Closed winstonma closed 3 years ago
I know it is off-topic but I would like to let everyone know that I failed putting magisk onto my Nova.
Although I could obtain the boot.img
, patch the boot.img
using Magisk and flash the patched boot.img (using AndroidTool, in bootloader mode) but the system won't boot up. I guess the magisk doesn't work well patching the Rockchip device.
Just wonder if I can do anything to root the system, after I could obtain the update.zip
.
The strings are verifed. Thanks for your issue.
I also tried to patch boot
image for my NovaPro by the tools provided by rockchip, and then got an unbootable image. Even a simply repacked boot
image without any patch was unbootable in my case. Maybe there were something mistaken.
Yes, actually I also chatted with different people in https://github.com/topjohnwu/Magisk/issues/755. I also tried to use AIK to unpack and repack. Got the same result as you. And still have no luck.
Actually Kingroot is the only tool that worked. But they shutdown the server in 12/2019 and the app stopped working without the server.
On the other hand, do you think it is possible to sideload SuperSU in the recovery? I know it is impossible to sideload the zip file directly, but just wonder if it is possible to decrypt the upx, add supersu into the zip file and then encrypt the file back. And then let the system to flash the patched-update.upx for us?
Or is it possible to modify the SuperSU zip file so that it can be sideloaded?
I think is impossible to make SuperSU zip work on original recovery since it will verify the sign of zip file. With an available custom recovery flashed, it is possible to sideload SuperSU zip file.
Or if a custom recovery is not found, it is also possible to read system
partition, manually patch it in your computer and rewrite, by rkflashtool
. Unlike boot
, system
partition is just a normal ext4 filesystem.
I successfully rooted my NovaPro by this method.
That's the good news. I know it is off-topic but may I have the full step-by-step guide?
First of all, thanks for this great source of information to get insight into our devices!
I have extracted the necessary strings for the Nova. Here they are:
I was able to decrypt the latest update.upx with these values, but please check for yourself.