User Tools

Site Tools


doc:appunti:hardware:gretel_a7

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
Last revisionBoth sides next revision
doc:appunti:hardware:gretel_a7 [2019/09/27 15:48] – [Backing up the NVRAM] niccolodoc:appunti:hardware:gretel_a7 [2019/10/15 12:58] – [Latest System Software] niccolo
Line 12: Line 12:
 ^ Android    | 6.0 Marshmallow  | ^ Android    | 6.0 Marshmallow  |
 ^ Telephony  | 3G/2G  | ^ Telephony  | 3G/2G  |
 +
 +===== Latest System Software  =====
 +
 +Actually I'm running my Gretel A7 with the following configuration:
 +
 +  * **TWRP Recovery 3.0.2** - We use version 3.0.2 because we had problems with newer 3.2.1, [[#installing_the_xenonhd_custom_rom|see below]]. NOTICE: When you flash the recovery image, do not reboot normally, otherwise the partition will be overwritten. From poweroff, reboot instead into //Select Boot Mode Menu// and choose Recovery.
 +  * **Stock ROM 20170908** - We found on the net the archive Y8303.YX.A7.Gretel.B1B8.6.0.V01.07.20170908.rar. Beware that this stock ROM contains a trojanized launcher! [[#infected_stock_rom_20170908|See below]]. It features Android 6.0, with security patch level August 5, 2015.
 +  * **SuperSU v2.82** build number 20170528234214 - Needed to gain root privileges and replace the launcher.
 +  * **Rootless Pixel Launcher 3.9.1** - Downloaded from F-Droid repository, replaces the trojanized default launcher.
 +
 +^ Model number                  | A7  |
 +^ Android version               | 6.0  |
 +^ Android security patch level  | August 5, 2016  |
 +^ Baseband version              | MOLY.WR8.W1449.MD.WG.MP.V59.P4, 2016/09/05 16:45  |
 +^ Kernel version                | 3.18.19\\ xsh@joyatel07 #2\\ Fri Sep 8 12:20:34 CST 2017  |
 +^ Build number                  | Y8303.YX.A7.Gretel.B1B8.6.0.V01.07.20170908  |
  
 ===== Factory Installed Malware: com.ibingo.launcher3 and Wireless Update  ===== ===== Factory Installed Malware: com.ibingo.launcher3 and Wireless Update  =====
Line 74: Line 90:
 La rimozione della app di cui sopra non è stata sufficiente. Quindi si è provveduto anche a rimuovere: La rimozione della app di cui sopra non è stata sufficiente. Quindi si è provveduto anche a rimuovere:
  
-  * **Launcher3-com.ibingo.launcher3-Launcher3_G_WVGA_FWVGA_4.4.X.0.1.5_Ibingo-60170519.apk** (cartella ''/system/priv-app/Launcher3_G_yisheng_A47_201705191558''). Classificato come malware da [[http://www.avg.com/|AVG]] e [[http://www.drweb.com/|DrWeb]], ecc.). **ATTENZIONE!** Questa app è il launcher predefinito! Prima di rimuoverlo è necessario installarne un altro (ad esempio Apex Launcher) e renderlo predefinito da //Impostazioni// => //Home Page//.+  * **Launcher3-com.ibingo.launcher3-Launcher3_G_WVGA_FWVGA_4.4.X.0.1.5_Ibingo-60170519.apk** (cartella ''/system/priv-app/Launcher3_G_yisheng_A47_201705191558''). Classificato come malware da [[http://www.avg.com/|AVG]] e [[http://www.drweb.com/|DrWeb]], ecc.). **ATTENZIONE!** Questa app è il launcher predefinito! Prima di rimuoverlo è necessario installarne un altro (ad esempio **Rootless Pixel Launcher** da F-Droid) e renderlo predefinito da //Impostazioni// => //Home Page//.
   * **com.whatsapp** (cartella ''/system/vendor/operator/app/whatsapp'')   * **com.whatsapp** (cartella ''/system/vendor/operator/app/whatsapp'')
   * **com.facebook.katana** (cartella ''/system/vendor/operator/app/facebook'')   * **com.facebook.katana** (cartella ''/system/vendor/operator/app/facebook'')
Line 102: Line 118:
     - **Riavviare** il telefono     - **Riavviare** il telefono
     - Verificare il file **/data/system/packages.xml**: i riferimenti alle app rimosse dovrebbero scomparire automaticamente dopo il reboot.     - Verificare il file **/data/system/packages.xml**: i riferimenti alle app rimosse dovrebbero scomparire automaticamente dopo il reboot.
 +
 ===== Modalità Sviluppatore e Debug USB ===== ===== Modalità Sviluppatore e Debug USB =====
  
Line 107: Line 124:
  
 Nel menu //Impostazioni// compare anche //Opzioni sviluppatore//, tra le quali è possibile attivare **//Debug USB//**. Nel menu //Impostazioni// compare anche //Opzioni sviluppatore//, tra le quali è possibile attivare **//Debug USB//**.
- 
-^ Numero modello       | A7  | 
-^ Versione di Android  | 6.0  | 
-^ Livello patch di sicurezza Android  | 5 agosto 2016  | 
-^ Versione banda base  | MOLY.WR8.W1449.MD.WG.MP.V59.P4, 2016/09/05  | 
-^ Versione kernel      | 3.8.19\\ xsh@ubuntu-S2600JF #2\\ Fri May 26 15:39:25 CST 2017  | 
-^ Numero build         | Y8303.YX.A7.Gretel.B1B8.6.0.V01.07.20170526  | 
  
 ===== OEM unlocking ===== ===== OEM unlocking =====
Line 321: Line 331:
  
 ===== Installing the XenonHD Custom ROM ===== ===== Installing the XenonHD Custom ROM =====
 +
 +FIXME **WARNING**! The **XenonHD_Gretel_A7.zip** archive we found (md5sum b0d5c42c17015d95e965e74df56fee96) has some major problems. Notabily **the GPS does not work** and it miss the **soft keys** (the latter may be can be fixed by editing ''/system/build.prop'', see below).
  
 We have found an unofficial **[[https://www.xenonhd.com/|XenonHD]]** custom ROM for the Gretel A7, it is not famous as the LineageOS, but we are searching something to upgrade Android and to wipe-out completely the original trojanized operating system. So we followed the instruction on the page **[[https://www.getdroidtips.com/android-nougat-gretel-a7/|How To Install Android 7.1.2 Nougat On Gretel A7]]** and got the ROM archive from this **[[https://yadi.sk/d/6zHLRSGh3PjcVe|Yandex Disk]]**. We have found an unofficial **[[https://www.xenonhd.com/|XenonHD]]** custom ROM for the Gretel A7, it is not famous as the LineageOS, but we are searching something to upgrade Android and to wipe-out completely the original trojanized operating system. So we followed the instruction on the page **[[https://www.getdroidtips.com/android-nougat-gretel-a7/|How To Install Android 7.1.2 Nougat On Gretel A7]]** and got the ROM archive from this **[[https://yadi.sk/d/6zHLRSGh3PjcVe|Yandex Disk]]**.
Line 351: Line 363:
     * Browse to **open_gapps-arm-7.1-mini-20190927.zip**, No Zip signature verification.     * Browse to **open_gapps-arm-7.1-mini-20190927.zip**, No Zip signature verification.
     * **Swipe to confirm Flash**.     * **Swipe to confirm Flash**.
 +
 +===== Installing Stock ROM 20170908 (with trojan launcher) =====
 +
 +On the internet we found the file **Y8303.YX.A7.Gretel.B1B8.6.0.V01.07.20170908.rar** (md5sum decb53fef12c13c30a8759fc55f5dfa4). It seems an offical Gretel ROM, but it has some **malware inside the launcher**. We flashed that ROM using **SP Flash Tool 5.1916** downloading all the partitions to the phone; after some hours **unwanted icons popped-up on the home screen** (icon labels were //Tarot// and //Funny//).
 +
 +
 +  - Power-off the phone. Using SP Flash Tool from a PC, **flash the partitions**: //preloader//, //lk//, //boot//, //recovery//, //logo//, //secro//, //system//, //cache// and //userdata// from stock ROM archive. This will erase all user data and settings on the phone.
 +  - Reboot into normal system and enable **USB debugging**:
 +    * //Settings// => //About phone//, tap 7 times on //Build number//.
 +    * //Settings// => //Developer options//, enable //OEM unlocking// and //USB debugging//.
 +  - Upload **SuperSU** and **Rootless Pixel Launcher** from the PC to /sdcard/ directory, using **adb push**.
 +  - Power-off the phone and **flash TWRP** recovery image with SP Flash Tool. Boot in //Select Boot Mode Menu// with **Volume UP+Power**, then choose Recovery.
 +  - From TWRP Recovery, install **SuperSU**.
 +  - Reboot into system, install **Rootless Pixel Launcher** from the file manager; from //Settings// => //Home//, make it the default.
 +  - From the PC, run **adb shell** and remove the trojanized launcher using root privileges. See below.
 +
 +We checked the **apk** file found into the **/system/priv-app/Launcher3_G_Develop_yisheng_A47_201709071813/** directory against some on-line checking services (notably [[https://www.drweb.com/|Dr. Web]]), and it was marked as **infected with Android.Ibingo.1.origin**.
 +
 +So we downloaded and installed an **alternative launcher** from F-Droid: **[[https://f-droid.org/en/packages/amirz.rootless.nexuslauncher/|Rootless Pixel Launcher]]** and made it the default from //Settings// => //Home//. Then - using root privileges, we uninstalled the trojanized launcher.
 +
 +<code>
 +mount -o remount,rw /system
 +rm -r /system/priv-app/Launcher3_G_Develop_yisheng_A47_201709071813
 +mount -o remount,ro /system
 +rm -r /sdcard/.com.yinshengA47.launcher3/
 +</code>
 +
 +
 +We did not trust either the app **WirelessUpdate**, it was not reported as infected (it was indeed in ROM release 2017-05-19), but we don't trust updates from people which distribute infected apps! The app to be removed is:
 +
 +  * **Name**: WirelessUpdate
 +  * **Package**: com.fota.wirelessupdate
 +  * **Folder**: /system/priv-app/SystemFota/
 +  * **Menu Entry**: Settings => About phone => WirelessUpdate
 +
 +Using root privileges we executed:
 +
 +<code>
 +mount -o remount,rw /system
 +rm -r /system/priv-app/SystemFota/
 +mount -o remount,ro /system
 +reboot
 +</code>
 +
 +After the reboot we confirmed that the Settings menu entry was gone.
 +
 +We removed alto the unwanted **WhatsApp** and **Facebook** apps:
 +
 +<code>
 +pm uninstall com.facebook.katana
 +pm uninstall com.whatsapp
 +mount -o remount,rw /system
 +rm -r /system/vendor/operator/app/facebook/
 +rm -r /system/vendor/operator/app/whatsapp/
 +mount -o remount,ro /system
 +</code>
 +
 +**NOTICE**: If you enable a **Google account**, you will find a new application installed into **/data/app/com.google.android.gms-1/**, do not remove it because it is the **Google Play Services** required to access the Play Store, etc.
 ===== Immersive Mode ===== ===== Immersive Mode =====
 +
 +:!: **NOTICE**: No need to install a dedicated app to have Immersive Mode for one App, just use the command **settings put global** from an **adb shell**, as explained below!
  
 Questo smartphone Android ha il solo pulsante fisico //Home//, i pulsanti //indietro// e //menu// sono virtuali ed **occupano la parte bassa dello schermo**. La cosa è noiosa per i programmi che avrebbero vantaggio ad usare tutto lo schermo, come un programma di navigazione GPS. Questo smartphone Android ha il solo pulsante fisico //Home//, i pulsanti //indietro// e //menu// sono virtuali ed **occupano la parte bassa dello schermo**. La cosa è noiosa per i programmi che avrebbero vantaggio ad usare tutto lo schermo, come un programma di navigazione GPS.
Line 359: Line 431:
 Tale App ha bisogno dell'autorizzazione per lo //spostamento su altre app//, questo permesso viene gestito direttamente da //Impostazioni// -> //App// -> //Settings// (icona ingranaggio) -> //Spostamento su altre app//. Vengono evidenziate le app che richiedono tale permesso ed è possibile autorizzarle o revocere il permesso. Tale App ha bisogno dell'autorizzazione per lo //spostamento su altre app//, questo permesso viene gestito direttamente da //Impostazioni// -> //App// -> //Settings// (icona ingranaggio) -> //Spostamento su altre app//. Vengono evidenziate le app che richiedono tale permesso ed è possibile autorizzarle o revocere il permesso.
  
 +===== Force one App in Immersive Mode =====
 +
 +To force one single app to run in full screen immersive mode just use the following command line from a PC connected to the USB debug:
 +
 +<code>
 +adb shell settings put global policy_control immersive.full=net.osmand.plus
 +</code>
 +
 +In this exampled we configured **net.osmand.plus** to run in **full immersive** mode **hiding the Status Bar** at the top of the screen and **hiding the Android Navigation Bar (Soft Keys)** at the bottom.
 +
 +Beside the **immersive.full** you can use the **immersive.status** setting if you want to keep the top Status Bar and the **immersive.navigation** if you want to keep the Navigation Bar only.
 +
 +The setting takes effect immediately, even if the app is running! The setting will survive the phone reboot, you can confirm from an adb shell:
 +
 +<code>
 +settings get global policy_control
 +immersive.full=net.osmand.plus
 +</code>
 +
 +To delete the settings:
 +
 +<code>
 +settings delete global policy_control
 +</code>
 +
 +If you want to set the immersive mode for two application you have to use a comma separated syntax: **immersive.full=com.package.one,com.package.two**.
 +===== Disable Soft Keys =====
 +
 +Instead of using the  **Full Screen Immersive Mode** as seen above, we can disable (hide) the **Android soft keys** altogether. Just ''mount -o remount,rw /system'' and edit the **/system/build.prop** file changing the value of **qemu.hw.mainkeys** from zero to 1. You have to reboot the phone to see the effect.
 +
 +<file>
 +# Disable the NAV bar (soft keys)
 +qemu.hw.mainkeys=1
 +</file>
 +
 +Beware that some applications or some system menu **requires the back button to fully operate**, you may find yourself stuck in some app.
 ===== Web References ===== ===== Web References =====
  
doc/appunti/hardware/gretel_a7.txt · Last modified: 2021/08/27 23:23 by niccolo