User Tools

Site Tools


doc:appunti:hardware:gretel_a7

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
doc:appunti:hardware:gretel_a7 [2019/09/28 17:20] – [Installing the XenonHD Custom ROM] niccolodoc:appunti:hardware:gretel_a7 [2021/08/27 23:23] (current) – [Force one App in Immersive Mode] niccolo
Line 12: Line 12:
 ^ Android    | 6.0 Marshmallow  | ^ Android    | 6.0 Marshmallow  |
 ^ Telephony  | 3G/2G  | ^ Telephony  | 3G/2G  |
 +
 +===== Latest System Software  =====
 +
 +Actually I'm running my Gretel A7 with the following configuration:
 +
 +  * **TWRP Recovery 3.0.2** - We use version 3.0.2 because we had problems with newer 3.2.1, [[#installing_the_xenonhd_custom_rom|see below]]. NOTICE: When you flash the recovery image, do not reboot normally, otherwise the partition will be overwritten. From poweroff, reboot instead into //Select Boot Mode Menu// and choose Recovery.
 +  * **Stock ROM 20170908** - We found on the net the archive Y8303.YX.A7.Gretel.B1B8.6.0.V01.07.20170908.rar. Beware that this stock ROM contains a trojanized launcher! [[#infected_stock_rom_20170908|See below]]. It features Android 6.0, with security patch level August 5, 2015.
 +  * **SuperSU v2.82** build number 20170528234214 - Needed to gain root privileges and replace the launcher.
 +  * **Rootless Pixel Launcher 3.9.1** - Downloaded from F-Droid repository, replaces the trojanized default launcher.
 +
 +^ Model number                  | A7  |
 +^ Android version               | 6.0  |
 +^ Android security patch level  | August 5, 2016  |
 +^ Baseband version              | MOLY.WR8.W1449.MD.WG.MP.V59.P4, 2016/09/05 16:45  |
 +^ Kernel version                | 3.18.19\\ xsh@joyatel07 #2\\ Fri Sep 8 12:20:34 CST 2017  |
 +^ Build number                  | Y8303.YX.A7.Gretel.B1B8.6.0.V01.07.20170908  |
  
 ===== Factory Installed Malware: com.ibingo.launcher3 and Wireless Update  ===== ===== Factory Installed Malware: com.ibingo.launcher3 and Wireless Update  =====
Line 74: Line 90:
 La rimozione della app di cui sopra non è stata sufficiente. Quindi si è provveduto anche a rimuovere: La rimozione della app di cui sopra non è stata sufficiente. Quindi si è provveduto anche a rimuovere:
  
-  * **Launcher3-com.ibingo.launcher3-Launcher3_G_WVGA_FWVGA_4.4.X.0.1.5_Ibingo-60170519.apk** (cartella ''/system/priv-app/Launcher3_G_yisheng_A47_201705191558''). Classificato come malware da [[http://www.avg.com/|AVG]] e [[http://www.drweb.com/|DrWeb]], ecc.). **ATTENZIONE!** Questa app è il launcher predefinito! Prima di rimuoverlo è necessario installarne un altro (ad esempio Apex Launcher) e renderlo predefinito da //Impostazioni// => //Home Page//.+  * **Launcher3-com.ibingo.launcher3-Launcher3_G_WVGA_FWVGA_4.4.X.0.1.5_Ibingo-60170519.apk** (cartella ''/system/priv-app/Launcher3_G_yisheng_A47_201705191558''). Classificato come malware da [[http://www.avg.com/|AVG]] e [[http://www.drweb.com/|DrWeb]], ecc.). **ATTENZIONE!** Questa app è il launcher predefinito! Prima di rimuoverlo è necessario installarne un altro (ad esempio **Rootless Pixel Launcher** da F-Droid) e renderlo predefinito da //Impostazioni// => //Home Page//.
   * **com.whatsapp** (cartella ''/system/vendor/operator/app/whatsapp'')   * **com.whatsapp** (cartella ''/system/vendor/operator/app/whatsapp'')
   * **com.facebook.katana** (cartella ''/system/vendor/operator/app/facebook'')   * **com.facebook.katana** (cartella ''/system/vendor/operator/app/facebook'')
Line 102: Line 118:
     - **Riavviare** il telefono     - **Riavviare** il telefono
     - Verificare il file **/data/system/packages.xml**: i riferimenti alle app rimosse dovrebbero scomparire automaticamente dopo il reboot.     - Verificare il file **/data/system/packages.xml**: i riferimenti alle app rimosse dovrebbero scomparire automaticamente dopo il reboot.
 +
 ===== Modalità Sviluppatore e Debug USB ===== ===== Modalità Sviluppatore e Debug USB =====
  
Line 107: Line 124:
  
 Nel menu //Impostazioni// compare anche //Opzioni sviluppatore//, tra le quali è possibile attivare **//Debug USB//**. Nel menu //Impostazioni// compare anche //Opzioni sviluppatore//, tra le quali è possibile attivare **//Debug USB//**.
- 
-^ Numero modello       | A7  | 
-^ Versione di Android  | 6.0  | 
-^ Livello patch di sicurezza Android  | 5 agosto 2016  | 
-^ Versione banda base  | MOLY.WR8.W1449.MD.WG.MP.V59.P4, 2016/09/05  | 
-^ Versione kernel      | 3.8.19\\ xsh@ubuntu-S2600JF #2\\ Fri May 26 15:39:25 CST 2017  | 
-^ Numero build         | Y8303.YX.A7.Gretel.B1B8.6.0.V01.07.20170526  | 
  
 ===== OEM unlocking ===== ===== OEM unlocking =====
Line 322: Line 332:
 ===== Installing the XenonHD Custom ROM ===== ===== Installing the XenonHD Custom ROM =====
  
-FIXME **WARNING**! The **XenonHD_Gretel_A7.zip** archive we found (md5sum b0d5c42c17015d95e965e74df56fee96) has some major problems. Notabily **the GPS does not work** and it miss the **soft keys**.+FIXME **WARNING**! The **XenonHD_Gretel_A7.zip** archive we found (md5sum b0d5c42c17015d95e965e74df56fee96) has some major problems. Notabily **the GPS does not work** and it miss the **soft keys** (the latter may be can be fixed by editing ''/system/build.prop'', see below).
  
 We have found an unofficial **[[https://www.xenonhd.com/|XenonHD]]** custom ROM for the Gretel A7, it is not famous as the LineageOS, but we are searching something to upgrade Android and to wipe-out completely the original trojanized operating system. So we followed the instruction on the page **[[https://www.getdroidtips.com/android-nougat-gretel-a7/|How To Install Android 7.1.2 Nougat On Gretel A7]]** and got the ROM archive from this **[[https://yadi.sk/d/6zHLRSGh3PjcVe|Yandex Disk]]**. We have found an unofficial **[[https://www.xenonhd.com/|XenonHD]]** custom ROM for the Gretel A7, it is not famous as the LineageOS, but we are searching something to upgrade Android and to wipe-out completely the original trojanized operating system. So we followed the instruction on the page **[[https://www.getdroidtips.com/android-nougat-gretel-a7/|How To Install Android 7.1.2 Nougat On Gretel A7]]** and got the ROM archive from this **[[https://yadi.sk/d/6zHLRSGh3PjcVe|Yandex Disk]]**.
Line 353: Line 363:
     * Browse to **open_gapps-arm-7.1-mini-20190927.zip**, No Zip signature verification.     * Browse to **open_gapps-arm-7.1-mini-20190927.zip**, No Zip signature verification.
     * **Swipe to confirm Flash**.     * **Swipe to confirm Flash**.
 +
 +===== Installing Stock ROM 20170908 (with trojan launcher) =====
 +
 +On the internet we found the file **Y8303.YX.A7.Gretel.B1B8.6.0.V01.07.20170908.rar** (md5sum decb53fef12c13c30a8759fc55f5dfa4). It seems an offical Gretel ROM, but it has some **malware inside the launcher**. We flashed that ROM using **SP Flash Tool 5.1916** downloading all the partitions to the phone; after some hours **unwanted icons popped-up on the home screen** (icon labels were //Tarot// and //Funny//).
 +
 +
 +  - Power-off the phone. Using SP Flash Tool from a PC, **flash the partitions**: //preloader//, //lk//, //boot//, //recovery//, //logo//, //secro//, //system//, //cache// and //userdata// from stock ROM archive. This will erase all user data and settings on the phone.
 +  - Reboot into normal system and enable **USB debugging**:
 +    * //Settings// => //About phone//, tap 7 times on //Build number//.
 +    * //Settings// => //Developer options//, enable //OEM unlocking// and //USB debugging//.
 +  - Upload **SuperSU** and **Rootless Pixel Launcher** from the PC to /sdcard/ directory, using **adb push**.
 +  - Power-off the phone and **flash TWRP** recovery image with SP Flash Tool. Boot in //Select Boot Mode Menu// with **Volume UP+Power**, then choose Recovery.
 +  - From TWRP Recovery, install **SuperSU**.
 +  - Reboot into system, install **Rootless Pixel Launcher** from the file manager; from //Settings// => //Home//, make it the default.
 +  - From the PC, run **adb shell** and remove the trojanized launcher using root privileges. See below.
 +
 +We checked the **apk** file found into the **/system/priv-app/Launcher3_G_Develop_yisheng_A47_201709071813/** directory against some on-line checking services (notably [[https://www.drweb.com/|Dr. Web]]), and it was marked as **infected with Android.Ibingo.1.origin**.
 +
 +So we downloaded and installed an **alternative launcher** from F-Droid: **[[https://f-droid.org/en/packages/amirz.rootless.nexuslauncher/|Rootless Pixel Launcher]]** and made it the default from //Settings// => //Home//. Then - using root privileges, we uninstalled the trojanized launcher.
 +
 +<code>
 +mount -o remount,rw /system
 +rm -r /system/priv-app/Launcher3_G_Develop_yisheng_A47_201709071813
 +mount -o remount,ro /system
 +rm -r /sdcard/.com.yinshengA47.launcher3/
 +</code>
 +
 +
 +We did not trust either the app **WirelessUpdate**, it was not reported as infected (it was indeed in ROM release 2017-05-19), but we don't trust updates from people which distribute infected apps! The app to be removed is:
 +
 +  * **Name**: WirelessUpdate
 +  * **Package**: com.fota.wirelessupdate
 +  * **Folder**: /system/priv-app/SystemFota/
 +  * **Menu Entry**: Settings => About phone => WirelessUpdate
 +
 +Using root privileges we executed:
 +
 +<code>
 +mount -o remount,rw /system
 +rm -r /system/priv-app/SystemFota/
 +mount -o remount,ro /system
 +reboot
 +</code>
 +
 +After the reboot we confirmed that the Settings menu entry was gone.
 +
 +We removed alto the unwanted **WhatsApp** and **Facebook** apps:
 +
 +<code>
 +pm uninstall com.facebook.katana
 +pm uninstall com.whatsapp
 +mount -o remount,rw /system
 +rm -r /system/vendor/operator/app/facebook/
 +rm -r /system/vendor/operator/app/whatsapp/
 +mount -o remount,ro /system
 +</code>
 +
 +**NOTICE**: If you enable a **Google account**, you will find a new application installed into **/data/app/com.google.android.gms-1/**, do not remove it because it is the **Google Play Services** required to access the Play Store, etc.
 ===== Immersive Mode ===== ===== Immersive Mode =====
 +
 +:!: **NOTICE**: No need to install a dedicated app to have Immersive Mode for one App, just use the command **settings put global** from an **adb shell**, as explained below!
  
 Questo smartphone Android ha il solo pulsante fisico //Home//, i pulsanti //indietro// e //menu// sono virtuali ed **occupano la parte bassa dello schermo**. La cosa è noiosa per i programmi che avrebbero vantaggio ad usare tutto lo schermo, come un programma di navigazione GPS. Questo smartphone Android ha il solo pulsante fisico //Home//, i pulsanti //indietro// e //menu// sono virtuali ed **occupano la parte bassa dello schermo**. La cosa è noiosa per i programmi che avrebbero vantaggio ad usare tutto lo schermo, come un programma di navigazione GPS.
Line 361: Line 431:
 Tale App ha bisogno dell'autorizzazione per lo //spostamento su altre app//, questo permesso viene gestito direttamente da //Impostazioni// -> //App// -> //Settings// (icona ingranaggio) -> //Spostamento su altre app//. Vengono evidenziate le app che richiedono tale permesso ed è possibile autorizzarle o revocere il permesso. Tale App ha bisogno dell'autorizzazione per lo //spostamento su altre app//, questo permesso viene gestito direttamente da //Impostazioni// -> //App// -> //Settings// (icona ingranaggio) -> //Spostamento su altre app//. Vengono evidenziate le app che richiedono tale permesso ed è possibile autorizzarle o revocere il permesso.
  
 +===== Force one App in Immersive Mode =====
 +
 +To force one single app to run in full screen immersive mode just use the following command line from a PC connected to the USB debug:
 +
 +<code>
 +adb shell settings put global policy_control immersive.full=net.osmand.plus
 +</code>
 +
 +In this exampled we configured **net.osmand.plus** to run in **full immersive** mode **hiding the Status Bar** at the top of the screen and **hiding the Android Navigation Bar (Soft Keys)** at the bottom.
 +
 +Beside the **immersive.full** you can use the **immersive.status** setting if you want to keep the top Status Bar and the **immersive.navigation** if you want to keep the Navigation Bar only.
 +
 +The setting takes effect immediately, even if the app is running! The setting will survive the phone reboot, you can confirm from an adb shell:
 +
 +<code>
 +settings get global policy_control
 +immersive.full=net.osmand.plus
 +</code>
 +
 +To delete the settings:
 +
 +<code>
 +settings delete global policy_control
 +</code>
 +
 +If you want to set the immersive mode for two application you have to use a comma separated syntax: **immersive.full=com.package.one,com.package.two**.
 +
 +**WARNING**: It seems that immersive mode is **not longer available** in **Android 11**.
 +
 +===== Disable Soft Keys =====
 +
 +Instead of using the  **Full Screen Immersive Mode** as seen above, we can disable (hide) the **Android soft keys** altogether. Just ''mount -o remount,rw /system'' and edit the **/system/build.prop** file changing the value of **qemu.hw.mainkeys** from zero to 1. You have to reboot the phone to see the effect.
 +
 +<file>
 +# Disable the NAV bar (soft keys)
 +qemu.hw.mainkeys=1
 +</file>
 +
 +Beware that some applications or some system menu **requires the back button to fully operate**, you may find yourself stuck in some app.
 ===== Web References ===== ===== Web References =====
  
doc/appunti/hardware/gretel_a7.1569684032.txt.gz · Last modified: 2019/09/28 17:20 by niccolo