Remove "Root" from Kernel Version - Galaxy S I9000 General

I used the One Click Root utility to root and since have flashed several firmwares. The kernel version still displays "Root". How do I remove it? I used the same utility to unroot but the "Root" word still shows.

did you manage to remove the "root"? if you did i will appreciate your explanation.

I think you will find your solution in the modification of the file /system/build.prop
Most of the information displayed in phone property menu are taken from this file.

itchyUnder said:
I used the One Click Root utility to root and since have flashed several firmwares. The kernel version still displays "Root". How do I remove it? I used the same utility to unroot but the "Root" word still shows.
Click to expand...
Click to collapse
It's only the word or "root functionalities" keep remained?
I ever tried using One Click Root in Froyo and unroot mechanism seems to work fine, not sure for new firmware..

Related

[Q] Root after OTA

Has anyone gotten their fascinate rooted after the OTA Update? I uses to use z4Root but.this is no longer working. It goes rhough the steps but none of the root apps can get super uswr access. I prefer one touch as I dont feel comfotable typing in all the commads for it to be hooked up to the pc
Dirrk's EZ Root v0.2
I was able to edit the START_ROOT.bat file in Dirrk's EZ Root v0.2 so the it would pause for 120 seconds instead of 60 seconds after the first phone reboot. Then, after the reboot, unplug the USB from the phone and reconnect it. I'm not sure if this will work for everyone, but it worked for me.
Roblovesbox said:
Has anyone gotten their fascinate rooted after the OTA Update? I uses to use z4Root but.this is no longer working. It goes rhough the steps but none of the root apps can get super uswr access. I prefer one touch as I dont feel comfotable typing in all the commads for it to be hooked up to the pc
Click to expand...
Click to collapse
there is a 1 click guide on i believe android central that is very easy. all you do is plug in your phone to a cpu download the .zip and open a file, then leave your phone alone for about 5 minutes and its done. it worked for me when z4 failed.. that was the first time i used anything other than z4 and was a little concerned but it was as easy as z4.. if not easier seeing as that z4 caused my phone to lock up a few times while it was in the process
EDIT: Here is the link.. you will need to register at android central to get the file but its very easy.
http://forum.androidcentral.com/fascinate-roms-hacks/33899-how-root.html
Powell730 said:
there is a 1 click guide on i believe android central that is very easy. all you do is plug in your phone to a cpu download the .zip and open a file, then leave your phone alone for about 5 minutes and its done. it worked for me when z4 failed.. that was the first time i used anything other than z4 and was a little concerned but it was as easy as z4.. if not easier seeing as that z4 caused my phone to lock up a few times while it was in the process
EDIT: Here is the link.. you will need to register at android central to get the file but its very easy.
Click to expand...
Click to collapse
This worked! I did do two things as it would error in the beginning. I changed the pause time in the file on the reboot to 120 seconds instead of the 60 as suggested in one post and I had to unplug my usb cable and plug it back in after the first reboot. Easy none the less, thank you!
Okay...it wont let me edit cause im a newb. The root worked or so I thought but now when I run Titanium backup it says it cant acquire root access. Any Ideas on this anyone?
Roblovesbox said:
Okay...it wont let me edit cause im a newb. The root worked or so I thought but now when I run Titanium backup it says it cant acquire root access. Any Ideas on this anyone?
Click to expand...
Click to collapse
Check and see if you have the Superuser app in your apps list. If not, download it from the Market, and then see if your apps that require root access work or not.
Yes I have the super user APP. The apps are just saying they aren't getting root access. They are in the list as well.
http://forum.xda-developers.com/showthread.php?t=803682
this worked for me, i used it last night
I was working on this last night. Z4root installs su to system/bin, while the 2nd root method installs to system/xbin. The ota changed the file permissions for su, but left the file in tact. That's why the one click mod will say your rooted (it sees the su file), but apps won't have root access.
I had to go old school and chmod the su file in system/bin rebooted and got root access again.
For anyone that used a one click root method like z4 root, and still hasn't done the ota update un root the phone first!
On the road but I will post instructions on how I re-rooted in a few hours as well as the specific files needed.
*actually from what I recall, any files needed are included in the one click root mentioned above.
Sent from my SCH-I500 using XDA App
**Follow instructions in this post http://forum.androidcentral.com/526222-post739.html
except, when you get to the portion that says
cd /system/xbin , replace that with cd /system/bin
(I believe only z4root users that did not unroot need to change this, or anyone who has su copied to their /bin directory without the root.)
everything is exactly the same... It's much better linking the post than copying the info again.
My phone w/ OTA dl09 is rooted successful by using Fascinateforums method.
Sent from my SCH-I500 using XDA App

[STICKY][Patch][Rom]Malware Exploit for all pre-Gingerbread devices

Who is affected? All devices pre-gingerbread
Who should act? Users and developers using pre-gingerbread roms
How do I fix? Flash attached .zip at the bottom of this post
What if I think I was infected? Completely wipe your device, format sdard, go back to stock and re-apply rom, then flash the attached .zip (before installing any apps)
Why should I care? read below...
http://www.androidpolice.com/2011/0...your-phone-steal-your-data-and-open-backdoor/
Flash this with ClockWorkMod.... this is for any Pre Gingerbread ROM.... ie TNT anything, VEGAn 5.1.1 and below, Zpad anything, GAdam anything.
This is not necessary for any ROMS based off Gingerbread AOSP or CM7. Including VEGAn-TAB Experimentals.
Be Safe.
Even More Details here: http://www.androidpolice.com/2011/0...-android-nightmare-and-weve-got-more-details/
I checked out the zip and it just adds a blank text file (0 bytes) called profile to the /system/bin folder. So I am not sure what the fix is?
**EDIT** Nevermind it is a dummy file meant to prevent the virus. Thanks to the OP for providing this.
http://www.androidpolice.com/2011/0...your-phone-steal-your-data-and-open-backdoor/
Nasty stuff. I would say this patch is high priority and I'm already going through my own ROMs to add it in.
http://forum.xda-developers.com/showthread.php?t=977154
Link above has info on creating the file manually.
Jim
fyi -
http://www.pcworld.com/article/221213/keep_malware_off_your_android_phone_5_quick_tips.html
Lookout mobile security . In case you cannot find it via the market.
http://www.getjar.com/Lookout-Mobile-Security-with-Antivirus
Edit. I just installed the lookout app to scan my tab, everything was fine and then, i un-installed it since it was running on the background and taking 10% of the cpu..
Anyways, a nice app that can be used to do a quick scan..
I don't have a stock gtab but I'll ask anyways... how can our stock rom users be protected? Is there an alternate method?
Edit just saw the manual process. Im guess that's the way to go.
xmr405o said:
I don't have a stock gtab but I'll ask anyways... how can our stock rom users be protected? Is there an alternate method?
Edit just saw the manual process. Im guess that's the way to go.
Click to expand...
Click to collapse
I'd curious to see what all the vendors are going to do about this. Granted, they could just say that the Market is not there, but regardless the security hole is still there and needs to be plugged up.
Hi,
I hope that this isn't too offtopic, but I was trying to create /system/bin/profile using a term and su, and when i went into root explorer to make /system/bin R/W, root explorer showed the dir as R/W already, and as mounted on /dev/loop9.
Is that normal?
I haven't installed dataloop, at least intentionally, so it seems strange that /system/bin would be mounted there, plus it being R/W by default?
FYI, I use z4root to get temp root. Could that be why /system/bin is R/W?
Then again, that wouldn't explain the /dev/loop9 mount ...
Jim
jimcpl said:
Hi,
I hope that this isn't too offtopic, but I was trying to create /system/bin/profile using a term and su, and when i went into root explorer to make /system/bin R/W, root explorer showed the dir as R/W already, and as mounted on /dev/loop9.
Is that normal?
I haven't installed dataloop, at least intentionally, so it seems strange that /system/bin would be mounted there, plus it being R/W by default?
FYI, I use z4root to get temp root. Could that be why /system/bin is R/W?
Then again, that wouldn't explain the /dev/loop9 mount ...
Jim
Click to expand...
Click to collapse
Hi,
Creating the profile file manually, it wouldn't persist,i.e., it was gone after rebooting, so I installed gojimi's zip usung CWM, and that worked.
I also did a mount w/o getting temp root, and /system/bin is not on /dev/loop9, so I'm guessing that when z4root sets temp root, it might be remounting /system/bin on /dev/loop9 itself.
Jim
You would have to download one of those sketchy apps to really be affected anyways, right? Who would do that?!
Appreciate the patch. This highlights the two problems with android though, google fixed this security issue in 2.2.2, but most carriers still haven't released that update. And the market needs some oversight, not authoritarian apple like, but some.
Sent from my T-Mobile G2 using XDA App
Is it possible to sticky this thread
Mods is it possible to sticky this thread so that it is easily visible.
Thanks
Hello guys. Is there a way to find out if our tablet is infected or not?
I mean if we have installed any of the apps in the list that automatically means that we are infected or not?
If infected what is preferred to do wipe the tablet or go back to stock rom??
Is there any manual for windows 7 noobies users?
Thanks.
Doctor LeVa said:
Hello guys. Is there a way to find out if our tablet is infected or not?
I mean if we have installed any of the apps in the list that automatically means that we are infected or not?
If infected what is preferred to do wipe the tablet or go back to stock rom??
Is there any manual for windows 7 noobies users?
Thanks.
Click to expand...
Click to collapse
Please read the thread completely, it is stated you can download lookout security to run a scan to see if you are infected.
downloading.....see what happens
There is a DroidDreamKiller app that allows you to check to see if you are already infected and install the patch. There is also a beta test app that gives you other information. Just search the market for DroidDreamKiller.
To devs: Thank You
TO Everyone else DO THIS ASAP
How do I flash the zip file after downloading it?
Thanks
Start cwm using volume up while powering on.
Once menu comes up select install zip using vol buttons
Use home to select.
Navigate to where you saved zip file
Select it with home button
Once install complete reboot from cwmod
MODs Please make this a sticky . It is being overlooked.

So what to do when I'm temp-rooted?

After having the phone for 3 weeks, today i finally temp-rooted.
Only because I needed to edit the root folder so that I can use ad-hoc internet, which stock android phones can't find. Well now it works and it feels pretty cool!
what else can I do now while I am temp rooted?
thunder9111 said:
After having the phone for 3 weeks, today i finally temp-rooted.
Only because I needed to edit the root folder so that I can use ad-hoc internet, which stock android phones can't find. Well now it works and it feels pretty cool!
what else can I do now while I am temp rooted?
Click to expand...
Click to collapse
Get rid of the annoying stock apps that come with the phone
i was trying to do that just now, but when i was in the application manager the uninstall button was still darkened out..
am I supposed to go to the superuser app and give it access first?
will uninstalling those stock apps have any effects? i still plan on continuing to use the stock htc sense rom as i see nth wrong with it.
No point because you're temp rooted, after a reboot.. they come back.
Sent from my T-Mobile G2 using Tapatalk
true. found that out the hard way.
sucks, even the wpa_supplicant that i editted will go back to the original which means i will lose adhoc again.
now everytime i want to use adhoc i will have to temp-root, then use root explorer to edit the wpa_supplicant.
since i used visionary to temproot and it has the permroot option, would doing so allow me to save all my file settings after root explorer?
would the permroot still be revertable using the unroot option?
all this for ad-hoc internet
thunder9111 said:
true. found that out the hard way.
sucks, even the wpa_supplicant that i editted will go back to the original which means i will lose adhoc again.
now everytime i want to use adhoc i will have to temp-root, then use root explorer to edit the wpa_supplicant.
since i used visionary to temproot and it has the permroot option, would doing so allow me to save all my file settings after root explorer?
would the permroot still be revertable using the unroot option?
all this for ad-hoc internet
Click to expand...
Click to collapse
If you're going to 'perm-root' then don't use visionary. Use the Gfree method, it's the most current and safest. I don't have the link to the G2 wiki right now but Google should find it for you. Rooting with Gfree is at the bottom section of the wiki.
I would use this method as it seems to be the quickess and user friendly one
http://forum.xda-developers.com/showthread.php?t=928160
noodles2224 said:
No point because you're temp rooted, after a reboot.. they come back.
Sent from my T-Mobile G2 using Tapatalk
Click to expand...
Click to collapse
I'm curious, even if you're only temp rooted, wouldn't remounting /system rw make any changes permanent?
noodles2224 said:
No point because you're temp rooted, after a reboot.. they come back.
Sent from my T-Mobile G2 using Tapatalk
Click to expand...
Click to collapse
Oh thats there was a way to disable them though so they wouldn't show up or even get ran. If memory serves you would go into terminal emulator, cd to the system/app directory, and then you would pm disable the apks that you didnt want
tan-ce said:
I'm curious, even if you're only temp rooted, wouldn't remounting /system rw make any changes permanent?
Click to expand...
Click to collapse
No. It's been a while since I've even thought about NAND locks and stuff but basically the system is protected from permanent changes unless the proper key is used. When you reboot your phone the system is compared to an image of it stored on the NAND and any changes are overwritten - sort of like a system restore on windows except it's automatic at every boot. That's how I understand it working from my memory.
KCRic said:
When you reboot your phone the system is compared to an image of it stored on the NAND and any changes are overwritten - sort of like a system restore on windows except it's automatic at every boot.
Click to expand...
Click to collapse
So do I correctly assume that s-off removes the locks?
Edit: Never mind the question, some searching paid off. Answer is yes.

[Q] Rooting official 2.3.5 wirelessly

Hello!
How can one root official 2.3.5 rom without connecting to usb and adb?
The goal is to install custom ICS on U8800 that has no usb port - completely broken and even not charging phone. No warranty and repair cost is close to actual phone cost. So repairing is not an option.
Wireless adb app requires root first - so it is not an option for me also.
Any help is appreciated - I need ISC because I need ipsec vpn which is npt available in gingerbread.
I am ready to test any operation you suggest - I don't fear to brick the phone, need no backups.
It's impossible. I have one USB broken u8800 and that's why I use cm7 (.32) on it.
Sent from my U8800 using Tapatalk 2
Qqqxxxzzz said:
It's impossible. I have one USB broken u8800 and that's why I use cm7 (.32) on it.
Sent from my U8800 using Tapatalk 2
Click to expand...
Click to collapse
There is nothing impossible I believe
Maybe we could find the trick - gingerbreak works on some roms - another fine exploit maybe.
I don't know - worth a try I think.
tranced1 I might have 1 possible solution for you. I've rooted my 2.3.5 some time ago and I've done a backup of boot.img.
I remember with froyo we could root it with boot.img "rooted". I bet this won't work on 2.3.5, but who knows right?
If you want to give it a try, I upload that boot.img for you.
EDIT: darn! Totally forgot you can't access bootloader directory without root & damaged usb port
Can't remember another way out... sorry
tranced1 said:
There is nothing impossible I believe
Maybe we could find the trick - gingerbreak works on some roms - another fine exploit maybe.
I don't know - worth a try I think.
Click to expand...
Click to collapse
Gingerbreak and z4root doesn't work. Only solution is build your own exploit.
Sent from my U8800 using Tapatalk 2
Is there any way to flash zip from stock recovery? I saw this root method for some samsung phones.
Does anybody know how to compile such .zip file?
tranced1 said:
Is there any way to flash zip from stock recovery? I saw this root method for some samsung phones.
Does anybody know how to compile such .zip file?
Click to expand...
Click to collapse
compiling zip is easy. Your problem is that we don't know how to sign it correctly.
Sent from my GT-P1000 using Tapatalk 2
I believe that you can use terminal emulator and zergrush exploit to root the phone.
The automatic root methods basicaly push the needed files on /data/local change permissions etc... All can be done with linux commands which are available from a terminal emulator. So I don't think that you need the usb cable to root the device. You can try investigate the runme.bat file from doomlord's root method and give the commands manually after you have put the files from files directory on sdcard.
dancer_69 said:
I believe that you can use terminal emulator and zergrush exploit to root the phone.
The automatic root methods basicaly push the needed files on /data/local change permissions etc... All can be done with linux commands which are available from a terminal emulator. So I don't think that you need the usb cable to root the device. You can try investigate the runme.bat file from doomlord's root method and give the commands manually after you have put the files from files directory on sdcard.
Click to expand...
Click to collapse
adb can access the phone as root user - from terminal file system is read-only, so even first step permission denied
Yes, you have right about that.
But, check this thread:
http://forum.xda-developers.com/showthread.php?t=1716068
the last post.
EDIT:
After reading the discription on first post of gingerbreak, I had another Idea.
Seems that gingerbreak uses sd card to temporary store the necessary for root files. So, maybe you can replace these files(and especially the exploit) whith those of doomlord's root app, before you press the root button, so to use the working zergrush exploit.
This is the B528 root bat script:
http://pastebin.ca/raw/2163499
@adb wait-for-device
@echo --- DEVICE FOUND
@echo --- reboot to bootloader
@adb reboot-bootloader
@echo --- flash the rooted bootimage
@fastboot boot boot.img
@echo --- reboot to nomal mode
@fastboot reboot
@echo --- wait for adb connect
@adb wait-for-device
@echo --- DEVICE FOUND
@adb remount -t yaffs2 /dev/block/mtdblock3 /system
Click to expand...
Click to collapse
You're problem is in red... you have to flash the exploited boot image. The rest is just installing busybox, su and SuperUser.apk.
You have the stock recovery which allows you to flash .zip files, but they have to be signed correctly and I don't think that's possible.
VuDuCuRSe said:
This is the B528 root bat script:
http://pastebin.ca/raw/2163499
You're problem is in red... you have to flash the exploited boot image. The rest is just installing busybox, su and SuperUser.apk.
You have the stock recovery which allows you to flash .zip files, but they have to be signed correctly and I don't think that's possible.
Click to expand...
Click to collapse
To boot a different boot image, you have to use USB, atleast on fastboot.
dancer_69 said:
Yes, you have right about that.
But, check this thread:
http://forum.xda-developers.com/showthread.php?t=1716068
the last post.
EDIT:
After reading the discription on first post of gingerbreak, I had another Idea.
Seems that gingerbreak uses sd card to temporary store the necessary for root files. So, maybe you can replace these files(and especially the exploit) whith those of doomlord's root app, before you press the root button, so to use the working zergrush exploit.
Click to expand...
Click to collapse
Thanks for clues but seems there is no way - I cant execute exploit via ssh - permission denied I cant even chmod it.
Gingerbreak completely not working - no files created on sdcard.
Ι didn't find any other way on net. There are several discussions for this problem but not a solution. I think that the only way is to do it for an app. You can contact with the creator of gingerbreak or z4root to ask for it. Also I'll try to make an app myself, but my android developing knowledge is very basic, so don't count too much on this. If I have some kind of success I'll contact you via PM.
EDIT:
Try this mod, and if you are lucky...
dancer_69 said:
Ι didn't find any other way on net. There are several discussions for this problem but not a solution. I think that the only way is to do it for an app. You can contact with the creator of gingerbreak or z4root to ask for it. Also I'll try to make an app myself, but my android developing knowledge is very basic, so don't count too much on this. If I have some kind of success I'll contact you via PM.
EDIT:
Try this mod, and if you are lucky...
Click to expand...
Click to collapse
No I am obviously not the lucky one
My android development knowledge is zero, so if you can run zergRush from executable area it will be a very good start.
And I want to thank everybody for your support.
So, it doesn't work?
I just updated the file, so give it another try.
Also, check if you have logcat and usb debuging enabled(is needed for other methods, so maybe needed here too)
dancer_69 said:
So, it doesn't work?
I just updated the file, so give it another try.
Also, check if you have logcat and usb debuging enabled(is needed for other methods, so maybe needed here too)
Click to expand...
Click to collapse
Logcat: Cannot copy boomsh. : Permission Denied
I will revert to first beta now - and will test if it will work
I suppose this logat message is for z4root fail. Unfortunately I don't know what boomsh is. I just decompiled the apk and replaced the exploit, busybox, superuser, and su files with these from doomlord's root files directory.
So, easy solution didn't work. If I have something else I'll let you know.
EDIT:
I get some info about "cannot copy boomsh"
The exploit creates this file when run. This message appears when this file already exists and needed to be deleted from /data/local/tmp.
I checked z4root-mod on my device(which is already rooted and with ICS custom rom), and I get this message too.
The problem is that this file doesn't exist on my device, so I cannot delete it.
---------- Post added at 04:16 PM ---------- Previous post was at 03:17 PM ----------
I read on a forum that these apps(as z4root) run better after a fresh boot. So, install the latest apk(has newer files), reboot the device and run z4root again.
z4root is a froyo root exploit (I think) and seems "dead" for a long time.
Check Chainfire's Gingerbreak: http://forum.xda-developers.com/showthread.php?t=1044765

How to get rid of the default emoji?

I'd like to have the hangout's emoji.
Not the Samsung.
BTW I'm not rooted
If you're not rooted then there's no way to do so. If you are rooted however, it's pretty easy. Reply to me if you want to know how.
guetzli32 said:
If you're not rooted then there's no way to do so. If you are rooted however, it's pretty easy. Reply to me if you want to know how.
Click to expand...
Click to collapse
I want for sure, maybe I'll root because of it
TY
paolobacci said:
I want for sure, maybe I'll root because of it
TY
Click to expand...
Click to collapse
THis only works if you are rooted, as I stated before.
I'm pretty sure you have to this:
With root access,
1. go to /system/fonts
2. rename NotoColorEmoji.ttf to anythign you'd like(lika a backup of it)
3. rename AndroidEmoji.ttf to NotoColorEmoji.tff
4. reboot
That SHOULD do the trick. I'm more used to changing the emoji to apple's Emoji to match them with Whatsapp.
guetzli32 said:
THis only works if you are rooted, as I stated before.
I'm pretty sure you have to this:
With root access,
1. go to /system/fonts
2. rename NotoColorEmoji.ttf to anythign you'd like(lika a backup of it)
3. rename AndroidEmoji.ttf to NotoColorEmoji.tff
4. reboot
That SHOULD do the trick. I'm more used to changing the emoji to apple's Emoji to match them with Whatsapp.
Click to expand...
Click to collapse
How do I go about getting the apple Emojis?
blackguy101 said:
How do I go about getting the apple Emojis?
Click to expand...
Click to collapse
Grab AppleColorEmoji.ttf and place it into /system/fonts/
Set /system/fonts/AppleColorEmoji.ttf to have permissions 644 (rw-r--r--) and owner:root group:root.
then do the process mentioned above, but use AppleColorEmoji instead of AndroidEmoji.
Also, right now there's no reason not to root, since towelroot doesn't trip the Knox Counter. That way, you keep your warranty and also have the benefits of a rooted phone. (Don't quote me on that, that's at least what I read )
guetzli32 said:
Grab AppleColorEmoji.ttf and place it into /system/fonts/
Set /system/fonts/AppleColorEmoji.ttf to have permissions 644 (rw-r--r--) and owner:root group:root.
then do the process mentioned above, but use AppleColorEmoji instead of AndroidEmoji.
Also, right now there's no reason not to root, since towelroot doesn't trip the Knox Counter. That way, you keep your warranty and also have the benefits of a rooted phone. (Don't quote me on that, that's at least what I read )
Click to expand...
Click to collapse
Is it possible if you can link the apple color emoji file again because the link is dead :/
Renaming the Android didn't do the trick.
I got only a few emoticons to choose.
I just did the root with towel root but I tried before with cf auto root and I'm waiting for a solution to reset knoxx counter back to 0.
This didn't seem to work at all. Anyone else have an idea? Samsungs emoji's are terrible.

Categories

Resources