Hey,
I've been thinking about starting development of a kernel on S8+, but I've heard that there are issues such as charge not going above 80% and some other stuff I don't even remember anymore but I did read about it.
Can somebody point me to patch to allow over 80% charge with tripped knox or is this issue non existent with latest source?
What other things would I need to do to have a kernel working just like stock minus knox features?
How would I go about "deknoxing" kernel?
How can I trick kernel to say that knox isn't tripped?
Sorry if that's not the right section but I couldn't really find a better place to ask this while getting a good amount of replies. If this isn't the right section, mods, please move it. First samsung device I've ever owned so I'm stepping into new grounds for me aswell.
olokos said:
Hey,
I've been thinking about starting development of a kernel on S8+, but I've heard that there are issues such as charge not going above 80% and some other stuff I don't even remember anymore but I did read about it
Can somebody point me to patch to allow over 80% charge with tripped knox or is this issue non existent with latest source?
What other things would I need to do to have a kernel working just like stock minus knox features?
How would I go about "deknoxing" kernel?
How can I trick kernel to say that knox isn't tripped?
Sorry if that's not the right section but I couldn't really find a better place to ask this while getting a good amount of replies. If this isn't the right section, mods, please move it. First samsung device I've ever owned so I'm stepping into new grounds for me aswell.
Click to expand...
Click to collapse
I'm not 100% convinced it's in the kernel. Meerly swapping the abl.elf combo with the stock one your device refused to boot but will charge to 100%. This happens when I have the combo boot.img and the stock abl, so.
In everything for SD can be stock firmware except abl, devcfg, recovery, and boot. This is how I package my firmware for both my samfail installs and my just better firmware standalone.
Basicallay, unless you have Samsung private key, you won't be making kernels that solve that problem for the people in which it matters.
Oh, and answering the patch question: nothing in their released kernel source has anything on this. And whatever abl is it's closed source and looks encrypted, so we haven't gotten far that direction either
olokos said:
Hey,
I've been thinking about starting development of a kernel on S8+, but I've heard that there are issues such as charge not going above 80% and some other stuff I don't even remember anymore but I did read about it.
Can somebody point me to patch to allow over 80% charge with tripped knox or is this issue non existent with latest source?
What other things would I need to do to have a kernel working just like stock minus knox features?
How would I go about "deknoxing" kernel?
How can I trick kernel to say that knox isn't tripped?
Sorry if that's not the right section but I couldn't really find a better place to ask this while getting a good amount of replies. If this isn't the right section, mods, please move it. First samsung device I've ever owned so I'm stepping into new grounds for me aswell.
Click to expand...
Click to collapse
It all depends on what s8+ model you have to better answer your question. The snapdragon version in USA has locked bootloaders so we can't use custom kernels. The kernel we are forced to use is a factory kernel that has selinux set to permissive on boot. this allows security to be relaxed enough for root to work. On exynos version, they have unlocked bootloaders. they can flash custom kernels and recovery.
I'm talking about exynos version. Is 80% battery bug related only to snapdragon devices?
I know that I can't get knox back, that's due to efuse popping the moment we trip knox, I was just talking about faking it in download mode etc.
Yeah, 80% is rooted US Snapdragon S8/S8+ right now. Maybe part abl.elf, part boot.img responsible; abl may start it and hands the baton to sbin healthd binary, which then utilizes the inbuilt scaling of the kernel battery driver.
---------- Post added at 04:14 PM ---------- Previous post was at 03:42 PM ----------
The funny thing is I would never have purchased an S8+ if US carrier ones were Exynos, because Exynos doesn't perform as well in truly custom rooms due to Samsung not releasing Exynos source code--or so I've heard. Kind of ironic, I guess: purchase something that would perform better in truly custom ROMs for that very reason, but soon discover is completely unable to be utilized with any truly custom ROM!
olokos said:
I'm talking about exynos version. Is 80% battery bug related only to snapdragon devices?
I know that I can't get knox back, that's due to efuse popping the moment we trip knox, I was just talking about faking it in download mode etc.
Click to expand...
Click to collapse
knox stats can somewhat be hidden in rom, but download can't be fooled. it checks by sending voltage to efuse with it knows what it should be.
MrSteelX said:
knox stats can somewhat be hidden in rom, but download can't be fooled. it checks by sending voltage to efuse with it knows what it should be.
Click to expand...
Click to collapse
What do you mean? What does misrepresenting 0x1 in download mode help with?
You can absolutely fool download mode, and as it turns out it's not very smart tLll.
Samfail will forever proof of that
partcyborg said:
What do you mean? What does misrepresenting 0x1 in download mode help with?
You can absolutely fool download mode, and as it turns out it's not very smart tLll.
Samfail will forever proof of that
Click to expand...
Click to collapse
It helps with nothing apart for the looks. I've also heard that in some services they just check it like that and based on this they tell you if you still have warranty or not, so why not?
Question is how to fake it or where's the code regarding this located.
jhofseth said:
Yeah, 80% is rooted US Snapdragon S8/S8+ right now. Maybe part abl.elf, part boot.img responsible; abl may start it and hands the baton to sbin healthd binary, which then utilizes the inbuilt scaling of the kernel battery driver.
---------- Post added at 04:14 PM ---------- Previous post was at 03:42 PM ----------
The funny thing is I would never have purchased an S8+ if US carrier ones were Exynos, because Exynos doesn't perform as well in truly custom rooms due to Samsung not releasing Exynos source code--or so I've heard. Kind of ironic, I guess: purchase something that would perform better in truly custom ROMs for that very reason, but soon discover is completely unable to be utilized with any truly custom ROM!
Click to expand...
Click to collapse
Exynos variants are the ones with unlocked bootloader and sources, there we have now AOSP ROM under alpha development and custom ROMs
Sent from my SM-N950F using Tapatalk
jhofseth said:
Yeah, 80% is rooted US Snapdragon S8/S8+ right now. Maybe part abl.elf, part boot.img responsible; abl may start it and hands the baton to sbin healthd binary, which then utilizes the inbuilt scaling of the kernel battery driver.
---------- Post added at 04:14 PM ---------- Previous post was at 03:42 PM ----------
The funny thing is I would never have purchased an S8+ if US carrier ones were Exynos, because Exynos doesn't perform as well in truly custom rooms due to Samsung not releasing Exynos source code--or so I've heard. Kind of ironic, I guess: purchase something that would perform better in truly custom ROMs for that very reason, but soon discover is completely unable to be utilized with any truly custom ROM!
Click to expand...
Click to collapse
Well you heard incorrectly. Android/touchwiz are based off the Linux kernel. Linux kernel is licensed under the gpl, gpl (GNU public license) makes providing the source code for any project making use of gpl'd software mandatory.
Technically they don't have to give the source away for free, but given gpl anyone who purchased it could then offer it for free legally. Samsung's hands are tied when it comes to this. Companies have been taken to court by the fsf/eff and lost in the past.
Sure they could hire a team of lawyers and fight it for years, bit at the cost of losing whatever credibility they have left with the Android community.
Also what "sources" do you speak of? Kernel source? That's been out for ages. "Drivers"? Part of the Linux kernel, see above.
Do mean some kind of touchwiz ui toolkit? Most custom roms dont do tw anyway and aosp is wide open, so I'm not sure why that would matter a lot
From what I've heard defconfig changes are enough to do "deknoxing".
What about faking knox status? How would I go about faking it in kernel itself?
maybe outdated link
partcyborg said:
Well you heard incorrectly. Android/touchwiz are based off the Linux kernel. Linux kernel is licensed under the gpl, gpl (GNU public license) makes providing the source code for any project making use of gpl'd software mandatory.
Technically they don't have to give the source away for free, but given gpl anyone who purchased it could then offer it for free legally. Samsung's hands are tied when it comes to this. Companies have been taken to court by the fsf/eff and lost in the past.
Sure they could hire a team of lawyers and fight it for years, bit at the cost of losing whatever credibility they have left with the Android community.
Also what "sources" do you speak of? Kernel source? That's been out for ages. "Drivers"? Part of the Linux kernel, see above.
Do mean some kind of touchwiz ui toolkit? Most custom roms dont do tw anyway and aosp is wide open, so I'm not sure why that would matter a lot
Click to expand...
Click to collapse
https://www.xda-developers.com/samsung-exynos-and-aosp-explained-a-story-of-betrayal/
This is probably outdated now. In the past Samsung has done stuff like say they could choose GPL or BSD and choose BSD.
jhofseth said:
https://www.xda-developers.com/samsung-exynos-and-aosp-explained-a-story-of-betrayal/
This is probably outdated now. In the past Samsung has done stuff like say they could choose GPL or BSD and choose BSD.
Click to expand...
Click to collapse
Yea that really sucks that they pull that ****. Unfortunately the eff/fff are the only organizations that have the resources necessary to successfully prosecute a gpl violation case. It's been done before but it's costly and time consuming so I think it's typically a method of last resort so when these companies drag their feet they get away with it as they publish something eventually and it's hard to conclusively prove its not complete unless something glaringly obvious is missing. Ususally at least what gets put out is usually enough to at least build a pure oss implementation.
Fun fact: the SN-G950U kernel source as published by Samsung doesn't even compile as is :laugh: there are silly syntax/include errors in a few places. There is also a zip file inside that looks to be another copy of at least part of the kernel source with VZW in its name but the actual zipfile is corrupted lol. It's too bad that there aren't requirements on how it gets released, just that the code is somehow available.
Q: Can somebody point me to patch to allow over 80% charge with tripped knox or is this issue non existent with latest source?
A: This is only on Snapdragon variants. Due locked BL you cant even use a custom kernel.
Q: What other things would I need to do to have a kernel working just like stock minus knox features?
A: I dont understand this question. What would there be broken? You need a different libsecurestorage lib to fix WiFi/Hotspot + disable securestorage from default.prop & You need modded camera firmware files by geiti94 or jesec.
Other than that toolchains could break VoLTE (according to some other kernel devs), so stick to Google's 4.9 tc. You have enough kernels out there for the E8995 to see yourself what needs fixing (i.e. camera etc.).
Q: How would I go about "deknoxing" kernel?
A: Disable it from defconfig; tima, knox, rkp etc.
Q: How can I trick kernel to say that knox isn't tripped?
A: Use resetprop in ramdisk with an init script that will fake the knox status into 0x0. Or just code it inside the cmdline of the kernel and dont worry about resetprop ever again.
Noxxxious said:
Q: Can somebody point me to patch to allow over 80% charge with tripped knox or is this issue non existent with latest source?
A: This is only on Snapdragon variants. Due locked BL you cant even use a custom kernel.
Q: What other things would I need to do to have a kernel working just like stock minus knox features?
A: I dont understand this question. What would there be broken? You need a different libsecurestorage lib to fix WiFi/Hotspot + disable securestorage from default.prop & You need modded camera firmware files by geiti94 or jesec.
Other than that toolchains could break VoLTE (according to some other kernel devs), so stick to Google's 4.9 tc. You have enough kernels out there for the E8995 to see yourself what needs fixing (i.e. camera etc.).
Q: How would I go about "deknoxing" kernel?
A: Disable it from defconfig; tima, knox, rkp etc.
Q: How can I trick kernel to say that knox isn't tripped?
A: Use resetprop in ramdisk with an init script that will fake the knox status into 0x0. Or just code it inside the cmdline of the kernel and dont worry about resetprop ever again.
Click to expand...
Click to collapse
The above isnt quite true. The combination factory image results in max 80% charge for all devices including exynos. The difference is because the exynos isn't bootloader locked the permissive selinux and dm-verity off for system aren't necessary for root like they are for snapdragon.
For example, a root that does not trip Knox like SamFail will require using the combo rom which will be 80% max charge.
So 80% max or 0x1, you pick
Re: knox
I'm not sure what the above poster is referring to, but getting rid of knox with the combo kernel is as simple as changing a few build.prop lines and removing some system apps. Sure there are still files on the machine that have the word knox in them, but knox the security tool is completely gone, it does not even appear in your about phone section. Absolutely no other software or other functionality is affected. This is how every sampwnd and samfail root user has their device configured.
partcyborg said:
The above isnt quite true. The combination factory image results in max 80% charge for all devices including exynos. The difference is because the exynos isn't bootloader locked the permissive selinux and dm-verity off for system aren't necessary for root like they are for snapdragon.
For example, a root that does not trip Knox like SamFail will require using the combo rom which will be 80% max charge.
So 80% max or 0x1, you pick
Re: knox
I'm not sure what the above poster is referring to, but getting rid of knox with the combo kernel is as simple as changing a few build.prop lines and removing some system apps. Sure there are still files on the machine that have the word knox in them, but knox the security tool is completely gone, it does not even appear in your about phone section. Absolutely no other software or other functionality is affected. This is how every sampwnd and samfail root user has their device configured.
Click to expand...
Click to collapse
There is no choice in 80% max or 0x1 because OP wants to create a custom kernel, therefore no factory binary boot.img will be used that limits your cap.
Also the question states how to deknox the kernel and not the rom.
Noxxxious said:
There is no choice in 80% max or 0x1 because OP wants to create a custom kernel, therefore no factory binary boot.img will be used that limits your cap.
Also the question states how to deknox the kernel and not the rom.
Click to expand...
Click to collapse
Lol then there is no option at all for snapdragon, as custom kernels are not possible.
partcyborg said:
Lol then there is no option at all for snapdragon, as custom kernels are not possible.
Click to expand...
Click to collapse
Yep, title of the thread states Exynos so I dunno where all the snapdragon talk came from
Anyway I hope that the OP knows enough now to start his journey. Goodluck!
Noxxxious said:
Yep, title of the thread states Exynos so I dunno where all the snapdragon talk came from
Anyway I hope that the OP knows enough now to start his journey. Goodluck!
Click to expand...
Click to collapse
Lol what journey? As stated here these "features" don't exist
@partcyborg it's a nice way of saying that I can now start development as all my questions were answered by @Noxxxious
Cheers mate!
Related
https://opensource.samsung.com/rece...hod=reception_search&searchValue=SGH-I777_ATT
this is awesome , this means we can have a rooted kernel on launch day!!!!
AT&T Galaxy S II Sub-Forum?
Where is the love for our own forum since we now have the kernel?
Edit: Well, it just happened this morning. Cool, our own forum.
The AT&T version is close enough to the international version that maybe they should keep the same forum? Or just have a sub forum for the dev board like i9003 on the i9000 board.
anilkuj said:
https://opensource.samsung.com/rece...hod=reception_search&searchValue=SGH-I777_ATT
this is awesome , this means we can have a rooted kernel on launch day!!!!
Click to expand...
Click to collapse
Hope the devs can find something they may be able to use on our version of this great phone.
I uploaded the file here also in case site goes down or anything
http://www.multiupload.com/R7CG8ZR085
Wow. Samsung releases something ahead of hardware and a carrier to boot. More reason to boot atnt.
I voided my warranty and your mum.
anilkuj said:
https://opensource.samsung.com/rece...hod=reception_search&searchValue=SGH-I777_ATT
this is awesome , this means we can have a rooted kernel on launch day!!!!
Click to expand...
Click to collapse
Nice head start for the devs
pukemon said:
Wow. Samsung releases something ahead of hardware and a carrier to boot. More reason to boot atnt.
I voided my warranty and your mum.
Click to expand...
Click to collapse
Awesome sig sir.
sent from my stock Infuse at Tranquility Base.
Looking forward to this... but I hear Sammy has been really good with the stock ROMs for this model. Great starting points for our amazing devs
Sure hope a custom ROM gets put up soon after launch. I'm sure the stock one will suffice for a few days. Not looking for anything fancy, just want some good 'ol root access.
bigblue95z said:
Sure hope a custom ROM gets put up soon after launch. I'm sure the stock one will suffice for a few days. Not looking for anything fancy, just want some good 'ol root access.
Click to expand...
Click to collapse
I'm sure you will be able to root it pretty quick. A custom kernel may take a few days... a good one will take a few weeks, if someone is able to dedicate some real time to it. Sure you will get some quick ROMs that are basically stock with a custom theme and bloatware removed, but I digress.
I THINK I read that DG already has something SETUP for the ATT version and just waiting to ha e it in hand to test it. Would be awesome to get some tentative roms set up before launch day so I can flash the same day
Sent from My KickAss Captivated CM7 OC'd 1.5Ghz/Undervolted
RockRatt said:
I THINK I read that DG already has something SETUP for the ATT version and just waiting to ha e it in hand to test it. Would be awesome to get some tentative roms set up before launch day so I can flash the same day
Sent from My KickAss Captivated CM7 OC'd 1.5Ghz/Undervolted
Click to expand...
Click to collapse
Heck yeah! Where'd you read that?
RockRatt said:
I THINK I read that DG already has something SETUP for the ATT version and just waiting to ha e it in hand to test it. Would be awesome to get some tentative roms set up before launch day so I can flash the same day
Sent from My KickAss Captivated CM7 OC'd 1.5Ghz/Undervolted
Click to expand...
Click to collapse
Yep He will be developing the same ROMs for both phones although the Kernel will have to be reoriented due to the button on the international version like the i9000 was re the Captivate. I believe ROMS will be interchangeable but not kernels.
anilkuj said:
https://opensource.samsung.com/rece...hod=reception_search&searchValue=SGH-I777_ATT
this is awesome , this means we can have a rooted kernel on launch day!!!!
Click to expand...
Click to collapse
Depends on how different the initramfs is - fortunately it probably won't be significantly different.
Here's a recommendation I have from my experience with the Infuse community - I'm on the fence about upgrading Sunday, but since the AT&T GSII variant has a smaller screen and no Wolfson I'm likely to stick with the Infuse:
On launch day, have some people on IRC coordinating. Once a root kernel is developed, don't immediately post it here. Pick a handful of people to flash and test. Once they have root, their first order of business should be getting a clean stock system dump.
Once you have a system dump you can make an Odin/Heimdall-flashable system image with root - have someone who did NOT flash the root-injection kernel flash THAT in order to get a dump of the stock kernel. Without that you'll be flying blind as far as initramfs.
A few tips:
http://forum.xda-developers.com/showpost.php?p=17777056&postcount=42 - my initial tips for the Epic 4G Touch crew
http://forum.xda-developers.com/showthread.php?t=1081239 - You'll need this to make a Heimdall-flashable image from your system dump
https://github.com/mistadman/Extract-Kernel-Initramfs - Once you've dumped a stock kernel image, use that script to extract the initramfs. Put that up on github ASAP.
Also, I strongly recommend putting a straight unmodified source tarball up on github, and then work on getting it to a compilable state from there. That way the process of "cleaning up" the Samsung source is documented in git commits. See the early commits from LinuxBozo at https://github.com/Entropy512/linux_kernel_sgh-i997r/commits/master?page=2 as an example
If all goes well, I will have my GS2 Sunday morning, and be on IRC as well, ready to test flash the rooted kernel for you guys.
Hmm, I get bored @ SGS2.
If someone can post stock initramfs, aka "adb pull /"
Remove /data and /cache from the local files on your computer and then zip it up and post it here, you have root
netchip said:
Hmm, I get bored @ SGS2.
If someone can post stock initramfs, aka "adb pull /"
Remove /data and /cache from the local files on your computer and then zip it up and post it here, you have root
Click to expand...
Click to collapse
Hmm - good point, I don't think anything in initramfs has permissions set such that a non-root ADB user can't read it.
Entropy512 said:
Hmm - good point, I don't think anything in initramfs has permissions set such that a non-root ADB user can't read it.
Click to expand...
Click to collapse
Sorry, miss understand.
It is not required to have root, I am now testing with my SGS2.
netchip said:
Sorry, miss understand.
It is not required to have root, I am now testing with my SGS2.
Click to expand...
Click to collapse
That's what I meant - Previously I was assuming that to get a "good" initramfs dump, root would be required. However, after reading your post I realized that all of the relevant files in the initramfs SHOULD be readable by any user, even without root permissions.
Still it's ideal to get a direct initramfs extract from the kernel zImage as soon as possible.
Entropy512 said:
That's what I meant - Previously I was assuming that to get a "good" initramfs dump, root would be required. However, after reading your post I realized that all of the relevant files in the initramfs SHOULD be readable by any user, even without root permissions.
Still it's ideal to get a direct initramfs extract from the kernel zImage as soon as possible.
Click to expand...
Click to collapse
Yeah, I know.
But I will give you root kernel if you give me: /lib, /res, all *.rc files, /vendor and /sbin.
hi there,
I'm aware that the CF-root-kernel is used a thousand-times by many people but this makes this question even more important: has it been completely reviewed by other developers in fact because the source is open?
don't get me wrong, I really don't want to allege anything to chainfire, but since it's the kernel, the core of the system, this component should be fully reviewed and proofed as clean and safe. otherwise no droidwall can ever detect e.g. silent data transmissions (sent on kernel-level) or spy-attack etc....
so if the whole CF-Root-Code is released e.g. on github I think things like that could be revealed/proofed. if it's completely closed it's just a question of trust...
unfortuanately it's seems like it's kept secret... because https://github.com/Chainfire says "Chainfire doesn’t have any public repositories yet"...
does chainfire keep his CF-Root-Source closed and secret and due to that could theoretically put some secret kits in there?
so I'd like to know if the CF-Kernel (made by chainfire) is open source or alternatively chainfire released his source code, and this code could and has been reviewed by others (e.g. experienced senior members)?
btw: if it's closed sourced and due to this potentially "unsafe"... are there any other fine root-kernels with cwm which are open source and due to can be fully trusted?
Hullo.
Well some developers like to have their hard work protected from stealing so they are using closed source approach. You should not fear using a kernel or ROM when it's downloaded from the official site, even better with md5 checksum.
Sent from outer space by aliens on tapatalk using SGS2
AJ.Rockwell said:
Hullo.
Well some developers like to have their hard work protected from stealing so they are using closed source approach. You should not fear using a kernel or ROM when it's downloaded from the official site, even better with md5 checksum.
Sent from outer space by aliens on tapatalk using SGS2
Click to expand...
Click to collapse
it doesn't provide any security if "it's downloaded from the official site" when the source of the "official site" has never / could never been reviewed. neither does a md5 checksum... if CF-Root is really closed source it's like blind faith and I think when in comes to kernels, the core of your phone... blind faith isn't a good idea...
CF-Root has no patches to the actual kernel, it's "only" the initramfs that is edited to give you everything you ask from his kernel.
Open a terminal, type "cd /" and off you go inspecting everything.
OpenSource would give you not a single bit of more "secure feeling" - what if the backdoor is simply not included in the source, but built into the binary release?
May I ask what exactely you are afraid of?
And on a sidenote:
Yes, I did a rather deep "walk through" the files of CF's kernel and you have no reason to believe and trust me more than CF himself, but let me state it anyways:
It's totally cool, save, no backdoors, everything is A-OK!
Hope that helped a bit
A thought about why would well known kernel/ROM devs place backdoors in their products is way beyond me. There surely is a botnet full of siyahkernel users haha jk... Just take it easy, CIQ is more of an issue lately..
Sent from outer space by aliens on tapatalk using SGS2
AJ.Rockwell said:
There surely is a botnet full of siyahkernel users haha jk...
Click to expand...
Click to collapse
*LOL*
That one really made me laugh XD
at first, thank you for your reply!
HellcatDroid said:
CF-Root has no patches to the actual kernel, it's "only" the initramfs that is edited to give you everything you ask from his kernel.
Click to expand...
Click to collapse
ok, but how can this be checked? how can it be proofed, that is the original kernel? can I proof it in anyway for my self? and maked shure that there is no backdoor in it?
HellcatDroid said:
initramfs
Click to expand...
Click to collapse
because I want to learn more... what is "initramfs" in particular?
HellcatDroid said:
Open a terminal, type "cd /" and off you go inspecting everything.
Click to expand...
Click to collapse
sorry that I ask so silly, but what will this command reveal, other than the content of the actual folder? how does this help to inspect the kernel in detail?
HellcatDroid said:
OpenSource would give you not a single bit of more "secure feeling" - what if the backdoor is simply not included in the source, but built into the binary release?
Click to expand...
Click to collapse
yeah, there you're right, what brings me to the question (see above) how the compiled files can be checked/verified/proofed?
HellcatDroid said:
May I ask what exactely you are afraid of?
Click to expand...
Click to collapse
just like you mentioned... something like backdoors, secret data transmissions which can be revealed because they happen on kernel-level...
HellcatDroid said:
And on a sidenote: Yes, I did a rather deep "walk through" the files of CF's kernel and you have no reason to believe and trust me more than CF himself, but let me state it anyways:
It's totally cool, save, no backdoors, everything is A-OK! Hope that helped a bit
Click to expand...
Click to collapse
hehe, thats right, I don't know neither you nor chainfire... although I appreciate you posting.
AJ.Rockwell said:
A thought about why would well known kernel/ROM devs place backdoors in their products is way beyond me. There surely is a botnet full of siyahkernel users haha jk... Just take it easy, CIQ is more of an issue lately..
Sent from outer space by aliens on tapatalk using SGS2
Click to expand...
Click to collapse
so I think it's no so odd to ask about the trustworthiness of CF-Kernel as well, isn't it? especially if it's kept secret by cf... no one should blind faith, when it comes to kernels...
In loose order of your questions above:
*
You can grab one of the kernel initramfs (see answer to what that is below) dumpers, most of them split the zImage into the actual kernel (code) and said initramfs.
The kernel (code) image should be almost 100% identical (almost due to some headers and those things that might be different due to the edited initramfs).
*
When the kernel is started, there is nothing - like on god's first day during creation (don't laugh, I kinda mean it like that! )
There is no system (that's still sitting somehwere on the flash or HDD or wherever) and nothing.
But the kernel needs a place to start booting up the system and to load additional kernel (driver) modules from that are not statically compiled into the kernelcode itself.
So the zImage has an image of a small, base filesystem that is placed into a RAM disc just before the kernel code is started (usually done by the bootloader).
This filesystem is the "initramfs" (short for "initial RAM-disk filesystem").
In the SGS2 case (or Android in general) /system and /data (and some others) are mounted into this so the system can finally be booted up by the kernel.
*
with "cd /" you change to the uppermost, "root" directory of the system, it's where everything starts in Unix/Linux world and where the mentioned initramfs is.
So by browsing the folders in there (except for additionally mounted in one's like /syste, /data, /efs, /tmp and some more) you are exploring the contents of the initramfs - it's not really secret.
Though, it can be made more secret, of course.
*
there is about one bazillion tools and apps that can compare files
CF Root is the most vanilla out of all the Kernels. It is just the Samsung stock Kernel + root. It has been tried by thousands of people without a problem and is 100% clean, safe and open source.
if in doubt
chainfire specifically mentioned that his kernel is taken from the stock samsung firmware, modified to get "root", CWM and busybox. he didn't mention of any specific tweaks (to make it better than stock).
so when in doubt, after rooting (and used up all the goodies of CF-root kernel), flash back to stock kernel. he included in his post how to do it.
have you reviewed the stock kernel's source? is it safe?
Paranoid much ? I'd be more worried about crap (Carrier IQ, etc) your telco has put on their particularly branded phone (particularly if you have a US variant of the SGS2) than anything Chainfire might do.
if youre so afraid, stay stock
oh and on a side note, theres this website called Google (go to www.google.com)
and search for answers.
Any app you download from the Market may have backdoors in them. Any app with network access may potentially connect back to the developer and send all sorts of information, or even files, back.
So, if you want to be "safe", you have no choice but to stick to the base stock software. But then ... maybe Samsung could have placed stuff in your phone doing stuff you may not be happy with.
And we can't forget Windows OS either, how many time may that connect and send info and files back, and have various backdooes we don't know about ?
As it has been pointed out, simply having "open source" doesn't guarantee you anything, unless you compile that yourself as well as.
Break out the tin-foil hats
Once u hear its chainfire... its safe. Good dev.
looks like an iphone but powered by android baby!!!!
It's a legitimate question. We are flashing modified software to our phones made by others. It can be a security risk, anyone could modify a rom and let it send privacy information to his server. It is someting we should consider everytime we flash a rom. That we always presume that the roms on XDA are safe, does not rule out the possibility that it will happen in the future. Smartphones are getting more interesting for people with bad intentions.
As mentioned above, it's the same with installing apps from unknown sources and even the Android Market.
But if there is any developer I would trust, it is Chainfire. He has done more for XDA then most of us ever will.
Thanks for all the replies!
postfatal said:
CF Root is the most vanilla out of all the Kernels. It is just the Samsung stock Kernel + root. It has been tried by thousands of people without a problem and is 100% clean, safe and open source.
Click to expand...
Click to collapse
Yes, I'd agreed that thousands of people use it without even think about it. I know / read that it's a very common and known root-kernel. but I think precisely because the latest scandals with spysoftware... it's important to look into these CF-Kernels. unfortunately I'm not able to review it myself, because I'm not that into Unix-Coding. What makes you so shure about it's really "Samsung stock Kernel + root"?
ngokula said:
chainfire specifically mentioned that his kernel is taken from the stock samsung firmware, modified to get "root", CWM and busybox. he didn't mention of any specific tweaks (to make it better than stock).
so when in doubt, after rooting (and used up all the goodies of CF-root kernel), flash back to stock kernel. he included in his post how to do it.
have you reviewed the stock kernel's source? is it safe?
Click to expand...
Click to collapse
Yeah, anyone can say anything he wants, like "chainfire specifically mentioned that...". yeah he might have mentioned it, but if his kernels aren't reviewed before they're used by thousands of people... hmm... as I mentioned I really don't want to allege anything to chainfire. I think he's doing a great job. I just wanted to ask, if there could be something in it, or if there are reviewd and proofed, not only used with blind faith...
Touché! The stock kernel could be unsafe as well. but the included "stock" kernel is not from samsung directly, but from chainfire as well... so it's the same source... that doesn't make it any better...
MistahBungle said:
Paranoid much ? I'd be more worried about crap (Carrier IQ, etc) your telco has put on their particularly branded phone (particularly if you have a US variant of the SGS2) than anything Chainfire might do.
Click to expand...
Click to collapse
yeah, you're right there. but wouldn't it be better if there's at least nothing added even more?
androidkid311 said:
Once u hear its chainfire... its safe. Good dev.
looks like an iphone but powered by android baby!!!!
Click to expand...
Click to collapse
yeah I have the same "feeling" about this, but this is just blind faith on my side. is is blind faith on your side, too, or do you have any hard proofs about this?
Lennyz1988 said:
It's a legitimate question. We are flashing modified software to our phones made by others. It can be a security risk, anyone could modify a rom and let it send privacy information to his server. It is someting we should consider everytime we flash a rom. That we always presume that the roms on XDA are safe, does not rule out the possibility that it will happen in the future. Smartphones are getting more interesting for people with bad intentions.
As mentioned above, it's the same with installing apps from unknown sources and even the Android Market.
But if there is any developer I would trust, it is Chainfire. He has done more for XDA then most of us ever will.
Click to expand...
Click to collapse
thanks for your approval. and I agree on you, too. I think only a few people even have a slight thought about what they flash there on their phone... I think this should always be peer-reviewed by professional devs, before its possible to download such files...
I personally would rather see people question things like this. People should NOT download crap from nobodies...
So to answer your question about CF-Root, here's why it's safe...
1) CF-Root is NOT a recompiled kernel. It's the 100% totally stock kernel. You can split the zImage into ramdisk and kernel image, and compare the kernel image SHA1 with that of the split stock zImage. If it's the KL1 CF-Root, compare to the KL1 stock. You'll find the two match identically.
2) CF-Root is a modified initramfs, to give functionality such as auto rooting, and much more. If you take your stock initramfs, and compare it to the CF-Root one, you can see the changes for yourself. It's shell scripts (bash), so it's plaintext.
You'll see binaries added to the initramfs - busybox for example... So go compare that to the generally available busybox and you'll see it's fine
In short? Yeah it's fine. In long? It's fine for the reasons above
pulser_g2 said:
I personally would rather see people question things like this. People should NOT download crap from nobodies...
So to answer your question about CF-Root, here's why it's safe...
1) CF-Root is NOT a recompiled kernel. It's the 100% totally stock kernel. You can split the zImage into ramdisk and kernel image, and compare the kernel image SHA1 with that of the split stock zImage. If it's the KL1 CF-Root, compare to the KL1 stock. You'll find the two match identically.
2) CF-Root is a modified initramfs, to give functionality such as auto rooting, and much more. If you take your stock initramfs, and compare it to the CF-Root one, you can see the changes for yourself. It's shell scripts (bash), so it's plaintext.
You'll see binaries added to the initramfs - busybox for example... So go compare that to the generally available busybox and you'll see it's fine
In short? Yeah it's fine. In long? It's fine for the reasons above
Click to expand...
Click to collapse
thank you very much! this is a well formulated and consistent answer! so chainfaire doesn't have to release his source, cause it's completely plain text... If that's true, it could be reviewed (and was I think), and that's fine.
I'm planning on getting this device shortly & was wondering if the stock kernel will work with most of the roms developed here? I'm just trying to do my homework so I can be ready when I have it in hand. I'm so ready to ditch the g2x.
Sent from my LG-P999 using xda premium
TBH I haven't seen a stock kernel NOT work with a Custom ROM. The only thing is some of the features i.e. Wifi Calling may not work. So it's always best to flash the recommended to avoid boot loops or bugs.
I just looked at four of the most popular ROMs, and in less than five minutes read that only one of them said stock kernel was ok. The other three say to flash either faux's kernel, xboarder's newest kernel, or the included boot.img in the download.
But yes the stock kernel will work but like just mentioned it will have limited functionality. In my opinion, read what the dev says in their OP and throughout their thread, but a whole thread on this isn't necessary.
I don't mean to be rude, just saying it like it is. Welcome!
Sent from my HTC_Amaze_4G using XDA App
Thanks for ur replys guy's. I have always used the stock kernel with every rom on every device I've used. I'm new to flashing kernels & every time I tried flashing a kernel I've always had issues. Thanks again for ur answers.
Sent from my LG-P999 using xda premium
I wonder how this thread's topic relates to development...
Okay let me clarify the whole kernel thing.
We have three types kernels to chose from.
The stock OTA kernel. That's what your phone comes with. It is secured which means it will not allow scripts to auto-start (which means that init.d is worthless) and does not default with superuser access from adb or terminal. You can still get root access but you always need to do "su" command.
The unsecured kernel. This is the kernel that comes with your rom. This is commonly found in the zip file of the custom rom that you download. The custom rom DOES NOT (which also means DOESN'T, WON'T, WILL NOT, CAN'T and CAN NOT) update the kernel by recovery like almost all the other phones do. We believe this is because we have bootloaders with S-ON. When or IF we get s-off we may be capable of flashing a kernel by recovery.
Faux123's kernel.
Refer to [Kernel]HTC Stock[2.6.35.13](v0.0.7)OC~1.73/UV/CIFS+UTF-8[Dec-30]
Q&A
But can't we flash Faux's kernel by recovery?
Yes and no. I developed a workaround to make that work however it doesn't directly flash the kernel from the recovery. It flashes the kernel after the phone has already booted which is why a second reboot is required.
Well... why not? I don't understand.
Unfortunately since the phone MUST come to a complete boot from a kernel that initiats init.d scripts (unsecured kernel as described above), we cannot use the above method going from a pure rooted OTA rom or when going from SenseUI 3.0 to SenseUI 3.5 or ICS roms. Let me know if you're confused by this.
Alright... so can you tell me more about Faux's kernel?
Well since I'm not Faux123 I'll try to answer this.
It's a slightly modified version of the unsecured kernel (capable of executing init.d scripts) that has been tweaked to allow slight over clocking and control over the voltage going to the CPU and RAM of the phone. This can help you or hurt you. You can push your processor harder and faster to increase performance but you may lose stability and drain your battery faster. Alternatively you can reduce the voltage and preserve battery life. At this time the kernel is NOT complete due to HTC not releasing the full source of their TI drivers. It would appear that since it is not technically their drivers, they don't have to release it.
So... what's the problem making the kernel?
Faux123 tried to make the kernel from source, unfortunately without the full source attempting to do so will lose wifi and wireless tethering abilities. Again... blame HTC for that. Until they release the full source we're stuck with this limitation.
So all this talking about kernels you still haven't explain how to flash it?
This part is easy.
Use this: [Guide][Tool] Kernel Flasher 2 Step/Kernel Restore Tool||Noob Proof||V3 released || or whatever directions are included with the ROM or kernel that you're interested in flashing. If you're skilled enough you can just use the fastboot commands.
From bootloader:
fastboot flash boot c:\directorytoboot\boot.img
(replace c:\directorytoboot with actual directory)
So in conclusion... as soon as HTC releases s-off for our devices as well as the full kernel source code we can have some really kick @$$ phones! Until then... we have to [email protected]$$ everything such as fastboot flashing our half-a$$ modified kernels. It's not the rom or kernel developers fault... it's HTC's.
Felinos11 said:
I wonder how this thread's topic relates to development...
Click to expand...
Click to collapse
Yeah yeah... I'll move it.
Thank you binary for your excellent explanation. I posted it here because the people with the knowledge frequent this board & hope they would see it. I apologize if I posted this in the wrong place.
Sent from my LG-P999 using xda premium
Binary100100 said:
Yeah yeah... I'll move it.
Click to expand...
Click to collapse
so how do I go back to stock kernel binary!!!!! i kid, i kid!!!
Stock kernel works fine.
seansk said:
so how do I go back to stock kernel binary!!!!! i kid, i kid!!!
Click to expand...
Click to collapse
Go choke on some nitrous.
Binary100100 said:
Go choke on some nitrous.
Click to expand...
Click to collapse
I love nitrous oxide, we had to try in in school, you should try it sometimes, we use it on kids, and some adults unfortunately that act like kids on the dental chair
seansk said:
I love nitrous oxide, we had to try in in school, you should try it sometimes, we use it on kids, and some adults unfortunately that act like kids on the dental chair
Click to expand...
Click to collapse
I'll try it while at the range. The range masters should love that.
Binary100100 said:
I'll try it while at the range. The range masters should love that.
Click to expand...
Click to collapse
Hmm...I don't know if those two will mix well!!!
Great news!
Developer jeboo from over at the Verizon S4 forum was successfully able to insert a modified stock kernel module without issue on MK2 (an older S4 build, but with Knox.)
What does this mean? Well, for one, it means that there is a possibility of kexec (custom kernels), but certain things need to be accomplished first. We need to figure out if we can exploit modified modules, as opposed to inserting a new module (which I'm not sure has been attempted yet using the put/get user exploit.) Jeboo is posting the code on github for developers out there. He is going to try on MJ7 next, as he has only attempted MK2 so far. The exploit was patched in October/November I believe, so there is a possibility MJ7 and MJE may be vulnerable. I will post the link for his github when it becomes available. Keep in mind there's much more we can accomplish besides kexec with kernel modules also.
Source: Here
Oh now that would be totally awesome the only thing I'm really missing is a fast charge kernel that would really solve the last of my problems.
ryanbg said:
Great news!
Developer jeboo from over at the Verizon S4 forum was successfully able to insert a modified stock kernel module without issue on MK2 (an older S4 build, but with Knox.)
What does this mean? Well, for one, it means that there is a possibility of kexec (custom kernels), but certain things need to be accomplished first. We need to figure out if we can exploit modified modules, as opposed to inserting a new module (which I'm not sure has been attempted yet using the put/get user exploit.) Jeboo is posting the code on github for developers out there. He is going to try on MJ7 next, as he has only attempted MK2 so far. The exploit was patched in October/November I believe, so there is a possibility MJ7 and MJE may be vulnerable. I will post the link for his github when it becomes available. Keep in mind there's much more we can accomplish besides kexec with kernel modules also.
Source: Here
Click to expand...
Click to collapse
Awesome news!! A lot of doors can be opened with that.
Sent from my SM-N900V using Tapatalk
I loved custom kernels on the Note 2 since they could be overclocked and had a lot of other useful features.
I had been wondering why the Note 3 didn't have any custom kernels, yet did have other custom ROMs.
http://forum.xda-developers.com/showthread.php?t=2578566
Sent from my SM-N900V using Tapatalk
Sweet
Sent from my SM-N900V using Tapatalk
This is good news.
Sent from my SM-N900V using Tapatalk
I don't mean to be the debby downer but... This is irrelevant, because kernel modules are disabled completely in the note 3. @ryanbg
Sent from my SM-N900V using Tapatalk
Brandonrz said:
I don't mean to be the debby downer but... This is irrelevant, because kernel modules are disabled completely in the note 3. @ryanbg
Sent from my SM-N900V using Tapatalk
Click to expand...
Click to collapse
Hashcode stated he was looking into this... Who knows what will come from this
2swizzle said:
Hashcode stated he was looking into this... Who knows what will come from this
Click to expand...
Click to collapse
Absolutely nothing, the only thing you can do is enter kernel modules and still be able to flash; wich leaves a possibility for a kexec module could be inserted. Our kernel disables kernel modules, so no possibly for a kexec module to be inserted. And even if there was something the get/put exploit could do for us, chances are It was patched most likely on mje, or mj7. He said he'll see what he can do with this, he was talking about the s4. Even ask @Hashcode himself.
Sent from my SM-N900V using Tapatalk
Brandonrz said:
Absolutely nothing, the only thing you can do is enter kernel modules and still be able to flash; wich leaves a possibility for a kexec module could be inserted. Our kernel disables kernel modules, so no possibly for a kexec module to be inserted. And even if there was something the get/put exploit could do for us, chances are It was patched most likely on mje, or mj7. He said he'll see what he can do with this, he was talking about the s4. Even ask @Hashcode himself.
Sent from my SM-N900V using Tapatalk
Click to expand...
Click to collapse
You can modify stock kernel modules without triggering signature verification, which makes inserting a new module redundant, at least for our purpose. MJE and prior kernels are most likely not patched as it was compiled on Nov. 11. The S4 and Note 3 are almost identical, so this is likely reproducible. I am sending an MJE boot.img to jeboo to take a look at. You should take a look at his code on github. He also tested this successfully on MJ7 for S4.
"The (1) get_user and (2) put_user API functions in the Linux kernel before 3.5.5 on the v6k and v7 ARM platforms do not validate certain addresses, which allows attackers to read or modify the contents of arbitrary kernel memory locations via a crafted application, as exploited in the wild against Android devices in October and November 2013."
From CVE-2013-6282
Verizon MJE Note 3 kernel was compiled on November 11th.
This is the exploit that jeboo is using. Here
I tested inserting a modified stock module and one I compiled. Btw, if you wanna use the modules from the kernel source tree, be sure to add
Click to expand...
Click to collapse
by jeboo from his exploit thread.
It's also important to note that if this does have any success on our device, it would be advisable to not update.
ryanbg said:
You can modify stock kernel modules without triggering signature verification, which makes inserting a new module redundant, at least for our purpose. MJE and prior kernels are most likely not patched as it was compiled on Nov. 11. The S4 and Note 3 are almost identical, so this is likely reproducible. I am sending an MJE boot.img to jeboo to take a look at. You should take a look at his code on github. He also tested this successfully on MJ7 for S4.
"The (1) get_user and (2) put_user API functions in the Linux kernel before 3.5.5 on the v6k and v7 ARM platforms do not validate certain addresses, which allows attackers to read or modify the contents of arbitrary kernel memory locations via a crafted application, as exploited in the wild against Android devices in October and November 2013."
From CVE-2013-6282
Verizon MJE Note 3 kernel was compiled on November 11th.
This is the exploit that jeboo is using. Here
by jeboo from his exploit thread.
It's also important to note that if this does have any success on our device, it would be advisable to not update.
Click to expand...
Click to collapse
This is indeed great news. A lot of amazing devs out there! Unfortunately for me i sold my note 3 and the dev edition is back ordered :/
If I fire up a terminal the modprobe and insmod commands are both there. @Brandonrz was saying that our kernel disables kernel modules, but why then are those commands available?
I am still on MI9 and I took an MI9 boot.img, extracted its contents and loaded the zImage file into IDA but I am in unfamiliar territory here. I searched for strings with "auth" in them and didn't see anything with lkmauth. Maybe that's because loadable kernel modules are, as @Brandonrz was saying, disabled. Obviously someone with more experience and knowledge of IDA would be beneficial here.
I'm at work now, but I plan on writing a simple kernel module to try and load it using modprobe to see what kind of output I get.
I know this isn't much, but thought I would at least contribute. Please don't get any false hope from this post, not much here.
I know this isn't much, but thought I would at least contribute. Please don't get any false hope from this post, not much here.[/QUOTE]
Iregardless, lol, thanks for keeping up with the fight!
Sent from my SM-N900V using Tapatalk
OK, to follow up to my previous post...I built a simple module and tried to load it using insmod which fired off an error about Function not implemented. So modules are definitely disabled for our kernel (turns out there's a much easier way to tell this, ::facepalm:: ). I guess insmod and modprobe are included despite the kernel config being set to not support modules. Sorry, I know this is repeat info for more experienced devs.
I'm going to leave this one alone, but I'm interested to learn more about the process as jeboo and other devs work on the GS4 solution.
lkspencer said:
OK, to follow up to my previous post...I built a simple module and tried to load it using insmod which fired off an error about Function not implemented. So modules are definitely disabled for our kernel (turns out there's a much easier way to tell this, ::facepalm:: ). I guess insmod and modprobe are included despite the kernel config being set to not support modules. Sorry, I know this is repeat info for more experienced devs.
I'm going to leave this one alone, but I'm interested to learn more about the process as jeboo and other devs work on the GS4 solution.
Click to expand...
Click to collapse
I didn't want to say anything but... Sorry, I want it as much as anyone else.
Sent from my SM-N900V using Tapatalk
MJE kernel patched the exploit for you guys, sorry and im not just saying that, I know this from personally looking at the kernel source and the patch for the exploit. I tried forever to get you guys saferoot. The interesting thing is that kingo still gets root for you guys with an as of yet undiscovered exploit..
Sent from my SCH-I545 using XDA Premium 4 mobile app
Brandonrz said:
I didn't want to say anything but... Sorry, I want it as much as anyone else.
Sent from my SM-N900V using Tapatalk
Click to expand...
Click to collapse
That's ok, it was a good learning experience for me. I've got quite a bit to learn for this stuff. I'm a developer by trade, but this is a different ball field for me.
---------- Post added at 08:59 AM ---------- Previous post was at 08:48 AM ----------
Surge1223 said:
MJE kernel patched the exploit for you guys, sorry and im not just saying that, I know this from personally looking at the kernel source and the patch for the exploit. I tried forever to get you guys saferoot. The interesting thing is that kingo still gets root for you guys with an as of yet undiscovered exploit..
Sent from my SCH-I545 using XDA Premium 4 mobile app
Click to expand...
Click to collapse
So since I am still on MI9 I can still use this exploit right? Is it possible to use it to make some kind of rootkit? I don't know to what end, just asking to learn.
lkspencer said:
That's ok, it was a good learning experience for me. I've got quite a bit to learn for this stuff. I'm a developer by trade, but this is a different ball field for me.
---------- Post added at 08:59 AM ---------- Previous post was at 08:48 AM ----------
So since I am still on MI9 I can still use this exploit right? Is it possible to use it to make some kind of rootkit? I don't know to what end, just asking to learn.
Click to expand...
Click to collapse
Honestly I dont know if it was MJE. It was whatever was the latest Samsung open source kernel they released at the time. We tested on the dev MJ3 kernel as well and that didnt work. But you have to edit the source with your kernels info. Id say if your output from cat /proc/version is early Oct or before then maybe.
I've just bought edge few days ago and wanted to know if rooting was worth it.
Will fingerprint still work?
Will i lose any functions?
is it easy to remove root and go back to stock?
which custom rom is most stable?
thanks
Will fingerprint still work? DEPENDS ON THE METHOD OF ROOT
Will i lose any functions? SAME AS ABOVE
is it easy to remove root and go back to stock? YES
which custom rom is most stable? I like Xtestolite with the newest unikernal
Running 5.0.2, rooted with Ping Pong Root.
Fingerprint unlock still works.
Haven't noticed any functionality failure, aside from no OTA updates...
As for unrooting, there are guides out there on the internets, however, from my understanding it boils down to "Use smart switch".
Can't speak on custom roms yet. Haven't taken the plunge and given up my Knox status... yet.
There doesn't appear to be an exploit for 5.1.1 yet (please someone correct me) to allow us to root 5.1.1 without flashing (and therefore tripping Knox) unless you are running a T-Mobile specific variant of our beautiful phone.
Hope that helps?
Mischala said:
Running 5.0.2, rooted with Ping Pong Root.
Fingerprint unlock still works.
Haven't noticed any functionality failure, aside from no OTA updates...
As for unrooting, there are guides out there on the internets, however, from my understanding it boils down to "Use smart switch".
Can't speak on custom roms yet. Haven't taken the plunge and given up my Knox status... yet.
There doesn't appear to be an exploit for 5.1.1 yet (please someone correct me) to allow us to root 5.1.1 without flashing (and therefore tripping Knox) unless you are running a T-Mobile specific variant of our beautiful phone.
Hope that helps?
Click to expand...
Click to collapse
You say installing custom roms will affect knox. That is not entirely true. As long as the rom is based on the original kernel k box should stay 0*0
Snowby123 said:
You say installing custom roms will affect knox. That is not entirely true. As long as the rom is based on the original kernel k box should stay 0*0
Click to expand...
Click to collapse
I was under the impression that flashing Anything that was not a signed Samsung package would trip the knox bit.
can you link any technical explanation on how the Knox detection functions? I haven't been able to find anything about it except Samsung's spiel about how Knox protects corporate users.
Mischala said:
I was under the impression that flashing Anything that was not a signed Samsung package would trip the knox bit.
can you link any technical explanation on how the Knox detection functions? I haven't been able to find anything about it except Samsung's spiel about how Knox protects corporate users.
Click to expand...
Click to collapse
Honestly I understand little of the technical jargon but I have proof that not all roms trip knox
Some useful info. Thanks all.
I've updated to the 5.1.1 so probably won't root for the time being as seems some have faced issue.
riz157 said:
Some useful info. Thanks all.
I've updated to the 5.1.1 so probably won't root for the time being as seems some have faced issue.
Click to expand...
Click to collapse
Nothing wrong with that. Although root has both pros and cons, it is only useful for some. No matter which you choose, it will be a good choice.