This forum uses cookies
This forum makes use of cookies to store your login information if you are registered, and your last visit if you are not. Cookies are small text documents stored on your computer; the cookies set by this forum can only be used on this website and pose no security risk. Cookies on this forum also track the specific topics you have read and when you last read them. Please confirm whether you accept or reject these cookies being set.

A cookie will be stored in your browser regardless of choice to prevent you being asked this question again. You will be able to change your cookie settings at any time using the link in the footer.

Thread Rating:
  • 1 Vote(s) - 5 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Rooting Android
#21
Hi there

I'm trying to apply this process using the Tinker OS 20180206-tinker-board-android-marshmallow-userdebug-v13.13.0.74.img from here:
    https://github.com/TinkerBoard/android-6...74.img.zip

On completion of the process and running the SuperSU app, it states:
    
  • "No SU binary installed, and SuperSU cannot install it."

(I note that there is no /system/lib(64) folder in this OS. Replacing "/system/lib\(64\)" with "/system/lib" does not achieve a successful outcome either.)

I would be interested to know whether you have used the same img or a different version.

Thanks



(04-01-2018, 10:56 AM)SPARKRU Wrote: Thank people! Im root my device  

I corrected the script in these lines 
adb shell chmod 0755 /system/lib\(64\)/libsupol.so
adb shell chcon u:object_rConfusedystem_fileConfused0 /system/lib\(64\)/libsupol.so 

And deleted duplicate lines 
adb push armv7/su /system/bin/.ext/.su
adb shell chmod 0755 /system/bin/.ext/.su
adb shell chcon u:object_rConfusedystem_fileConfused0 /system/bin/.ext/.su 

My finished script file is attached to the letter.
All good luck in obtaining ROOT rights! 



Here is the source code of the correct script!!!!!

Code:
adb shell "mount -o remount,rw /system"

adb push common/Superuser.apk /system/app/SuperSU/SuperSU.apk
adb shell chmod 0644 /system/app/SuperSU/SuperSU.apk
adb shell chcon u:object_r:system_file:s0 /system/app/SuperSU/SuperSU.apk

adb push common/install-recovery.sh /system/etc/install-recovery.sh
adb shell chmod 0755 /system/etc/install-recovery.sh
adb shell chcon u:object_r:toolbox_exec:s0 /system/etc/install-recovery.sh

adb push armv7/su /system/bin/.ext/.su
adb shell chmod 0755 /system/bin/.ext/.su
adb shell chcon u:object_r:system_file:s0 /system/bin/.ext/.su

adb push armv7/su /system/xbin/daemonsu
adb shell chmod 0755 /system/xbin/daemonsu
adb shell chcon u:object_r:system_file:s0 /system/xbin/daemonsu

adb push armv7/su /system/xbin/sugote
adb shell chmod 0755 /system/xbin/sugote
adb shell chcon u:object_r:zygote_exec:s0 /system/xbin/sugote

adb push armv7/supolicy /system/xbin/supolicy
adb shell chmod 0755 /system/xbin/supolicy
adb shell chcon u:object_r:system_file:s0 /system/xbin/supolicy

adb push armv7/libsupol.so /system/lib\(64\)/libsupol.so
adb shell chmod 0755 /system/lib\(64\)/libsupol.so
adb shell chcon u:object_r:system_file:s0 /system/lib\(64\)/libsupol.so

adb shell touch /system/etc/.installed_su_daemon
adb shell chmod 0644 /system/etc/.installed_su_daemon
adb shell chcon u:object_r:system_file:s0 /system/etc/.installed_su_daemon

adb shell cp /system/bin/sh /system/xbin/sugote-mksh
adb shell chmod 0755 /system/xbin/sugote-mksh
adb shell chcon u:object_r:system_file:s0 /system/xbin/sugote-mksh

adb shell cp /system/bin/app_process32 /system/bin/app_process32_original
adb shell chmod 0755 /system/bin/app_process32_original
adb shell chcon u:object_r:zygote_exec:s0 /system/bin/app_process32_original

adb shell mv /system/bin/app_process /system/bin/app_process_original
adb shell chmod 0755 /system/bin/app_process_original
adb shell chcon u:object_r:zygote_exec:s0 /system/bin/app_process_original

adb shell mv /system/bin/app_process32 /system/bin/app_process_init
adb shell chmod 0755 /system/bin/app_process_init
adb shell chcon u:object_r:system_file:s0 /system/bin/app_process_init

adb shell ln -s /system/xbin/daemonsu /system/bin/app_process
adb shell ln -s /system/xbin/daemonsu /system/bin/app_process32

adb shell ln -s /system/etc/install-recovery.sh /system/bin/install-recovery.sh
Reply
#22
I used the firmware to get the ROOT rights -
20180206-tinker-board-android-marshmallow-userdebug-v13.13.0.74.img and the same firmware with the installed google play from this topic -
https://tinkerboarding.co.uk/forum/thread-1204.html
Reply
#23
Many thanks for the prompt reply.

I've tried this with both images

20180206-tinker-board-android-marshmallow-userdebug-v13.13.0.74.img

and

https://drive.google.com/open?id=1Hi524S...-lv5q_UfSk

Neither image's filesystem contains the path

/system/lib\(64\)

so the shell script is failing.

Is the line

adb push armv7/libsupol.so /system/lib\(64\)/libsupol.so

still valid?
Reply
#24
Our system is 32 bit. I think that these lines can be removed from the script ...

adb push armv7/libsupol.so /system/lib\(64\)/libsupol.so
adb shell chmod 0755 /system/lib\(64\)/libsupol.so
adb shell chcon u:object_r:system_file:s0 /system/lib\(64\)/libsupol.so
Reply
#25
Thanks! I'll test and respond.

(04-11-2018, 08:33 AM)SPARKRU Wrote: Our system is 32 bit. I think that these lines can be removed from the script ...

adb push armv7/libsupol.so /system/lib\(64\)/libsupol.so
adb shell chmod 0755 /system/lib\(64\)/libsupol.so
adb shell chcon u:object_rConfusedystem_fileConfused0 /system/lib\(64\)/libsupol.so
Reply
#26
Hi

I have now run the amended script - omitting the "64" lines - on two boards with the two images:

20180206-tinker-board-android-marshmallow-userdebug-v13.13.0.74.img

and

https://drive.google.com/open?id=1Hi524S...-lv5q_UfSk

Both boards run OK when the images are unchanged. But after the script is run neither image will boot on either of the boards.

Do you have an image file that boots and allows apps to gain root? Is so would you be prepared to share please?

Thanks
Reply
#27
Tonight I'll try to lay out the finished image 20180206-tinker-board-android-marshmallow-userdebug-v13.13.0.74.img with ROOT rights and Google Play.
Reply
#28
Thanks that's extremely helpful!
Reply
#29
Please go to this topic to download the ready image with ROOT rights and Google Play installed - 20180206 TB Android Marshmallow PLAY ROOT v13.13.0.74
Reply
#30
Thanks I managed to build a working image in the end but will test with yours also!

Thanks for the help.
Reply


Forum Jump:


Users browsing this thread: 2 Guest(s)