FORUMS
Remove All Ads from XDA

Gear S3 Root and Kernel Source! (Android Wear Port Thread)

479 posts
Thanks Meter: 747
 
Post Reply Email Thread
Hey guys! Some of you might know me from the LG G5 scene, but I have since moved on from there and am hoping to make some progress with the Gear S3

After doing some digging and paying zero attention in class today, I came across the kernel source files for the Exynos 7270 and the combination firmwares for the Gear 3 Classic and Frontier versions.

If you don't know what combination files are here is a great explanation but the TL;DR is that this is the internal firmware Samsung uses to reset devices, so it gives you full read/write access to the device including root access. So basically this is a pre-rooted firmware, and I assume that it is bootloader unlocked as it appears to flash an engineer sboot (bootloader), so I believe this would be the first step towards porting Android Wear/TWRP!

The kernel source is what we will actually use to port over AW/TWRP. It does not seem to have been posted before, and took me a few hours of digging to find. My watch comes in tomorrow, and after I flash this firmware I will pull the boot.img and start making a device/vendor tree to attempt and make a kernel!

Here is the kernel source for the Exynos 7270: https://github.com/HonestlyAnnoying/...nel_exynos7270
Here is the kernel source for the Gear S3 (all versions) (will upload to GitHub in the morning): Samsung Opensource
Here is the SM-R770 (Classic) combination firmware [R770XXU2BQC2]: link
Here is the SM-R760 (Frontier) combination firmware [R760XXU2BQC2]: link

The road to porting Android Wear is going to take a lot of work, and any help developing (not testing for now!) would be EXTREMELY appreciated (looking at you guys @cipherswitch @biktor_gj !). If you would like to help with development or would like to contribute in any way, please PM me or hit me up on Skype (honestly.annoying)!

Here is a Google Drive folder with all files I have for this, it will be updated as new things are found
The Following 61 Users Say Thank You to Honestly Annoying For This Useful Post: [ View ] Gift Honestly Annoying Ad-Free
 
 
5th April 2017, 11:13 PM |#2  
Circular Pastry's Avatar
Senior Member
Thanks Meter: 15
 
More
The one thing that might persuade me to try a sammy product! Thanks for your efforts @Honestly Annoying
The Following User Says Thank You to Circular Pastry For This Useful Post: [ View ] Gift Circular Pastry Ad-Free
6th April 2017, 12:18 AM |#3  
OP Senior Member
Flag chicago
Thanks Meter: 747
 
Donate to Me
More
Update: have flashed this, can confirm it has root access!! Pulling images now
The Following 17 Users Say Thank You to Honestly Annoying For This Useful Post: [ View ] Gift Honestly Annoying Ad-Free
6th April 2017, 01:16 AM |#4  
wisefreakz's Avatar
Senior Member
Flag Sampa City
Thanks Meter: 631
 
More
Wow!!! Fingers crossed!!
6th April 2017, 01:49 AM |#5  
Senior Member
Thanks Meter: 3,551
 
More
@Honestly Annoying

Please, can you tell us what you see on Screen?
Maybe screenshot if posible...

I have flashed just for fun the older Z1 Combination I have... AOC1... and my SM-Z130H shows testmode Icons...
Later I can upload Screenshot... I have to remove something...

But in this Firmware I can enter all testmode Codes via Keys... like:
*#197328640#

And more... this is blocked in normal Firmware...

Cool. su work nice...
I can enter su in Shell and Super User is active... instead SDB Command:
sdb root on

Best Regards

Edit 1.
Screenshot from Combination Firmware AOC1 I have added in this Post:
https://forum.xda-developers.com/sho...&postcount=413
The Following User Says Thank You to adfree For This Useful Post: [ View ] Gift adfree Ad-Free
6th April 2017, 02:25 AM |#6  
OP Senior Member
Flag chicago
Thanks Meter: 747
 
Donate to Me
More
Quote:
Originally Posted by adfree

@Honestly Annoying

Please, can you tell us what you see on Screen?
Maybe screenshot if posible...

I have flashed just for fun the older Z1 Combination I have... AOC1... and my SM-Z130H shows testmode Icons...
Later I can upload Screenshot... I have to remove something...

But in this Firmware I can enter all testmode Codes via Keys... like:
*#197328640#

And more... this is blocked in normal Firmware...

Cool. su work nice...
I can enter su in Shell and Super User is active... instead SDB Command:
sdb root on

Best Regards

Edit 1.
Screenshot from Combination Firmware AOC1 I have added in this Post:
https://forum.xda-developers.com/sho...&postcount=413

I'm just going to start dumping information I find in this thread
6th April 2017, 02:26 AM |#7  
OP Senior Member
Flag chicago
Thanks Meter: 747
 
Donate to Me
More
this is the partition scheme

Code:
sh-3.2# ls -l /dev/disk/by-partlabel
total 0
lrwxrwxrwx 1 root root 15 Apr  6 09:52 boot -> ../../mmcblk0p8
lrwxrwxrwx 1 root root 15 Apr  6 09:52 cm -> ../../mmcblk0p7
lrwxrwxrwx 1 root root 15 Apr  6 09:52 cpnvcore -> ../../mmcblk0p3
lrwxrwxrwx 1 root root 15 Apr  6 09:52 csa -> ../../mmcblk0p2
lrwxrwxrwx 1 root root 16 Apr  6 09:52 csc -> ../../mmcblk0p11
lrwxrwxrwx 1 root root 16 Apr  6 09:52 module -> ../../mmcblk0p10
lrwxrwxrwx 1 root root 15 Apr  6 09:52 param -> ../../mmcblk0p6
lrwxrwxrwx 1 root root 15 Apr  6 09:52 ramdisk1 -> ../../mmcblk0p5
lrwxrwxrwx 1 root root 15 Apr  6 09:52 ramdisk2 -> ../../mmcblk0p4
lrwxrwxrwx 1 root root 15 Apr  6 09:52 recovery -> ../../mmcblk0p9
lrwxrwxrwx 1 root root 16 Apr  6 09:52 rootfs -> ../../mmcblk0p14
lrwxrwxrwx 1 root root 16 Apr  6 09:52 steady -> ../../mmcblk0p15
lrwxrwxrwx 1 root root 16 Apr  6 09:52 system-data -> ../../mmcblk0p12
lrwxrwxrwx 1 root root 15 Apr  6 09:52 tup -> ../../mmcblk0p1
lrwxrwxrwx 1 root root 16 Apr  6 09:52 user -> ../../mmcblk0p13
Code:
sh-3.2# ls -l /dev/disk/by-label
total 0
lrwxrwxrwx 1 root root 16 Apr  6 09:52 modules -> ../../mmcblk0p10
lrwxrwxrwx 1 root root 10 Apr  6 09:52 ramdisk -> ../../ram0
lrwxrwxrwx 1 root root 15 Apr  6 09:52 ramdisk-recovery -> ../../mmcblk0p4
lrwxrwxrwx 1 root root 16 Apr  6 09:52 rootfs -> ../../mmcblk0p14
lrwxrwxrwx 1 root root 16 Apr  6 09:52 tizen -> ../../mmcblk0p13
The Following 3 Users Say Thank You to Honestly Annoying For This Useful Post: [ View ] Gift Honestly Annoying Ad-Free
6th April 2017, 02:29 AM |#8  
Senior Member
Thanks Meter: 43
 
More
Quote:
Originally Posted by Honestly Annoying

Update: have flashed this, can confirm it has root access!! Pulling images now

Did it erase the serial number of the device?
6th April 2017, 02:31 AM |#9  
OP Senior Member
Flag chicago
Thanks Meter: 747
 
Donate to Me
More
Quote:
Originally Posted by 10urshin

Did it erase the serial number of the device?

nope
The Following 3 Users Say Thank You to Honestly Annoying For This Useful Post: [ View ] Gift Honestly Annoying Ad-Free
6th April 2017, 02:38 AM |#10  
Senior Member
Thanks Meter: 43
 
More
Quote:
Originally Posted by Honestly Annoying

nope

How about knox trip?
6th April 2017, 02:39 AM |#11  
OP Senior Member
Flag chicago
Thanks Meter: 747
 
Donate to Me
More
Quote:
Originally Posted by 10urshin

How about knox trip?

how can I check?
Post Reply Subscribe to Thread

Tags
android wear, gear s3, kernel, port, root

Guest Quick Reply (no urls or BBcode)
Message:
Previous Thread Next Thread
Thread Tools Search this Thread
Search this Thread:

Advanced Search
Display Modes