Here is my fork of TWRP device tree for crosshatch and Android 11:
https://github.com/cosmicdan/android_device_google_crosshatch
EDIT: Obviously I give permission to TWRP maintainers to take anything I do and put it into the official tree, I don't "own" any of this work
Dev only! Compile yourself! Just follow the guide at
https://github.com/minimal-manifest-twrp/platform_manifest_twrp_aosp and manually clone the device tree before doing any lunch command. Also note the device prefix is not twrp_ but aosp_ in this new tree.
Please dont ask for an image, its in active development so its way easier for you to just pull my changes from the DT - I will push every fix ASAP, so keep an eye on it if you're interested and able to compile stuff if you want to contribute or get my updates ASAP. Also note that it uses prebuilt kernel image so it should be possible to compile on a low-end system/VM/WSL setup (as long as you limit make with -j to not get OOM error on compile).
Follow official TWRP install docs to flash, if you want. I.e. (1) hotboot the boot image; (2) push boot image to device; (3) Flash image in TWRP with option "Recovery Ramdisk", will flash to both boot_a and boot_b.
NOT WORKING:
- Cannot mount data
- Touch screen (need to manually insmod some ko's from vendor like the android-10 tree does, literally automating this now)
UNTESTED:
- Fastbootd
I'm working on this today and tomorrow, got a long weekend here in Oz - yay! But anyway, it boots - TWRP for Android 11 seems to be coming along nicely.
Ultimate goal is to create a TWRP that can obviously mount data, but if not possible then it should at least be able to do everything else - even doing a backup of data should be OK here, backing up to a USB-OTH disk of course since we have no other storage.
My main goal is to just get fastbootd working, so I can flash GSI's and custom kernels and such without juggling all the crap on a PC like I currently do. Stay tuned for an update in the next day or two.
UPDATE/IMPORTANT:
I forgot to mention that for some reason, on latest firmware at least, you need to flash insecure vbmeta
*before you boot or flash a new boot.img, EVERY time*. Just do the usual:
fastboot --disable-verification --disable-verity --slot all flash vbmeta vbmeta.img