Difference between revisions of "ADT-1 Android TV"

From Exploitee.rs
Jump to navigationJump to search
 
(9 intermediate revisions by the same user not shown)
Line 1: Line 1:
__FORCETOC__
__FORCETOC__
{{Disclaimer}}
{{Disclaimer}}
This page will be dedicated to a general overview of descriptions and information related to the ADT-1 Android TV.
[[File:Android_TV.jpg|200px|left|thumb]]
[[File:Android_TV.jpg|200px|left|thumb]]
[[Category:AndroidTV]]
[[Category:AndroidTV]]
This page will be dedicated to a general overview of descriptions and information related to the ADT-1 Android TV.
== Purchase ==
== Purchase ==
The ADT-1 is not available for purchase and is only obtained through purchase from individuals who obtained a unit at Google IO or through the official [https://support.google.com/googleplay/android-developer/contact/adt_request "Request an ADT-1"] page.
The ADT-1 is not available for purchase and is only obtained through purchase from individuals who obtained a unit at Google IO or through the official [https://support.google.com/googleplay/android-developer/contact/adt_request "Request an ADT-1"] page.
Line 55: Line 53:
* A sample build.prop from an Android TV ADT-1 device can be found at [[ADT-1 Android TV Sample Build.prop]]
* A sample build.prop from an Android TV ADT-1 device can be found at [[ADT-1 Android TV Sample Build.prop]]


== ADT UART Pinout ==
== UART Pinout ==
[[File:ADT-1_AndroidTV_UART.png|thumb|left]]
* UART console output as well as access to the FIQ Debugger is available by connecting a UART adapter to the ADT-1.
UART console output as well as access to the FIQ Debugger is available by connecting a UART adapter to the ADT-1.
<gallery>
 
File:ADT-1_AndroidTV_UART.png
</gallery>


== SysRq ==
== SysRq ==
Line 87: Line 86:
  sysrq <param> Execute sysrq with <param>
  sysrq <param> Execute sysrq with <param>
</pre>
</pre>
== boot.img ==
([http://www.twitter.com/giantpune @GiantPune]) on our IRC channel #Exploiteers rooted his ADT-1 using the Android Futex kernel exploit and dumped his boot.img. You can use this with fast-boot to root your ADT-1.
* [http://download.Exploitee.rs/file/google/ADT-1/boot.img ADT-1 boot.img]
== Updates ==
Along with the initial OTA another file was transmitted just prior to the OTA update.
* [http:///dl.google.com/dl/android/face/models-v2.zip models-v2.zip] Thanks [http://www.twitter.com/halfluck _halfluck_].
* Initial OTA: [http://android.clients.google.com/packages/ota/molly_release/bfc9e68931d96696a0c8ee24d16aab80223a470d.signed-molly-LPV79-from-KMV35.bfc9e689.zip molly-LPV79-from-KMV35] Thanks  [http://www.twitter.com/halfluck _halfluck_].
* Second OTA: [http://android.clients.google.com/packages/ota/molly_release/36fdf398726547acedf5dbc8a68a9624ac019d99.signed-molly-LPW39-from-LPV79.36fdf398.zip molly-LPW39] Thanks [http://www.twitter.com/luxferro397 luxferro397]
* Third OTA: [http://android.clients.google.com/packages/ota/molly_release/92b93576d67d8e41850996813de09757666c347a.signed-molly-LPX13D-from-LPW39.92b93576.zip molly-LPX13D] Thanks [http://www.twitter.com/luxferro397 luxferro397]

Latest revision as of 10:01, 31 December 2014

"Although the information we release has been verified and shown to work to the best our knowledge, we cant be held accountable for bricked devices or roots gone wrong." This page will be dedicated to a general overview of descriptions and information related to the ADT-1 Android TV.

Android TV.jpg

Purchase

The ADT-1 is not available for purchase and is only obtained through purchase from individuals who obtained a unit at Google IO or through the official "Request an ADT-1" page.

Tear Down

The ADT-1 Android TV is pretty easy to get apart once all the clips holding the case together are undone. In this tear down we used a razor blade but a guitar pick or similar small and durable piece of plastic is recommended.

Accessing Fastboot

AndroidTV ADT1 Fastboot.JPG
  • The bootloader on the ADT-1 distributed from Google IO comes unlocked. Below is the process on accessing fastboot interface.

Steps to enter recovery mode

  1. Hold reset button on back of ADT-1 for approximately 10 seconds or until device reboots.
  2. Screen will display fastboot options as seen in picture to the left. A short click of the reset button navigates while a long click selects.


Accessing Recovery

On the ADT-1 the standard "Android Recovery (3e)" is used. The menu for this mode is hidden behind Auto-Recovery functionality which clears the user-data and cache partitions.

Steps to enter recovery mode

  • Through adb using "adb reboot recovery"
  • Through the fastboot menu accessed with the process above.
  • By holding the reset button for roughly 20 seconds.

Bootloader Vars

Build.prop

UART Pinout

  • UART console output as well as access to the FIQ Debugger is available by connecting a UART adapter to the ADT-1.

SysRq

  • SysRq is available with the following commands.

SysRq : HELP : loglevel(0-9) reBoot Crash terminate-all-tasks(E) memory-full-oom-kill(F) kill-all-tasks(I) thaw-filesystems(J) show-backtrace-all-active-cpus(L) show-memory-usage(M) nice-all-RT-tasks(N) powerOff show-registers(P) show-all-timers(Q) Sync show-task-states(T) Unmount show-blocked-tasks(W) dump-ftrace-buffer(Z)

FIQ Debugger

  • FIQ Debugger is available with the following commands.
debug> help
FIQ Debugger commands:
 pc            PC status
 regs          Register dump
 allregs       Extended Register dump
 bt            Stack trace
 reboot [<c>]  Reboot with command <c>
 reset [<c>]   Hard reset with command <c>
 irqs          Interupt status
 sleep         Allow sleep while in FIQ
 nosleep       Disable sleep while in FIQ
 console       Switch terminal to console
 cpu           Current CPU
 cpu <number>  Switch to CPU<number>
 ps            Process list
 sysrq         sysrq options
 sysrq <param> Execute sysrq with <param>

boot.img

(@GiantPune) on our IRC channel #Exploiteers rooted his ADT-1 using the Android Futex kernel exploit and dumped his boot.img. You can use this with fast-boot to root your ADT-1.

Updates

Along with the initial OTA another file was transmitted just prior to the OTA update.