaomi.eu don't flash /data partition, if it does, then only install latest stable xiaomi.eu via fastboot).
This way, I think you force the device to have all partitions according the last "factory" state.