Looking at fixing this, unfortunately I had a funeral this weekend and was quite busy with other things going on.
Did you ever make a 4.4.2 version apk or did you end up upgrading to unlock? Don't really want to nuke my phone either if something is still in the worksThe problem with that for me is...if I odin OF1...then I have to use the yemen root exploit...and as I've said before....I don't trust it to be as harmless as they make it out to me.
This bootloader unlock I am comfortable with...I can see the full source code so know what it's doing. If needed I can compile a version for 4.4.2 or wait until the author gets around to it....which is better for all.
Sent from my Note 3 via Tapatalk
Nope...I am waiting on Ryan....it's his program...and I am not in any hurry.Did you ever make a 4.4.2 version apk or did you end up upgrading to unlock? Don't really want to nuke my phone either if something is still in the works
Just a matching CID and signature. Thanks! You can thank @beaups for finding the backdoor in Samsung eMMC so this method could be a reality.@ryanbg
You are a beast, sir. I just casually dropped in here after a very long absence and saw this. Your persistence is remarkable. If I end up doing this you've got some beer money coming your way. (Believe it or not I am still using MJ7 and Safestrap - didn't want to give up the tether bug.)
I went over to @beaups github repository and read through the code, and looked at some constants & blob values in your binary.
I'm sort of mystified by the SD Card backup - it happens on the 2nd invocation of the program, just before the dev_sig blob is kanged into ABOOT. Is it used following the second reboot? Maybe the kanging somehow trips the "boot from SD card and overwrite mmcblk0 with it's contents" mode?
I assume that your dev_cid and dev_sig are a matched pair from a legit VZW dev phone & that there is no currently known means to avoid having all users of this method share the same CID value. (I vaguely remember that all dev edition users had unique sig blobs, indicating that the signing operation occurs with a either with a unique hardware private key on the phone itself - or one-time only at the factory, so that use of ODIN on a dev phone destroys the "dev edition" status)
Not a huge deal unless big red decides to squash all users of a single CID... including the dev edition owner with the legitimate device.
Ignoring the obvious need of the ioctl to be present in the phone's kernel (& root privilege), does this method implicitly require a specific release, or is the cid <==> sig pair sort of independent of the contents of aboot/tz/sbl1 etc?
Thanks for your hard work and everything you have done for the wider Galaxy community.
bftb0
It's supposed to take 2 times. Once to change the cid and once to unlock the bootloader.Wow after all this time I've finally done it. I used the apk file originally posted above. It took two tries but it worked perfectly.
CID must start with 15Does this work on one specific version of the verizon galaxy note 3 phone because i keep getting:
[+] CID at boot time is/was: 11010030333247453404daa490c26100
[-]dont try this on non-samsung eMMC, seriously.
Mine says the same thingIs there anyway I can change that? What can I do?
Nothing you can do because your emmc chip is made by Toshiba not Samsung. Therfore it's not vulnerable to the unlock (at least it's not thought to be vulnerable not sure if it's being worked on).Mine says the same thing
I've got 4.4.2 Your unlock code fails with the "only works on (some) Samsung..." on my Note 3 (SM-N900V).The backup is triggered after the first reboot (cid change) and before aboot is modified. Its just a safety mechanism.
--beaups
mmc2 is your external sdcard.I've got 4.4.2 Your unlock code fails with the "only works on (some) Samsung..." on my Note 3 (SM-N900V).
Oh yea...why does my Note 3 have 2 different cid's? I am GUESSING because it has 2 different eMMC chips...but don't know enough about the hardware.
One starts with 15, the other with 03
[email protected]:/ $ su
[email protected]:/ # cd /sys
for i in `find . -depth -name cid -print` <
> do
> echo $i
> cat $i
> done
./devices/msm_sdcc.1/mmc_host/mmc1/mmc1:000
1/cid
1501004d424734474..........db000
./devices/msm_sdcc.3/mmc_host/mmc2/mmc2:e62
4/cid
0353445355333247..........00b700
[email protected]:/sys #
Sent from my Note 3 via Tapatalk
---------- Post added at 11:29 PM ---------- Previous post was at 10:46 PM ----------
Sent from my Note 3 via Tapatalk
Thanks...that makes sense!mmc2 is your external sdcard.
I am in the same boat as you. I modified the source, compiled the binary and it still crashed at "go back to google". Same as the original binary.Thanks...that makes sense!
Sent from my Note 3 via Tapatalk
I just told the nearly_useless_compat_check () to return 1I am in the same boat as you. I modified the source, compiled the binary and it still crashed at "go back to google". Same as the original binary.
I am going to have to dig a little deeper in the source.
I don't know much about this but would guess the aboot is different in some way.I just told the nearly_useless_compat_check () to return 1
And changed the define of CID1 to be:
#define CID1 "/sys/devices/msm_sdcc.1/mmc_host/mmc1/mmc1:0001/cid"
No other changes...it ran 1st time and did infact change cid to the new value
Ran 2nd time...it said the new cid is the dev cid and supposedly "fixed" aboot and backed up the loaders to the extSD card.
Shut down...but pulling battery and restarting didn't unlock aboot.
Ran a 2nd run ...same..said it fixed aboot but it was still locked.
Just to put things back...I created a new version that put my original cid back...that worked fine too.
Sent from my Note 3 via Tapatalk