[Q] How Root Toshiba Excite Pro AT10LE-A-108

Search This thread

Drahflow

Member
Mar 22, 2021
23
4
bf000180 t cleanup_module [sealime]

That's different from my kernel layout, so we'd need a build a different glomus.ko patch. :(

If you are willing to spend a few more hours on this; I'd need the output of
root@tostab12BA:/ # cat /proc/kallsyms | grep register_sealime
root@tostab12BA:/ # cat /proc/kallsyms | grep print_hex_dump

and a copy of your /system/lib/modules/gps_drv.ko

Then I can patch that into a glomus.ko with instructions to dump (via print_hex_dump) the instructions of register_sealime (which you'll need to pull via adb logcat) and then with that info I can prepare a second version of glomus.ko to disable sealime on your device. It'll take a bit of back-and-forth I think, but OTOH you don't need to do any patching on windows.
 
Was not so easy since that shell doesn't have grep. I had to max the term buffer to 9999 then copy the output (was still truncated) and search in it:
c0857494 r __kstrtab_register_sealime
c08595b2 r __kstrtab_print_hex_dump_bytes
c08595c7 r __kstrtab_print_hex_dump
 

Attachments

  • gps_drv.zip
    61.7 KB · Views: 8
  • Output of cat proc-kallsyms.zip
    75.2 KB · Views: 7

Drahflow

Member
Mar 22, 2021
23
4
Unfortunately, those you found are the addresses in the string table which contains the symbol names, i.e. not useful for this.

Does
cat /proc/kallsyms > /data/local/tmp/kallsyms.txt
give you the full list?
 
Since I luckily still have access to the shell while the tabby is stuck on the booting I managed to let the dirtycow chow the system again and got the temp root again. With it I was able to get the complete dump of the kallsyms (had to chown it back to shell since adb pull couldn't get it otherwise). Would it be useful for you now?

c02145c4 t register_sealime
c0252878 T print_hex_dump
c02529a0 T print_hex_dump_bytes

Complete dump is attached.
 

Attachments

  • kallsyms.zip
    414.3 KB · Views: 8

Drahflow

Member
Mar 22, 2021
23
4
Please find attached a sightly "improved" version of your gps_drv.ko, which you can use like so:

1. Get temp root
2. Replace (in memory only) the original gps_drv.ko with the new one via dirtycow:
root@tostab:/data/local/tmp # ./dirtycow dump_memory.ko /system/lib/modules/gps_drv.ko
3. Load the new gps_drv.ko
root@tostab:/data/local/tmp # insmod /system/lib/modules/gps_drv.ko
It should say:
insmod: init_module '/system/lib/modules/gps_drv.ko' failed (Identifier removed)

4. Dump the kernel error log and search for the code-dump via glomus (should be near the end)
root@tostab:/data/local/tmp # dmesg

It should look like a bunch of lines like this one:
<3>[ 2669.888648] glomusc02096d0: 00 41 3f e2 00 40 bd e8 20 3a 3a e1 dd aa 27 e3 .@-..@..(=...0L.

Please copy them into a .txt and upload. Those are the (hex representation of) the init_sealime instructions. I should be able to use those as a template where to reset whatever init_sealime did (most likely by just clearing two pointers at the right address).
 

Attachments

  • dump_memory.zip
    63.6 KB · Views: 12
First of all thanks so much for your time and dedication to help me.
I pushed the dump_memory.ko into that /data/local/tmp folder (as shell of course, was wondering if I should have chown it to root before letting the dirtycow chew it). Got the temp root and issued the command ad 2.) ... didn't get the desired # prompt back even waited for like 20 minutes (got stuck on something):
root@android:/ # ./dirtycow dump_memory.ko /system/lib/modules/gps_drv.ko
/system/bin/sh: ./dirtycow: not found
127|root@android:/ # cd /data/local/tmp
o /system/lib/modules/gps_drv.ko <
dcow dump_memory.ko /system/lib/modules/gps_drv.ko
[*] size 152743
[*] mmap 0x40192000
[*] currently 0x40192000=464c457f
[*] using ptrace method
[*] madvise = 0x40192000 152743
[*] ptrace 0 5
[*] exploited 14500 0x40192000=464c457f
root@android:/data/local/tmp # [*] madvise = 0 16777216
[*] exploited 0 0x40192000=464c457f
<--- here it stopped and no further progress
root@android:/data/local/tmp # <--- after pressing Enter

So instead of proceeding to the step 3.) here is the dmesg output so far no glomus there. Please note that the tablet is stuck in the boot process somewhere.
 

Attachments

  • dmesg.zip
    19.2 KB · Views: 7

Drahflow

Member
Mar 22, 2021
23
4
I'm not exactly sure what's going on in your terminal (I think it didn't like to display one of the longer commands and the display / copy-paste got jumbled somewhat after that). But otherwise everything seems fine. Maybe it'll be better if you use a wider terminal, but no idea.
Anyway... Please redo step 2 (as soon as enter gets you a new prompt it's done; no need to wait 20 minutes) and then proceed to step 3 and 4. That the tablet is stuck somewhere in UI startup shouldn't matter.
 
My Win terminal/cmd has 132 chars width, it must be some limitation either by adb or the shell of the device but this doesn't really matter since the command is always taken.
I tried to redo the step 2.) after I got the prompt by clicking enter several times, see the attached log of my attempts. So then the step 2.) seemed to get through giving me prompt but then by step 3.) the whole tablet froze hard. I had to kill the terminal and make hard reset of the tablet since the sparkling stars froze too. Tried to make the whole procedure after the half boot again... total freeze by step 3.) 😰
I am afraid if I would try to do factory reset of the tablet in recovery mode I might lose the settings for USB debugging (the adb gateway into the device) and the tablet would become completely unaccessible dead brick.
Do you still have energy to continue? Doesn't have to be today...
 

Attachments

  • procedure attempts failing log.txt
    5 KB · Views: 5

Drahflow

Member
Mar 22, 2021
23
4
Sorry, I fear I confused the versions of the .ko file between my device and the new development for yours. Could you kindly retry step 3 with the attached .ko?

And indeed, DO NOT factory reset. There is nothing to be gained and potentially the adb access to be lost.
 

Attachments

  • dump_memory.zip
    63.6 KB · Views: 5

Drahflow

Member
Mar 22, 2021
23
4
Perfect! Based on this, I prepared a glomus.ko for your (and I sure hope all) at300se.

It should work like this:
1. Get temp root
2. Replace (in memory only) gps_drv.ko with glomus.ko
root@tostab:/data/local/tmp # ./dirtycow glomus.ko /system/lib/modules/gps_drv.ko
3. Load replaced driver
root@tostab:/data/local/tmp # insmod /system/lib/modules/gps_drv.ko
Should again complain about "Identifier removed."
4. Try to mount /system read-write
root@tostab:/data/local/tmp # mount -o remount,rw /system
5. Enjoy your new power to modify the system image any way you like. (No replacing the kernel though, as I said initially.)
 

Attachments

  • glomus.zip
    63.6 KB · Views: 6
Thank you for the glomus.ko But seems today still no victory. System freezes again at step 4.):

stem/lib/modules/gps_drv.ko <
dcow glomus.ko /system/lib/modules/gps_drv.ko
[*] size 152743
[*] mmap 0x4013a000
[*] currently 0x4013a000=464c457f
[*] using ptrace method
[*] madvise = 0x4013a000 152743
[*] ptrace 0 4
[*] exploited 537 0x4013a000=464c457f
root@android:/data/local/tmp #
root@android:/data/local/tmp #
root@android:/data/local/tmp # [*] madvise = 0 16777216 <--- wonder what output of some running process this is
[*] exploited 0 0x4013a000=464c457f

root@android:/data/local/tmp #
root@android:/data/local/tmp #
root@android:/data/local/tmp # insmod /system/lib/modules/gps_drv.ko
insmod: init_module '/system/lib/modules/gps_drv.ko' failed (Identifier removed)
255|root@android:/data/local/tmp #
255|root@android:/data/local/tmp #
255|root@android:/data/local/tmp # mount -o remount,rw /system
root@android:/data/local/tmp # <--- system freezes no prompt back no Enter
 

Drahflow

Member
Mar 22, 2021
23
4
Now that is sad. :( It *could* be something entirely else is wrong with your tablet (e.g. it dies upon remounting the filesystem due to corruption or problems with the flash chip), but how likely is that?

Can you do other sealime-restricted operations, e.g.
root@android:/data/local/tmp # cp /modules/sealime.ko /data/local/tmp/

Test before and after loading glomus.ko. Without it loaded, it should give you a permission denied error, with glomus.ko loaded, it should work (and not freeze the tablet). If it still freezes, something has changed in how sealime can be unregistered between the at300se and the excite pro.

Even in that case, don't declare the tablet useless yet, someone posted a cheap at300se on ebay a few days ago so I can test locally.
 
It didn't freeze the tablet but both ways before and after it's the same: Operation not permitted. 'cp' command is not recognized by the shell so I tried to use 'dd' instead see attached log. My knowledge of Linux is very limited.
If you would find a solution so that I could at least have it bootable again I would be so thankful. I understand it might take longer time but I guess I am not the only one who have successfully bricked the AT300SE device so it would help the community as well.
 

Attachments

  • procedure log 20220112_1.zip
    639 bytes · Views: 4
You are right when I look back on that txt file that I created from some cut-off parts of the terminal window. But it may also be that Dr. Alzheimer suddenly called me interrupting my work :rolleyes: as he usually starts bugging me already at my age :D.
Anyway I tried again today (hopefully all the steps), it didn't freeze but 'Operation not permitted' :cry:
I am still wondering if the dirtycow chews the system successfully. Why are always coming still some messages within like 10~15 secs when it gave the # prompt already? At that moment the prompt disappears until I press the Enter again. Strange what is it doing. Like if the sealime would still win the race over the dirty cow...
 

Attachments

  • procedure log 20220113.zip
    929 bytes · Views: 5

Drahflow

Member
Mar 22, 2021
23
4
I read your last procedure log. Did you dcow the dump_memory.ko, maybe? You need to dcow the glomus.ko (and only that).

I.e.

1. Get temp root
2. dcow glomus.ko /system/lib/modules/gps_drv.ko
3. insmod /system/lib/modules/gps_drv.ko
4. Try some restricted operation: E.g. dd if=/modules/sealime.ko of=/data/local/tmp/sealime.ko

(Wouldn't hurt to have an adb logcat running in parallel to some other window, maybe we can still see some errors if it freezes again.)
 
Hi Drahflow thank you for your persistence I thought you gave up on it. I dcow'd indeed the dump_memory.ko which came as instruction in your Post#127. So now I tried to dcow the glomus.ko and managed to get the sealime.ko module (see attached). The adb logcat runs constantly in the second terminal so I just copied some excerpts from it since it overwrites the buffer and runs and runs mostly with Fatal error 11.
 

Attachments

  • procedure log 20220129.txt
    4.3 KB · Views: 8
  • logcat running constantly 20220129.zip
    6 KB · Views: 5
  • sealime.zip
    17 KB · Views: 7

Top Liked Posts

  • There are no posts matching your filters.
  • 2
    Toshiba Excite Pro clones for donor parts

    The next step is to find Toshiba Excite Pro clones for donor parts.

    TEGRA 4 DEVICES
    Nvidia Shield Portable, Tegra Note 7, Microsoft Surface 2, HP Slate 7 Extreme, HP Slate 7 Beats Special Edition, HP Slate 8 Pro, HP SlateBook x2, HP SlateBook 14, HP Slate 21, ZTE N988S, nabi Big Tab, Nuvola NP-1, Project Mojo, Asus Transformer Pad TF701T, Toshiba AT10-LE-A (Excite Pro), Vizio 10" tablet, Wexler.Terra 7, Wexler.Terra 10, Acer TA272HUL AIO, Xiaomi Phone 3, Coolpad 大观 4, Audi Tablet, Le Pan TC1020 10.1", Matrimax iPLAY 7, Kobo Arc 10HD, Gigaset QV1030

    Database of Tegra 4 devices
    http://www.deviceinfohw.ru/devices/...form0&brand=brand0&filter=tegra&submit=Search

    Clones for SCREEN SIZE and RESOLUTION - Quanta Gigaset QV1030, Asus Transformer Pad TF701 (KOOC)
    Clones for SCREEN SIZE AND RESOLUTION, LENS, SOUND, ACCELEROMETER, MAGNETOMETER, GYROSCOPE, WIFI, AUDIO and 4 parts in 7 of OTHERS (dummy, palmas, nct_thermal, inv_dev) - Quanta Gigaset QV1030
    Clones for SCREEN SIZE AND RESOLUTION, SOUND, ACCELEROMETER, GYROSCOPE, WIFI - and 3 parts in 7 of OTHERS (dummy, palmas and nct_thermal) - Asus Transformer Pad TF701 (KOOC)
    Clones for SOUND, ACCELEROMETER, MAGNETOMETER and GYROSCOPE - Asus Google Nexus 7, HP SlateBook 10 x2 PC
    Clones for PMIC, WIFI and AUDIO - HP SlateBook 10 x2 PC
    Clones for WIFI and AUDIO - Quanta Gigaset QV1030, Asus Google Nexus 7, HP SlateBook 10 x2 PC
    Clones for WIFI - Quanta Gigaset QV1030, Asus Transformer Pad TF701 (KOOC)
    Clones for ALSPS - Asus Google Nexus 7
    Clones for LENS - Quanta Gigaset QV1030
    Clones for FLASH storage (032G4C) - Sony Xperia S LT26i
    Clones for FLASH storage (016G92 and 032G94) - ???
    Clones for TOUCHSCREEN, CAMERA - ???

    Quanta Gigaset QV1030 is the best clone for donor parts to Toshiba Excite Pro (AT10LE-A).

    Gigaset QV1030 Device Information:
    http://www.deviceinfohw.ru/devices/item.php?item=6255

    The QV1030 Kernel was published on the Gigaset Webpage.

    Gigaset QV1030 Sourcecode:
    https://web.archive.org/web/20150519070416/http://www.gigaset.com/support/open-source.html
    https://web.archive.org/web/2017060...igaset.com/opensource/QV830-QV1030/QV1030.tar

    Runner-up to best clone is Asus Transformer Pad TF701 (KOOC model).

    Asus Transformer Pad TF701 (KOOC model)
    http://www.deviceinfohw.ru/devices/item.php?item=5259

    Not registered at the database
    Nvidia Shield Portable (code name Roth)
    Nvidia Tegra Note 7
    and many others

    Develop For Tegra NOTE 7
    https://developer.nvidia.com/develop-for-tegra-note-7
    SHIELD Open Source Resources and Drivers
    https://developer.nvidia.com/shield-open-source
    The official LineageOS 13.0 for Nvidia Shield Portable (code name Roth)
    https://wiki.lineageos.org/devices/roth
    [ROM] [8.0] [UNOFFICIAL] LineageOS 15.0 for Nexus 7 2013
    https://xdaforums.com/nexus-7-2013/orig-development/rom-lineageos-15-0-nexus-7-2013-t3673103
    HP Slatebook X2 - maya - development thread (recovery,root)
    https://xdaforums.com/android/development/hp-slatebook-x2-maya-development-thread-t2809038
    [UNOFFICIAL] LineageOS 14.1 for HP Slatebook 14 by Carl Miller
    https://plus.google.com/+CarlMillerteamregular
    Asus Transformer Pad TF701 (Android 7.1.2) - 2560 x 1600 pixels
    https://xdaforums.com/transformer-tf701

    nAOSP ROM 7.x for Sony Xperia S LT26i - Clones for FLASH storage (032G4C)
    https://xdaforums.com/xperia-s/s-development/rom-naosprom-xperia-s-t3462373
    2
    Quanta Gigaset QV1030 is the best clone for donor parts

    I bought it also, would be great if someone could root this beautiful device:)

    Yes, and Today i Uploaded the Device Information to the Device Info HW App (by Audrey Efremov) Database:)
    The QV1030 Kernel was published on the Gigaset Webpage.

    Links:

    Gigaset QV1030 Device Information:
    http://www.deviceinfohw.ru/devices/item.php?item=6255

    Gigaset QV1030 Sourcecode:
    https://web.archive.org/web/20150519070416/http://www.gigaset.com/support/open-source.html
    https://web.archive.org/web/2017060...igaset.com/opensource/QV830-QV1030/QV1030.tar
    Marvellous! Quanta Gigaset QV1030 is the best clone for donor parts to Toshiba Excite Pro (AT10LE-A). It has identical SCREEN SIZE AND RESOLUTION, LENS, SOUND, ACCELEROMETER, MAGNETOMETER, GYROSCOPE, WIFI, AUDIO and 4 parts in 7 of OTHERS (dummy, palmas, nct_thermal, inv_dev).

    The source code is available from Gigaset. That is great!

    The Asus Transformer Pad TF701T (KOOC) clone has identical SCREEN SIZE and RESOLUTION, SOUND, ACCELEROMETER, GYROSCOPE, WIFI and 3 parts in 7 of OTHERS (dummy, palmas and nct_thermal).

    Fortunately, Asus Google Nexus 7 and HP SlateBook 10 x2 PCA can provide additional parts like ALSPS and PMIC, respectively.

    We still need parts from other clones: LCM, TOUCHSCREEN (goodix_touch), CAMERA (imx175_eeprom, mt9m114 and imx175), FLASH (016G92, 032G94 and 032G4C) and also 3 parts in 7 of OTHERS (dblc, nvtec and tc358770_dsi2edp).

    EDIT - (tc358770_dsi2edp) is Toshiba lcd transmitter (converter) dsi-2-edp
    2
    Ok. @YuriRM. I sent the tablet specification to the Device Info HW database by Audrey Efremov.
    @Rafostar how did you do it? Can you send me instructions on email? I'm not a programmer and when i enter the recovery mode (volume +, switch on) i do not know what to do next. Maybe I do not know what command to write then - doing wipa will not give me anything.
    Regards

    There is no need for you to dump it again. Recovery image should be the same on all Excite Pro tablets.
    I posted it here so devs can download it and modify it into custom recovery like TWRP for anyone to flash.
    But we need unlocked bootloader first. :(

    Anyway, here is the guide that should help you if you still want to try dumping it yourself:
    https://xdaforums.com/showthread.php?t=2450045
    Just after restoring root go to KingoRoot installed folder and one of the folders inside should contain adb.exe.
    Open command prompt there and type "adb shell", then execute commands from guide above ;)
    2
    @KP@2016 can you master the python scripts of BootStomp?

    Bootloader vulnerabilities on all android devices can be explored by BootStomp automated tool.

    Are you willing to try BootStomp on your device to learn how to use it? Then you may be able to help defeat Toshiba's Sealime protection and unlock the bootloader of Toshiba Excite Pro.

    BootStomp: a bootloader vulnerability finder.
    https://github.com/ucsb-seclab/BootStomp

    Nexus 9 (Nvidia Tegra K1) bootloader vulnerabilities:
    https://github.com/ucsb-seclab/BootStomp/tree/master/bootloaders/nexus_9

    Huawei P8, Nexus 9, Qualcomm Little Kernel and Sony Xperia XA, bootloader vulnerabilities
    https://github.com/ucsb-seclab/BootStomp/tree/master/bootloaders

    DR.CHECKER : A Soundy Vulnerability Detection Tool for Linux Kernel Drivers
    https://github.com/ucsb-seclab/dr_checker

    EDIT - The first person of the XDA forum running a state of the art security tool to defeat famous protection mechanisms of Toshiba, ZTE, iRULU, etc. will get noticed and bask in glory. Being so young is a bonus. Google will want to hire you!


    Even I want to work hard on such project but have to wait till 13th May since Semesters are going in my high school will end up on 13th May after that full focus on on this!
    2
    So, here is partitions info of this tablet:
    Part01.png

    And their names:
    Part02.png


    According to Nexus 7 development thread, these are common names on Tegra tablets:

    APP -> system
    CAC -> cache
    LNX -> boot
    MDA -> encrypted userdata
    MSC -> misc
    PER -> per device calibration
    SOS -> recovery
    UDA -> userdata
    USP -> bootloader

    Dumping recovery (SOS partition) was successful. :D
    I'm sending it in attached file.