• Introducing XDA Computing: Discussion zones for Hardware, Software, and more!    Check it out!
  • Fill out your device list and let everyone know which phones you have!    Edit Your Device Inventory

TS10 firmware Image [ WAS IMPOSSIBLE TO ] root

Search This thread

mariodantas

Senior Member
Hi fellows

I have an Android Headunit based on TOPWAY TS10 firmware

I tried to patch the boot.img but when fhask to headunit, it enters in bootloop mode

Can anyone here help me rooting this image please ?

Link to GDrive image here -> TS10_BOOT.7z

I will be greatfull with the one who roots this boot (I need to user Alpha Backup Pro to backup my Spotify Gygabites of data in case I reset the unit to be abre to recover my APK with all the data and without root privileges, is impossible)

Thanks in advance
 

mariodantas

Senior Member
Here below the Magisk v23 LOG ---

- Device platform: arm64-v8a
- Installing: 23.0 (23000)
- Copying image to cache
- Unpacking boot image
Parsing boot image: [/data/user_de/0/com.topjohnwu.magisk/install/boot.img]
HEADER_VER [2]
KERNEL_SZ [17090572]
RAMDISK_SZ [779984]
SECOND_SZ [0]
RECOV_DTBO_SZ [0]
DTB_SZ [161962]
OS_VERSION [10.0.0]
OS_PATCH_LEVEL [2020-02]
PAGESIZE [2048]
NAME []
CMDLINE [console=ttyS1,115200n8 buildvariant=user]
CHECKSUM [3ee1e2a9b7347c65779485fed4ab909a2f546ca4000000000000000000000000]
KERNEL_FMT [raw]
RAMDISK_FMT [gzip]
VBMETA
- Checking ramdisk status
Loading cpio: [ramdisk.cpio]
- Stock boot image detected
- Patching ramdisk
Loading cpio: [ramdisk.cpio]
Add entry [init] (0750)
Create directory [overlay.d] (0750)
Create directory [overlay.d/sbin] (0750)
Add entry [overlay.d/sbin/magisk32.xz] (0644)
Add entry [overlay.d/sbin/magisk64.xz] (0644)
Patch with flag KEEPVERITY=[true] KEEPFORCEENCRYPT=[false]
Loading cpio: [ramdisk.cpio.orig]
Backup mismatch entry: [init] -> [.backup/init]
Record new entry: [overlay.d] -> [.backup/.rmlist]
Record new entry: [overlay.d/sbin] -> [.backup/.rmlist]
Record new entry: [overlay.d/sbin/magisk32.xz] -> [.backup/.rmlist]
Record new entry: [overlay.d/sbin/magisk64.xz] -> [.backup/.rmlist]
Create directory [.backup] (0000)
Add entry [.backup/.magisk] (0000)
Dump cpio: [ramdisk.cpio]
Loading dtbs from [dtb]
Patch @ 00D2DB4C [736B69705F696E697472616D667300] -> [77616E745F696E697472616D667300]
- Repacking boot image
Parsing boot image: [/data/user_de/0/com.topjohnwu.magisk/install/boot.img]
HEADER_VER [2]
KERNEL_SZ [17090572]
RAMDISK_SZ [779984]
SECOND_SZ [0]
RECOV_DTBO_SZ [0]
DTB_SZ [161962]
OS_VERSION [10.0.0]
OS_PATCH_LEVEL [2020-02]
PAGESIZE [2048]
NAME []
CMDLINE [console=ttyS1,115200n8 buildvariant=user]
CHECKSUM [3ee1e2a9b7347c65779485fed4ab909a2f546ca4000000000000000000000000]
KERNEL_FMT [raw]
RAMDISK_FMT [gzip]
VBMETA
Repack to boot image: [new-boot.img]
HEADER_VER [2]
KERNEL_SZ [17090572]
RAMDISK_SZ [1088243]
SECOND_SZ [0]
RECOV_DTBO_SZ [0]
DTB_SZ [161962]
OS_VERSION [10.0.0]
OS_PATCH_LEVEL [2020-02]
PAGESIZE [2048]
NAME []
CMDLINE [console=ttyS1,115200n8 buildvariant=user]
CHECKSUM [8472aa1bd1126888f4bea8ac2c7745935f7b4897000000000000000000000000]

****************************
Output file is written to
/storage/emulated/0/Download/magisk_patched-23000_6cyCZ.img
****************************
cp: can't preserve ownership of 'busybox': Operation not permitted
cp: can't preserve ownership of 'magisk32': Operation not permitted
cp: can't preserve ownership of 'magisk64': Operation not permitted
cp: can't preserve ownership of 'magiskboot': Operation not permitted

cp: can't preserve ownership of 'magiskinit': Operation not permitted
- All done!
 

mariodantas

Senior Member
Found the problem while disassembling: take a look below

Code:
Image file a44a385a-9cbf-11ea-bb71-8bb1f7c98e0b.decrypted open successful, size = 36700160 byte
Found ANDROID BOOT IMAGE
Config header info save to firmware\cfg\a44a385a-9cbf-11ea-bb71-8bb1f7c98e0b.cfg
CFG section add to firmware\config.ini
ATTENTION! Unknown format for kernel block, magic= 0x14328000
kernel block save to firmware\kernel\zImage (size = 17090572 bytes)
Found GZIP format for ramdisk block
GZIP unpack successful...
Found CPIO format for ramdisk block
firmware\ramdisk\apex
firmware\ramdisk\avb
firmware\ramdisk\avb/q-gsi.avbpubkey
firmware\ramdisk\avb/r-gsi.avbpubkey
firmware\ramdisk\avb/s-gsi.avbpubkey
firmware\ramdisk\debug_ramdisk
firmware\ramdisk\dev
firmware\ramdisk\fstab.ums512_1h10
firmware\ramdisk\init
firmware\ramdisk\mnt
firmware\ramdisk\proc
firmware\ramdisk\sys
CPIO unpack successful...
Unpacked ramdisk save to firmware\ramdisk\
List of files and folders with their UNIX-attributes save to firmware\cpiostatfile.txt
Unknown format for dtb block, magic= 0x00000DD0
Error in dtb block, data save to firmware\dtb\dtb_tmp.img
Error in dtb block
Unpack a44a385a-9cbf-11ea-bb71-8bb1f7c98e0b.decrypted fail

Now.... let's work to find a solution
 
  • Like
Reactions: Andason74

mariodantas

Senior Member
screenshot-2021-05-28 131120.png


Whell I have this error while using Android Boot Image Editor with a magisk patched image

It looks like magisk is not doing what he is intended to do correctly !!!
 

Andason74

Senior Member
Dec 24, 2015
118
13
... and I'm searching a registered user to download and share that file so we ca install magisk root in our devices !
Let us know what ya find!

Screenshot from 2021-06-17 21-16-55.png
 

Attachments

  • TS10-Magisk.zip
    7.4 MB · Views: 10
  • a44a385a-9cbf-11ea-bb71-8bb1f7c98e0b (1).zip
    35 MB · Views: 14
Last edited:

Top Liked Posts

  • There are no posts matching your filters.
  • 2
    Here my little project:

    https://github.com/mariodantas/TS10-Firmware-Workbench

    This will allow you to have root privileges in original firmware, but read VERY CAREFULLY as this method int NOT SAFE at all
    At least for me it do the trick as I expected
    1
    Found the problem while disassembling: take a look below

    Code:
    Image file a44a385a-9cbf-11ea-bb71-8bb1f7c98e0b.decrypted open successful, size = 36700160 byte
    Found ANDROID BOOT IMAGE
    Config header info save to firmware\cfg\a44a385a-9cbf-11ea-bb71-8bb1f7c98e0b.cfg
    CFG section add to firmware\config.ini
    ATTENTION! Unknown format for kernel block, magic= 0x14328000
    kernel block save to firmware\kernel\zImage (size = 17090572 bytes)
    Found GZIP format for ramdisk block
    GZIP unpack successful...
    Found CPIO format for ramdisk block
    firmware\ramdisk\apex
    firmware\ramdisk\avb
    firmware\ramdisk\avb/q-gsi.avbpubkey
    firmware\ramdisk\avb/r-gsi.avbpubkey
    firmware\ramdisk\avb/s-gsi.avbpubkey
    firmware\ramdisk\debug_ramdisk
    firmware\ramdisk\dev
    firmware\ramdisk\fstab.ums512_1h10
    firmware\ramdisk\init
    firmware\ramdisk\mnt
    firmware\ramdisk\proc
    firmware\ramdisk\sys
    CPIO unpack successful...
    Unpacked ramdisk save to firmware\ramdisk\
    List of files and folders with their UNIX-attributes save to firmware\cpiostatfile.txt
    Unknown format for dtb block, magic= 0x00000DD0
    Error in dtb block, data save to firmware\dtb\dtb_tmp.img
    Error in dtb block
    Unpack a44a385a-9cbf-11ea-bb71-8bb1f7c98e0b.decrypted fail

    Now.... let's work to find a solution