This forum uses cookies
This forum makes use of cookies to store your login information if you are registered, and your last visit if you are not. Cookies are small text documents stored on your computer; the cookies set by this forum can only be used on this website and pose no security risk. Cookies on this forum also track the specific topics you have read and when you last read them. Please confirm whether you accept or reject these cookies being set.

A cookie will be stored in your browser regardless of choice to prevent you being asked this question again. You will be able to change your cookie settings at any time using the link in the footer.

Thread Rating:
  • 1 Vote(s) - 5 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Rooting Android
#31
Thank you all for the command list, I rooted the the latest android image on my TinkerBoard:

https://github.com/TinkerBoard/android-6...74.img.zip

First,  I install adb command on my Ubuntu 16.0.4 LTS
$ sudo apt install adb

Then, follow SBCJunkie instructions to run these 4 lines :  192.168.2.235 is my Android OS IP address


Code:
$ adb connect 192.168.2.235
$ adb root
$ adb connect 192.168.2.235
$ adb remount


If no error, run these following lines one by one (just copy and paste, hit enter key from keyboard) -- the error people complained in the forum should not appear here:


Code:
adb shell "mount -o remount,rw /system"

adb push common/Superuser.apk /system/app/SuperSU/SuperSU.apk
adb shell chmod 0644 /system/app/SuperSU/SuperSU.apk
adb shell chcon u:object_r:system_file:s0 /system/app/SuperSU/SuperSU.apk

adb push common/install-recovery.sh /system/etc/install-recovery.sh
adb shell chmod 0755 /system/etc/install-recovery.sh
adb shell chcon u:object_r:toolbox_exec:s0 /system/etc/install-recovery.sh

adb push armv7/su /system/bin/.ext/.su
adb shell chmod 0755 /system/bin/.ext/.su
adb shell chcon u:object_r:system_file:s0 /system/bin/.ext/.su

adb push armv7/su /system/xbin/daemonsu
adb shell chmod 0755 /system/xbin/daemonsu
adb shell chcon u:object_r:system_file:s0 /system/xbin/daemonsu

adb push armv7/su /system/xbin/sugote
adb shell chmod 0755 /system/xbin/sugote
adb shell chcon u:object_r:zygote_exec:s0 /system/xbin/sugote

adb push armv7/supolicy /system/xbin/supolicy
adb shell chmod 0755 /system/xbin/supolicy
adb shell chcon u:object_r:system_file:s0 /system/xbin/supolicy

adb push armv7/libsupol.so /system/lib\(64\)/libsupol.so
adb shell
chmod 0755 /system/lib\(64\)/libsupol.so
chcon u:object_r:system_file:s0 /system/lib\(64\)/libsupol.so
exit

adb shell touch /system/etc/.installed_su_daemon
adb shell chmod 0644 /system/etc/.installed_su_daemon
adb shell chcon u:object_r:system_file:s0 /system/etc/.installed_su_daemon

adb shell cp /system/bin/sh /system/xbin/sugote-mksh
adb shell chmod 0755 /system/xbin/sugote-mksh
adb shell chcon u:object_r:system_file:s0 /system/xbin/sugote-mksh

adb shell cp /system/bin/app_process32 /system/bin/app_process32_original
adb shell chmod 0755 /system/bin/app_process32_original
adb shell chcon u:object_r:zygote_exec:s0 /system/bin/app_process32_original

adb shell mv /system/bin/app_process /system/bin/app_process_original
adb shell chmod 0755 /system/bin/app_process_original
adb shell chcon u:object_r:zygote_exec:s0 /system/bin/app_process_original

adb shell mv /system/bin/app_process32 /system/bin/app_process_init
adb shell chmod 0755 /system/bin/app_process_init
adb shell chcon u:object_r:system_file:s0 /system/bin/app_process_init

adb shell ln -s /system/xbin/daemonsu /system/bin/app_process
adb shell ln -s /system/xbin/daemonsu /system/bin/app_process32

adb shell ln -s /system/etc/install-recovery.sh /system/bin/install-recovery.sh


Done --  when I reboot Android,  SuperSu was installed. I choose "Normal" when it popup the message window during installation.
Reply
#32
Hello everyone, I ask for help! How can I make a ROOT on a TinkerOS_Android 7 Nougat V14.1.2.50 ??? The instructions above do not work (I can not figure it out myself.) Now I just installed TinkerOS_Android 7 Nougat V14.1.2.50 and google play store and services.
[-] The following 1 user Likes wertigo's post:
  • klavyesir
Reply
#33
Hello,
i have the same question. Is it possible to root the tinker board with the following image:
20180817-tinker-board-androidnougat-play-v14.1.2.50.img

I tried it as described. But there are several faults when i run the script:

.....
adb shell "mount -o remount,rw /system"

mount: '/dev/block/platform/ff0c0000.dwmmc/by-name/system' not user mountable in fstab
....
adb shell chmod 0755 /system/lib\(64\)/libsupol.so
chmod: /system/lib(64)/libsupol.so: No such file or directory

adb shell chcon u:object_rConfusedystem_fileConfused0 /system/lib\(64\)/libsupol.so
chcon: /system/lib(64)/libsupol.so: No such file or directory
....
adb shell ln -s /system/etc/install-recovery.sh /system/bin/install-recovery.sh

ln: cannot create symbolic link from '/system/etc/install-recovery.sh' to '/system/bin/install-recovery.sh': File exists


SuperSU is not installed after the script and when i restart android fails to boot.
Can someone support me ? 

Best Regards
Markus
Reply
#34
This method is not working in the case of Nougat image
Reply
#35
(04-09-2018, 05:50 PM)david.robinson@multplx.com Wrote: (I note that there is no /system/lib(64) folder in this OS. Replacing "/system/lib\(64\)" with "/system/lib" does not achieve a successful outcome either.)

Yes. This is only /system/lib and rows with \(64\) is useless and wrong.
Should be first line without backslashes and next 2 line with them.

I got succesfully rooted 20180712-tinker-board-android-marshmallow-userdebug-v13.14.0.95.img

But v14 still the quest... just all i need is the power buttons on screen.. lol 

Script is (no devmode needed):
Code:
adb connect <IP>
adb root
adb remount

adb push common/Superuser.apk /system/app/SuperSU/SuperSU.apk
adb shell chmod 0644 /system/app/SuperSU/SuperSU.apk
adb shell chcon u:object_r:system_file:s0 /system/app/SuperSU/SuperSU.apk

adb push common/install-recovery.sh /system/etc/install-recovery.sh
adb shell chmod 0755 /system/etc/install-recovery.sh
adb shell chcon u:object_r:toolbox_exec:s0 /system/etc/install-recovery.sh

adb push armv7/su /system/bin/.ext/.su
adb shell chmod 0755 /system/bin/.ext/.su
adb shell chcon u:object_r:system_file:s0 /system/bin/.ext/.su

adb push armv7/su /system/xbin/daemonsu
adb shell chmod 0755 /system/xbin/daemonsu
adb shell chcon u:object_r:system_file:s0 /system/xbin/daemonsu

adb push armv7/su /system/xbin/sugote
adb shell chmod 0755 /system/xbin/sugote
adb shell chcon u:object_r:zygote_exec:s0 /system/xbin/sugote

adb push armv7/supolicy /system/xbin/supolicy
adb shell chmod 0755 /system/xbin/supolicy
adb shell chcon u:object_r:system_file:s0 /system/xbin/supolicy

adb push armv7/libsupol.so /system/lib/libsupol.so
adb shell chmod 0755 /system/lib/libsupol.so
adb shell chcon u:object_r:system_file:s0 /system/lib/libsupol.so

adb shell touch /system/etc/.installed_su_daemon
adb shell chmod 0644 /system/etc/.installed_su_daemon
adb shell chcon u:object_r:system_file:s0 /system/etc/.installed_su_daemon

adb shell cp /system/bin/sh /system/xbin/sugote-mksh
adb shell chmod 0755 /system/xbin/sugote-mksh
adb shell chcon u:object_r:system_file:s0 /system/xbin/sugote-mksh

adb shell cp /system/bin/app_process32 /system/bin/app_process32_original
adb shell chmod 0755 /system/bin/app_process32_original
adb shell chcon u:object_r:zygote_exec:s0 /system/bin/app_process32_original

adb shell mv /system/bin/app_process /system/bin/app_process_original
adb shell chmod 0755 /system/bin/app_process_original
adb shell chcon u:object_r:zygote_exec:s0 /system/bin/app_process_original

adb shell mv /system/bin/app_process32 /system/bin/app_process_init
adb shell chmod 0755 /system/bin/app_process_init
adb shell chcon u:object_r:system_file:s0 /system/bin/app_process_init

adb shell ln -s /system/xbin/daemonsu /system/bin/app_process
adb shell ln -s /system/xbin/daemonsu /system/bin/app_process32

adb shell rm /system/bin/install-recovery.sh
adb shell ln -s /system/etc/install-recovery.sh /system/bin/install-recovery.sh
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)