Bypass the Locked Bootloader on the Verizon Galaxy S III
Posted July 13, 2012 at 12:00 am by Former Writer
It can be said that development on the Verizon Samsung Galaxy S III has been a struggle. What was once anticipated to be a utopia of development between the four major carriers due to having nearly identical Galaxy S III devices has been marred by the locked bootloader on the Verizon version. Understandably, this has somewhat stifled development for the device, as the other three US variants rush forward at a breakneck pace while Verizon developers are held at the starting line.
This is a problem that CMTeamEpic is looking to fix. By reviving a concept Motorola Droid RAZR members will recognize, CMTeamEpic plans to get beyond the locked bootloader using Kexec, the bootloader workaround. The premise is to install a custom kernel in such a manner that it boots from the recovery instead of from the bootloader. CMTeamEpic explains:
Also recently, we’ve finished porting kexec hardboot—a method of booting kernels through recovery without needing to flash them to the device—to the Sprint SGS3, a feature that would also enable Verizon SGS3 users to make use of custom kernels despite the locked bootloader.
Despite being a breakthrough in development, the process is far from being complete. The ability to use a custom kernel is actually successful, but there’s a few unusual problems that CMTeamEpic are running into. The most interesting of which is that, once booted with the custom recovery, using the power menu to reboot the device automatically takes users back to recovery. Additionally, Kexec for the Galaxy S III is still being touted as a proof-of-concept process, so users should definitely be cautious while using it, as there can be some serious issues. CMTeamEpic released the standard boilerplate:
This is a proof-of-concept kernel intended for developers and experienced testers. It offers no new features in addition to the stock kernel. While we don’t expect these kernel images to cause touble, improper installation of these kernel images may cause irreparable harm. Use at your own risk.
For additional discussion, check out the original thread.
Want something on the XDA Portal? Send us a tip!