FORUMS
Remove All Ads from XDA

[05.09.2012] Got Brickbug ? v1.2

11,416 posts
Thanks Meter: 88,049
 
By Chainfire, Moderator Emeritus / Senior Recognized Developer - Where is my shirt? on 5th June 2012, 04:47 PM
Post Reply Email Thread
6th June 2012, 03:37 PM |#61  
Member
Thanks Meter: 8
 
More
Quote:
Originally Posted by andreww88

I'm saying avoid Samsung roms, absolutely. Yes, it is only the Samsung kernel. But, it is easier to just avoid the entire Samsung official ROMs for noobs.

The franco and speedmod kernels are stock (kinda) and they just disabled the MMC_Cap_erase code. So, they are pretty safe. If you HAVE to run a Samsung rom, you can flash one of these kernels. I was just making it easier on users.

Sorry for asking this, but I would be grateful for an answer from a "wise" person on this topic:

According to this app, I do have a vulnerable device. Today, eybee released v4 of his ICS RocketROM (Galaxy Note) and as I really miss the S-Note stuff, I would love to test it.

Is it correct that you suggest to stay away from that ROM? As far as I got the things right, there are safe kernel alternatives (e.g. franco), is this correct? So why isn´t there a flashable TouchWiz based ROM without the buggy kernel? Why isn´t e.g. francos kernel included from the beginning on?

I would be so glad to get some suggestions/help here
 
 
6th June 2012, 04:13 PM |#62  
trell959's Avatar
Senior Member
Flag California
Thanks Meter: 801
 
Donate to Me
More


Don't worry guys. If you're on a safe kernel, you have nothing to worry about.

Sent from my GT-N7000 using xda premium
6th June 2012, 04:22 PM |#63  
t00dy's Avatar
Senior Member
Thanks Meter: 26
 
More
Quote:
Originally Posted by trell959

Don't worry guys. If you're on a safe kernel, you have nothing to worry about.

Sent from my GT-N7000 using xda premium

is SiyahKernel v3.2.5.2 safe?? in the changelog there is: "Patch the firmware of certain Samsung emmc parts to fix a bug in the wear leveling code"
but in one version above (SiyahKernel v3.2.6.4) there is: "UPDATE: 29/5 wifi&mmc related fixes." I am asking this, because i have a hard bricked i9100 with installed v. 3.2.5.2, and i don't know it's because od eMMc or sth else!
6th June 2012, 04:55 PM |#64  
Senior Member
Flag Mobile, AL
Thanks Meter: 306
 
More
Quote:
Originally Posted by KennyLegend

You forgot to mention Siyah kernel is now safe as well on the S2..
On Siyah MMC_cap_erase = 0.

Sent from my GT-I9100 using xda premium

Because this is in the Note forum.....

---------- Post added at 10:55 AM ---------- Previous post was at 10:53 AM ----------

Quote:
Originally Posted by greenlant

Sorry for asking this, but I would be grateful for an answer from a "wise" person on this topic:

According to this app, I do have a vulnerable device. Today, eybee released v4 of his ICS RocketROM (Galaxy Note) and as I really miss the S-Note stuff, I would love to test it.

Is it correct that you suggest to stay away from that ROM? As far as I got the things right, there are safe kernel alternatives (e.g. franco), is this correct? So why isn´t there a flashable TouchWiz based ROM without the buggy kernel? Why isn´t e.g. francos kernel included from the beginning on?

I would be so glad to get some suggestions/help here

Flash that ROM and flash Franco or Speedmod kernel in CWM. Then you'll be safe. Don't wipe data before you flash franco or speedmod kernels though.
The Following User Says Thank You to andreww88 For This Useful Post: [ View ] Gift andreww88 Ad-Free
6th June 2012, 05:21 PM |#65  
Autodroid's Avatar
Member
Thanks Meter: 9
 
More
Thanks for for the head's up!!

Click image for larger version

Name:	uploadfromtaptalk1338999691987.jpg
Views:	1547
Size:	37.7 KB
ID:	1111012

Sent from my GT-N7000 using Tapatalk 2
6th June 2012, 06:05 PM |#66  
Member
Thanks Meter: 8
 
More
Quote:
Originally Posted by andreww88

Flash that ROM and flash Franco or Speedmod kernel in CWM. Then you'll be safe. Don't wipe data before you flash franco or speedmod kernels though.

One last question: with speedmod, there are two possibilies to flash: 1. via CWM, 2. via Odin.

Does it matter here as well, is it still "safer" to use odin or is it safe to use CWM as well (--> yellow triangle thing )

Beside that: Thank you so much!
6th June 2012, 06:30 PM |#67  
Senior Member
Flag Mobile, AL
Thanks Meter: 306
 
More
Quote:
Originally Posted by greenlant

One last question: with speedmod, there are two possibilies to flash: 1. via CWM, 2. via Odin.

Does it matter here as well, is it still "safer" to use odin or is it safe to use CWM as well (--> yellow triangle thing )

Beside that: Thank you so much!

Read the OP just to make sure.

But, you can use CWM and/or Mobile Odin. Flash the kernel with CWM. Reboot phone. When it comes up, open up settings, go to about phone, and look at kernel and see if you have it (just to double check and be safe). After that, you can wipe data if you need to.
6th June 2012, 07:22 PM |#68  
KennyLegend's Avatar
Senior Member
Flag Cork
Thanks Meter: 1,238
 
More
Quote:
Originally Posted by andreww88

Because this is in the Note forum.....

Of course it is....my apologies. A few of us S2 users got drawn here when Chainfire tweeted about the app and since it is also relates to us we forgot where we are

Sent from my GT-I9100 using xda premium
6th June 2012, 10:24 PM |#69  
Senior Recognized Developer
Flag Owego, NY
Thanks Meter: 25,477
 
Donate to Me
More
It would be beneficial to provide more information on the brick bug to avoid some people getting unnecessarily scared (such as most I9100 users).

This bug requires three things for you to be in danger, and ALL of these conditions must be met for danger:
1) A defective eMMC chip/fwrev that is unable to handle eMMC ERASE commands (command 38) properly. (I'll provide a link with more detail on the nature of the bug later) - This condition is the one Chainfire's new app checks for. By the way, M8G2FA fwrev 0x11 (seen on some Kindle Fires) is also suspected of being defective.
2) A recovery binary that attempts to erase partitions when formatting them. Most ICS recovery binaries fit in this category, most Gingerbread recoveries do not attempt to perform an erase operation so are safe. Note that also, an affected update-binary in a ZIP could be a cause of problems too. (e.g. flashing a firmware that has an ICS update-binary and formats the partition could cause a problem even with a "safe" recovery.) So a kernel can be repacked with a "safe" CWM (such as the most recent CF-Root releases) but it will still only be partially safe.
3) A kernel that allows attempts to erase a partition to actually happen. (as opposed to reporting "not supported" and doing nothing.) - A common way of rendering a kernel safe is to remove MMC_CAP_ERASE from the capability flags in drivers/mmc/mshci.c

As of June 6, 2012, this is what I know as far as kernels that meet condition 3:
  • All GT-I9100 ICS leaks and official releases prior to July 2012 are SAFE (MMC_CAP_ERASE not present)
  • New GT-I9100 ICS leaks and official releases (starting in July 2012) are UNSAFE - That's right, Samsung ADDED the trigger conditions for this bug to newer releases such as XXLQ5. So much for "we're working on a fix"...
  • All kernels based on GT-I9100 ICS Update4 sources are SAFE (MMC_CAP_ERASE not present) - This includes all CM9 nightlies for SGH-I777, GT-I9100, and GT-N7000, all GT-I9100 custom kernels I am aware of, and all SGH-I777 custom kernels I am aware of
  • All GT-N7000 ICS leaks are UNSAFE
  • All GT-N7000 ICS official kernels are UNSAFE
  • All kernels built from the GT-N7000 sources are UNSAFE unless the following condition is met:
  • MMC_CAP_ERASE is removed from the capability flags in drivers/mmc/host/mshci.c - check the kernel features for this. Franco.kernel R3 and later and all Speedmod ICS releases are SAFE due to this.
  • All SHW-M250S/K/L ICS kernels are suspected to be UNSAFE
  • All SHW-M250S/K/L ICS source releases as of this date are UNSAFE (SHW-M250L Update4 was the cause of the SiyahKernel 3.1rc6 incident. Other Siyah releases are SAFE)
  • All SPH-D710 ICS releases as of this date are UNSAFE - Rumor has it that the official OTA may have a fixed kernel, but it is recommended to consider this kernel UNSAFE until source code is released and can be reviewed.
  • The SGH-I777 UCLD3 leak is UNSAFE, as is most likely every other leak for that device. Fortunately nearly everyone is using I9100 Update4-based custom kernels.
  • SGH-I727 and SGH-T989 ICS leaks are UNSAFE - However as these two devices use separate recovery and operational kernels, if you have a Gingerbread recovery/kernel, you should be safe regardless of what you are booting for normal operation.

It's hard to get ALL of the cases and evaluate them, but in general in terms of levels of danger (As of June 6, 2012 - this could change with time):
SPH-D710 users are in the most danger - They have no official ICS releases AND the I9100 Update4 source base can't be used to build a usable kernel for their device without major developer work
GT-N7000 users are second on the list - They are the only ones outside of Korea to receive official ICS updates that trigger the eMMC firmware defect. However, I9100 Update4 sources required only minor work to create "safe" kernels, and developers know the proper procedure for rendering the official N7000 Update3 source drop "safe"
SGH-I777 users are next - I777 leaks proved to be dangerous a month or so ago. However, the SGH-I777 required the least amount of work to be able to use the GT-I9100 Update4 source base, and as a result, with the exception of the leaks themselves, nearly all I777 ICS kernels are based off of safe source code bases.
GT-I9100 users are in the least danger - No leak, official binary release, or source code release for this device has been dangerous. Only one I9100 kernel has ever proven dangerous and that was quickly pulled by its developer.

I am not evaluating the SHW-M250S/K/L in the above list, as while I know their source and binaries are dangerous, the language/culture barrier means we have very little information on how this fiasco is panning out for those users.

UPDATE:
We have at least one confirmed report of this bug occurring with KYL00M fwrev 0x12 on a Samsung Skyrocket (SGH-I727) with their ICS leak kernels
In addition, Samsung Hercules (SGH-T989) has the same fwrev and I've been told that they have observed bricks of this type with their ICS leaks

UPDATE 2:
I've received an email from a contact at Samsung who has indicated they are working on some sort of fix to be deployed to devices with an "UNSAFE" configuration listed above. I have requested that I receive an explicit list of which binary builds contain this fix, as without that I cannot know for sure which builds are fixed and which are not. Fixes are not yet deployed to affected devices.

UPDATE 3:
So much for the claims of working on a fix above... Not only have fixes not been deployed to any kernel for any device I am aware of, but Samsung added the trigger conditions to the XXLQ5 build for GT-I9100. Yes, that is correct - a device previously unaffected by this bug is now UNSAFE.
The Following 134 Users Say Thank You to Entropy512 For This Useful Post: [ View ]
6th June 2012, 10:47 PM |#70  
Member
Flag Gelderland
Thanks Meter: 3
 
More
(sg2)
i have the bug, i also have installed ics stock buildnr; XWLPD kernel 3.0.15 XWLPD

Now my question is

what is smart... Do nothing and wait while samsung fix this? ( or can i brick it to, while waiting (not flash)

or flash a 'safe' rom. (if so tip about rom are welcome)

I just not one to brick my phone (i love myn beast).

Sorry for my questions i'm beginner/noob on the sg2
6th June 2012, 11:05 PM |#71  
Junior Member
Thanks Meter: 0
 
More
Thanks, as always very useful tool

Sent from my GT-I9100 using XDA
Post Reply Subscribe to Thread

Guest Quick Reply (no urls or BBcode)
Message:
Previous Thread Next Thread
Thread Tools Search this Thread
Search this Thread:

Advanced Search
Display Modes