Please read the guides below before asking questions
1. I have changed the format with which I compress the archives. They are now .7z self-extracting files that have .exe at the end. This is because this compresses the files more and so makes for faster upload and downloading and also makes it easier for you to extract the package. Just double click and it will extract the .tar package for you without the need to use any program to unpack.
2. Also feel free to translate the guides to any other language and link to the files elsewhere, you don't need to ask for permission. All I ask is that you include a link to XDA-Developers in your write up.
Carrier branded firmwares have been moved to a separate thread and can be found here: http://forum.xda-developers.com/showthread.php?t=1113928
MAC Users I have found this utility that can handle .exe files to extract the archives called The Unarchiver. Link: http://wakaba.c3.cx/s/apps/unarchiver.html
Thanks to Pulsar_S2 I have now been able to separate the component section of the thread into separate posts to make things less complicated. The first post has the tutorial and guide and the firmwares have been moved to separate posts right below. I hope it's a better layout.
Please do not post links to packages from other places in this thread. It will help to avoid a lot of confusion when helping others when I know about the packages, when it's from elsewhere I cannot know what has been done to them and will not help people who use stuff I don't know about.
Do not ask me questions about SamMobile, packages from SamMobile or from other places. How do you expect me to know about stuff from other websites?
These questions will be ignored
I've started to package the tarball archives with the md5 hash to maintain the integrity of the packages. Just treat the tarballs in the same way as you would without the .md5 at the end. DO NOT CHANGE THE NAME OF THE ARCHIVE
The quick root guide has been updated to make use of a much simpler tool to achieve root without the need for Odin or insecure kernel
I've started to use 7Zip archives instead of self-executable ones to accommodate members using Macs and Linux as their primary OS. You can get 7Zip for free and it handles multiple formats
Here we go guys, latest official firmware. Oldest firmware are listed first and newest will will be the last/bottom of the list. These can be found in the second and third posts of the thread
PDA refers to the build version of the firmware
Phone refers to the baseband/modem version
CSC is the consumer software customisation and is specific to geographical region and carriers. It contains the software packages specific to that region, carrier branding and also APN settings for data connection, MMS etc for your service provider.
CSC has nothing to do with what languages the firmware supports and it will not add keyboard language support either.
.PIT refers to the partition information table you only need it if you screw up your partition table or if the firmware specifically requires it because of a change in the partition table layout. It's very likely you may never have to use this.
If the package only contains one .tar archive then it will have everything, pda+phone+csc, in the one file.
If it has multiple .tar archive then:
- The .tar with modem in the name is the phone/baseband bit of the package
- .tar with csc/multi-csc in the name is the csc bit of the package
- .tar with code/PDA in the name is the PDA part of the firmware package
If this is the case you will need to put these .tar archives in the specific areas of Odin to flash the update
The stock kernels are to be used to restore the kernel version after rooting and are not needed for updating the firmware.
You do not need to root or unroot the device to update the firmware.
Please ensure that KIES is closed and not running in the system tray! Kies doesn't like Odin, it's like the big brother who's always jealous that his little brother is getting to flash all the phones so he starts to flash block.
Regarding change logs. Samsung thinks firmware should be like a box of chocolates, you never know what you’re gonna get and that all a big part of the surprise user experience program so they don't publish any change logs.
Get Odin v1.85 from here: Download
Just extract Odin folder and keep the odin3.ini file in it.
Flashing Firmware with Odin
1. Just download the firmware version you want from the second or third posts and extract the .tar or .tar.md5 file in the archive and save it somewhere
2. Reboot your phone to download mode.
To get download mode shut down the device. After it shuts off completely simultaneously press the Down volume key+ Home button + press the power button .
You should see a warning asking you to press volume up if you want to continue or volume down to cancel, press volume up. You are now in download mode!
3. Start Odin
4. Click on the PDA button and browse to the .tar or .tar.md5 file that you extracted in step 1
If the package has more than one .tar archive then they will be labelled with PDA, Phone/Modem and CSC. Just put them in the corresponding section of Odin
5. DO NOT PUT .PIT FILE AND DO NOT, I REPEAT, DO NOT TICK REPARTITION.
Anyone ask about .pit file is a moron
Should look like this screenshot
If the package has 3 files it should look like this:
Regardless of firmware version it's still the same methodology
6. Connect the USB cable and wait for the ID:COM section to turn yellow
7. Click start to flash
8. Do not disconnect the cable or turn off the device, it will reboot when it finishes.
It will not wipe your phone if you flash as recommended
You will lose root so just re-root with the guide below
Quick Root Guide
This guide is for rooting the device if you don't want to use CF-Root or another custom kernel to root!
You can also root your device by simply flashing a root kernel. If you want to do this then stop reading this guide and follow the root guide for the kernel you wish to use.
Method 1 works with all firmware version
1. Download an insecure kernel from either Chainfire or Odia's thread. Any version will do so just grab the newest one, it doesn't need to match your current kernel version.
2. Download the stock kernel to match your firmware from below
3. Extract both kernels and remember where you've extracted them.
4. Download SuperOneClick V. 1.9.5. I know there are newer versions but just do what I say.
5. Make sure that your device is in USB debugging mode: Settings -> Applications -> Development -> USB debugging.
6. Put your device into download mode. To do so: Turn the device off, then power it on again by pressing and holding VolumeDown + Home + Power simultaneously.
7. Start ODIN. Wait for whatever drivers need to load and for the ID:Com section to turn yellow
8. Click on the PDA section and select the insecure kernel you extracted above. Make sure only Auto Reboot and F.Reset Time is ticked in the options
9. Click on start
10. Wait for it to reboot and then close Odin
11. Start SuperOneClick and don't change anything on the screen. I hope you didn't remove the USB cable but if you did just reconnect it
12. Hit root
13. Allow it to install everything it prompts you to, i.e. SU, BusyBox
14. When it's done just shutdown your phone and remove the USB cable
15. Put it into download mode
16. Start Odin and hit the PDA section and select the stock kernel you downloaded and extracted earlier that matches your firmware version.
17. Connect the USB cable and wait for the ID:Com box to turn yellow.Make sure only Auto Reboot and F.Reset Time is ticked in the options
18. Press start. Let it flash the stock kernel and reboot
19. You're now rooted.
1. Visit DooMLoRD's thread here: http://forum.xda-developers.com/showthread.php?t=1319653Method 2 May not work with all firmware version
2. Download the latest version of his Easy Rooting Toolkit
3. Extract the contents to a folder you'll remember
4. Open said folder from above and find the file "RUNME.bat"
5. Execute "RUNME.bat"
6. Follow onscreen instructions
7. If completed successfully you should now have a rooted device. High five!
8. I suggest you donate to the devs who discovered this exploit and developed this simple tool for us to root our device.
CE---> Belgium, Luxembourg, Netherlands
DX---> Indonesia, Malaysia, Philippines, Singapore, Vietnam
DZ---> Malaysia, Singapore
JA---> South Africa
JC---> Algeria, Morocco, Nigeria, South Africa, Tunisia
JP---> Arabic, Algeria, Egypt, Iran, Iraq, Kuwait, Morocco, Nigeria, Oman, Pakistan, Saudi Arabia, Syria
JV---> Tunisia, Turkey
UG---> North America
UH---> Latin America, The Caribbean
XE---> Bulgaria, Estonia, Kazakhstan, Latvia, Lithuania, Russia, Ukraine
XX---> Austria, Belgium, France, Germany, Hungary, United Kingdom
XW---> Austria, Belgium, France, Germany, Hungary, Italy, Nordic, Spain, United Kingdom
ZC---> China, Hong Kong
ZH---> Hong Kong
ZS---> China, Hong Kong