[GUIDE] Firestick FULLY FREEZE System APPS [No Root & No PC required] - Fire TV General

CREDIT: https://youtu.be/0ytnNDfzVgU
Nice guide for those that want to free up memory on the Firestick by disabling system apps .... without rooting!
Tools needed
Icebox
Shizuku manager
Remote ADB Shell
Install all the 3 apps above.
Open the Shizuku manager and click on where it says "ADB Command". This will then show you the following command
adb shell sh /sdcard/Android/data/moe.shizuku.privileged.api/files/start.sh
Click on copy (using virtual mouse) and then open up remote ADB shell.
Make a connection to 127.0.0.1 on port 5555
Paste the command but remove the "adb shell" from the start. The final command should look like:
sh /sdcard/Android/data/moe.shizuku.privileged.api/files/start.sh
Run the command and it will launch Shizuku manager. You can then select authorization to give Icebox permission.
Start Icebox and select the option for Shizuku manager. You can now freeze applications, including system apps!
Ensure you enable the option to show hidden system apps.
The guy disabled all the apps shown here
https://imgur.com/a/YYQdaR0

Deleted..

Michajin said:
This is
Forced OTA for example -
adb shell pm hide com.amazon.device.software.ota
1|[email protected]:/ $ pm hide com.amazon.device.software.ota
Package com.amazon.device.software.ota new hidden state: false
[email protected]:/ $
Click to expand...
Click to collapse
Ah, so if you freeze "com.amazon.device.software.ota" then that will disable OTA updates?

Intenti0n said:
Ah, so if you freeze "com.amazon.device.software.ota" then that will disable OTA updates?
Click to expand...
Click to collapse
Yes it will disable the OTA.
But looking more into the pm hide command, it keeps saying false so i dont believe it is working. i deleted my post as to not give bad info. I'm rooted so i just disable with a package disabler. from a shell - pm list will show all the packages while -d will show what is disabled... for example
[email protected]:/ $ pm list packages -d
package:com.amazon.tv.forcedotaupdater.v2
package:com.amazon.device.software.ota
package:com.amazon.tv.nimh
package:com.amazon.device.software.ota.override

Very nice.
Can someone put their list of which apps did he freeze, without causing any stability problems?
Sent from my ONEPLUS A6003 using Tapatalk

Example of my debloat Script for Tank.
Example of my debloat Script for Tank.
Root TWRP is needed for the second Part of Script.
!! No usable AppStore !!
Apps must be side loaded
Only a example!!!!!!
Settings.apk
https://forum.xda-developers.com/fire-tv/general/firetv-settings-3-0-mod-root-tank-t4076699
@echo off
title Full Setup Script For Tank
set debug=0
set fireOsVersion=0.0.0.0
set fireOsDevice=none
set downgrade=0
set magiskZip=Magisk-v20.4.zip
set adb="adb.exe"
set adbKill=adb.exe kill-server
set adbStart=adb.exe start-server
set adbWait=adb.exe wait-for-device
set sleep="wait.exe"
set install=adb.exe install
set uninstall=adb.exe uninstall
set push=adb.exe push
set pull=adb.exe pull
set shell=adb.exe shell
set twrp=adb.exe shell twrp
if not exist "%temp%\firestick-loader" md "%temp%\firestick-loader"
echo Einstellungen setzen.
adb shell settings put secure install_non_market_apps 1
adb shell settings put global adb_enabled 1
adb shell settings put global setup_wizard_has_run 1
adb shell settings put secure user_setup_complete 1
adb shell settings put global device_provisioned 1
echo adb shell su -c "pm disable com.amazon.tv.oobe"
adb shell su -c "pm disable com.amazon.device.sale.service"
adb shell su -c "pm disable com.amazon.recess"
adb shell su -c "pm disable com.amazon.whisperplay.contracts"
adb shell su -c "pm disable com.amazon.bueller.photos"
adb shell su -c "pm disable com.amazon.device.sync"
adb shell su -c "pm disable com.amazon.webview"
adb shell su -c "pm disable com.amazon.tv.csapp"
adb shell su -c "pm disable com.amazon.kindle.cms"
adb shell su -c "pm disable com.amazon.tcomm.client"
adb shell su -c "pm disable com.amazon.client.metrics"
adb shell su -c "pm disable amazon.jackson19"
adb shell su -c "pm disable com.amazon.device.software.ota"
adb shell su -c "pm disable com.amazon.ags.app"
adb shell su -c "pm disable com.amazon.application.compatibility.enforcer"
adb shell su -c "pm disable com.amazon.whisperplay.service.install"
adb shell su -c "pm disable com.amazon.device.software.ota.override"
adb shell su -c "pm disable com.amazon.communication.discovery"
adb shell su -c "pm disable com.amazon.device.sync.sdk.internal"
adb shell su -c "pm disable com.amazon.bueller.music"
adb shell su -c "pm disable com.amazon.application.compatibility.enforcer.sdk.library"
adb shell su -c "pm disable com.amazon.vizzini"
adb shell su -c "pm disable com.amazon.tv.forcedotaupdater.v2"
adb shell su -c "pm disable com.amazon.device.software.ota"
adb shell su -c "pm disable com.amazon.device.software.ota.override"
echo adb shell su -c "pm disable com.amazon.tv.launcher"
:start
color 0e
:: Set Flags For ADB Service and Unknown Sources
set adb_success=0
set unk_sources_success=0
echo.
echo.
echo Trying To Force Boot Into Recovery...
echo.
%sleep% 3
adb.exe reboot recovery
%sleep% 35
:intro
:: Reset TWRP Flags
color 0e
set rwcheck=0
echo.
echo.
echo Mounting System To Check Device Settings...
echo.
%shell% "mount -o rw /system"
echo.
echo.
echo Press 1 if there is an error, otherwise just press ENTER
echo.
set /p rwcheck=
if %rwcheck%==1 echo.
if %rwcheck%==1 echo Waiting on Reboot...
if %rwcheck%==1 echo.
if %rwcheck%==1 adb.exe reboot recovery
if %rwcheck%==1 %sleep% 25
if %rwcheck%==1 goto intro
set downgrade=0
echo.
echo Debloating Amazon Apps...
echo.
%sleep% 3
:: FireOS 5.05 and Higher
%shell% "rm -r /system/priv-app/AmazonKKWebViewLib/"
%shell% "rm -r /system/priv-app/BackupRestoreConfirmation/"
%shell% "rm -r /system/priv-app/com.amazon.ags.app/"
%shell% "rm -r /system/priv-app/com.amazon.avod/"
%shell% "rm -r /system/priv-app/com.amazon.bueller.music/"
%shell% "rm -r /system/priv-app/com.amazon.device.sync/"
%shell% "rm -r /system/priv-app/com.amazon.device.sync.sdk.internal/"
%shell% "rm -r /system/priv-app/com.amazon.kindle.cms-service/"
%shell% "rm -r /system/priv-app/com.amazon.kindle.devicecontrols/"
%shell% "rm -r /system/priv-app/com.amazon.kso.blackbird/"
%shell% "rm -r /system/priv-app/com.amazon.ods.kindleconnect/"
%shell% "rm -r /system/priv-app/com.amazon.securitysyncclient/"
%shell% "rm -r /system/priv-app/com.amazon.sharingservice.android.client.proxy.release/"
%shell% "rm -r /system/priv-app/com.amazon.shoptv.client/"
%shell% "rm -r /system/priv-app/com.amazon.tv.aiv.support/"
%shell% "rm -r /system/priv-app/com.amazon.tv.legal.notices/"
%shell% "rm -r /system/priv-app/com.amazon.tv.parentalcontrols/"
%shell% "rm -r /system/priv-app/ContentSupportProvider/"
%shell% "rm -r /system/priv-app/CrashManager/"
%shell% "rm -r /system/priv-app/ConnectivityDiag/"
%shell% "rm -r /system/priv-app/DeviceClientPlatformContractsFramework/"
%shell% "rm -r /system/priv-app/DeviceMessagingAndroid/"
%shell% "rm -r /system/priv-app/DeviceMessagingAndroidInternalSDK/"
%shell% "rm -r /system/priv-app/DeviceMessagingAndroidSDK/"
%shell% "rm -r /system/priv-app/DownloadProvider/"
%shell% "rm -r /system/priv-app/FireRecessProxy/"
%shell% "rm -r /system/priv-app/FireTVDefaultMediaReceiver/"
%shell% "rm -r /system/priv-app/FireTvNotificationService/"
%shell% "rm -r /system/priv-app/FusedLocation/"
%shell% "rm -r /system/priv-app/ManagedProvisioning/"
%shell% "rm -r /system/priv-app/marketplace_service_receiver/"
%shell% "rm -r /system/priv-app/sync-provider_ipc-release/"
%shell% "rm -r /system/priv-app/sync-service-fireos-release/"
%shell% "rm -r /system/priv-app/UnifiedShareActivityChooser/"
%shell% "rm -r /system/priv-app/WallpaperCropper/"
%shell% "rm -r /system/priv-app/com.amazon.tv.launcher/"
%shell% "rm -r /system/priv-app/DeviceSoftwareOTA/"
%shell% "rm -r /system/priv-app/DeviceSoftwareOTAIdleOverride/"
%shell% "rm -r /system/priv-app/com.amazon.tv.csapp/"
%shell% "rm -r /system/priv-app/com.amazon.tmm.tutorial/"
%shell% "rm -r /system/priv-app/com.amazon.h2clientservice/"
%shell% "rm -r /system/priv-app/com.amazon.vizzini/"
%shell% "rm -r /system/priv-app/logan/"
%shell% "rm -r /system/priv-app/AdvertisingIdSettings/"
%shell% "rm -r /system/priv-app/com.amazon.tv.nimh/"
%shell% "rm -r /system/priv-app/FireTvSaleService/"
%shell% "rm -r /system/priv-app/IvonaTTS/"
%shell% "rm -r /system/priv-app/IvonaTtsOrchestrator/"
%shell% "rm -r /system/priv-app/TvProvider/"
%shell% "rm -r /system/priv-app/com.amazon.alexashopping/"
%shell% "rm -r /system/priv-app/com.amazon.tv.livetv/"
%shell% "rm -r /system/priv-app/com.amazon.amazonvideo.livingroom/"
%shell% "rm -r /system/priv-app/com.amazon.kor.demo/"
%shell% "rm -r /system/priv-app/TIFObserverService/"
%shell% "rm -r /system/priv-app/CredentialLockerAndroid-tablet-release/
%shell% "rm -r /system/priv-app/AwvDeploymentService/"
%shell% "rm -r /system/priv-app/AwvMetricsService/"
%shell% "rm -r /system/priv-app/LogManager-logd/"
%shell% "rm -r /system/priv-app/SsdpService/"
%shell% "rm -r /system/priv-app/com.amazon.bueller.photos/"
%shell% "rm -r /system/priv-app/DialService/"
%shell% "rm -r /system/priv-app/com.amazon.cardinal/"
%shell% "rm -r /system/app/DocumentsUI/"
%shell% "rm -r /system/app/fdrw/"
%shell% "rm -r /system/app/PicoTts/"
%shell% "rm -r /system/app/UnifiedSettingsProvider/"
%shell% "rm -r /system/app/WhiteListedUrlProvider/"
%shell% "rm -r /system/app/PinyinIME/"
%shell% "rm -r /system/app/FrameworksMetrics/"
%shell% "rm -r /system/priv-app/AmazonNetworkMonitor/"
%shell% "rm -r /system/priv-app/com.amazon.aca/"
%shell% "rm -r /system/priv-app/com.amazon.aria/"
%shell% "rm -r /system/priv-app/com.amazon.firehomestarter/"
%shell% "rm -r /system/priv-app/com.amazon.franktvinput/"
%shell% "rm -r /system/priv-app/com.amazon.gloria.graphiq/"
%shell% "rm -r /system/priv-app/com.amazon.hedwig/"
%shell% "rm -r /system/priv-app/com.amazon.naatyam/"
%shell% "rm -r /system/priv-app/com.amazon.tv.legal.notices/"
%shell% "rm -r /system/priv-app/com.amazon.tmm.tutorial/"
%shell% "rm -r /system/priv-app/com.amazon.tv.forcedotaupdater/"
%shell% "rm -r /system/priv-app/com.amazon.ale/"
%shell% "rm -r /system/priv-app/com.amazon.appaccesskeyprovider/"
%shell% "rm -r /system/priv-app/com.amazon.avl.firetv/"
%shell% "rm -r /system/priv-app/com.amazon.ceviche/"
%shell% "rm -r /system/priv-app/com.amazon.dpcclient/"
%shell% "rm -r /system/priv-app/com.amazon.firebat/"
%shell% "rm -r /system/priv-app/com.amazon.firerestapiframework/"
%shell% "rm -r /system/priv-app/com.amazon.ftv.glorialist/"
%shell% "rm -r /system/priv-app/com.amazon.ftv.xpicker/"
%shell% "rm -r /system/priv-app/com.amazon.katoch/"
%shell% "rm -r /system/priv-app/com.amazon.tv.alexaalerts/"
%shell% "rm -r /system/priv-app/com.amazon.tv.forcedotaupdater.v2/"
%shell% "rm -r /system/priv-app/com.amazon.tv.releasenotes/"
%shell% "rm -r /system/priv-app/com.amazon.tv.routing/"
%shell% "rm -r /system/priv-app/com.amazon.tahoe/"
%shell% "rm -r /system/priv-app/com.amazon.whisperjoin.middleware.np/"
%shell% "rm -r /system/priv-app/com.amznfuse.operatorredirection/"
%shell% "rm -r /system/priv-app/sync-provider_ipc-tv-release/"
%sleep% 5
echo.
echo Removing any added System Components from Amazon App Updates...
echo.
%shell% "rm -r /data/app/com.amazon.aca-1/"
%shell% "rm -r /data/app/com.amazon.ags.app-1/"
%shell% "rm -r /data/app/com.amazon.alexashopping-1/"
%shell% "rm -r /data/app/com.amazon.amazonvideo.livingroom.firetv-1/"
%shell% "rm -r /data/app/com.amazon.appaccesskeyprovider-1/"
%shell% "rm -r /data/app/com.amazon.aria-1/"
%shell% "rm -r /data/app/com.amazon.avl.ftv-1/"
%shell% "rm -r /data/app/com.amazon.avod-1/"
%shell% "rm -r /data/app/com.amazon.bueller.music-1/"
%shell% "rm -r /data/app/com.amazon.cardinal-1/"
%shell% "rm -r /data/app/com.amazon.firebat-1/"
%shell% "rm -r /data/app/com.amazon.ftv.glorialist-1/"
%shell% "rm -r /data/app/com.amazon.hedwig-1/"
%shell% "rm -r /data/app/com.amazon.katoch-1/"
%shell% "rm -r /data/app/com.amazon.kso.blackbird-1/"
%shell% "rm -r /data/app/com.amazon.shoptv.client-1/"
%shell% "rm -r /data/app/com.amazon.tahoe-1/"
%shell% "rm -r /data/app/com.amazon.tv.launcher-1/"
%shell% "rm -r /data/app/com.amazon.tv.livetv-1/"
%shell% "rm -r /data/app/com.amazon.tv.ottssocompanionapp-1/"
%shell% "rm -r /data/app/com.amazon.tv.releasenotes-1/"
%shell% "rm -r /data/app/com.amazon.aca-2/"
%shell% "rm -r /data/app/com.amazon.ags.app-2/"
%shell% "rm -r /data/app/com.amazon.alexashopping-2/"
%shell% "rm -r /data/app/com.amazon.amazonvideo.livingroom.firetv-2/"
%shell% "rm -r /data/app/com.amazon.appaccesskeyprovider-2/"
%shell% "rm -r /data/app/com.amazon.aria-2/"
%shell% "rm -r /data/app/com.amazon.avl.ftv-2/"
%shell% "rm -r /data/app/com.amazon.avod-2/"
%shell% "rm -r /data/app/com.amazon.bueller.music-2/"
%shell% "rm -r /data/app/com.amazon.cardinal-2/"
%shell% "rm -r /data/app/com.amazon.firebat-2/"
%shell% "rm -r /data/app/com.amazon.ftv.glorialist-2/"
%shell% "rm -r /data/app/com.amazon.hedwig-2/"
%shell% "rm -r /data/app/com.amazon.katoch-2/"
%shell% "rm -r /data/app/com.amazon.kso.blackbird-2/"
%shell% "rm -r /data/app/com.amazon.shoptv.client-2/"
%shell% "rm -r /data/app/com.amazon.tahoe-2/"
%shell% "rm -r /data/app/com.amazon.tv.launcher-2/"
%shell% "rm -r /data/app/com.amazon.tv.livetv-2/"
%shell% "rm -r /data/app/com.amazon.tv.ottssocompanionapp-2/"
%shell% "rm -r /data/app/com.amazon.tv.releasenotes-2/"
%sleep% 5
echo.
echo Pushing Restore Data to /sdcard/...
echo.
%shell% "rm -r /sdcard/oandbackups/"
%shell% "mkdir /sdcard/oandbackups/"
%push% "oandbackups" /sdcard/oandbackups/
:skipmnt
echo.
%sleep% 2
echo.
echo Disable Wifi Direct
%push% "android.hardware.wifi.direct.xml" /sdcard/android.hardware.wifi.direct.xml
%shell% "cp /sdcard/android.hardware.wifi.direct.xml /system/etc/permissions/android.hardware.wifi.direct.xml"
%shell% "chown root:root /system/etc/permissions/android.hardware.wifi.direct.xml"
%sleep% 2
echo Copying Apps to /system/app/...
%push% "dk.jens.backup_305.apk" /sdcard/Backtool.apk
%push% "Launcher.apk" /sdcard/ATVLauncher.apk
echo %push% "NewSettingsGerRoot.apk" /sdcard/NewSettingsGerRoot.apk
echo.
%shell% "rm -r /system/app/ATVLauncher/"
%shell% "mkdir /system/app/ATVLauncher/"
%shell% "chmod 0775 /system/app/ATVLauncher/"
%shell% "chown root:root /system/app/ATVLauncher/"
%shell% "cp /sdcard/ATVLauncher.apk /system/app/ATVLauncher/ATVLauncher.apk"
%shell% "chmod 0644 /system/app/ATVLauncher/ATVLauncher.apk"
%shell% "chown root:root /system/app/ATVLauncher/ATVLauncher.apk"
%shell% "rm -r /system/app/Backtool/"
%shell% "mkdir /system/app/Backtool/"
%shell% "chmod 0775 /system/app/Backtool/"
%shell% "chown root:root /system/app/Backtool/"
%shell% "cp /sdcard/Backtool.apk /system/app/Backtool/Backtool.apk"
%shell% "chmod 0644 /system/app/Backtool/Backtool.apk"
%shell% "chown root:root /system/app/Backtool/Backtool.apk"
echo %shell% "rm -r /system/app/NewSettingsGerRoot/"
echo %shell% "mkdir /system/app/NewSettingsGerRoot/"
echo %shell% "chmod 0775 /system/app/NewSettingsGerRoot/"
echo %shell% "chown root:root /system/app/NewSettingsGerRoot/"
echo %shell% "cp /sdcard/NewSettingsGerRoot.apk /system/app/NewSettingsGerRoot/NewSettingsGerRoot.apk"
echo %shell% "chmod 0644 /system/app/NewSettingsGerRoot/NewSettingsGerRoot.apk"
echo %shell% "chown root:root /system/app/NewSettingsGerRoot/NewSettingsGerRoot.apk"
%sleep% 2
echo.
echo Installing BusyBox...
%push% Busybox.zip /sdcard/Busybox.zip
%twrp% install /sdcard/Busybox.zip
echo.
echo.
echo Wiping Cache and Dalvik Cache...
echo.
%twrp% wipe cache
%sleep% 5
%twrp% wipe dalvik
%sleep% 5
echo.
echo Re-Installing Magisk for SU Access...
echo.
%push% Magisk-v20.4.zip /sdcard/Magisk-v20.4.zip
%twrp% install /sdcard/Magisk-v20.4.zip
%sleep% 2
echo.
echo Fixing Permissions...
echo.
:: Source: https://forum.xda-developers.com/showthread.php?t=2222297
%shell% "chown -R media_rw:media_rw /data/media/"
%shell% "find /data/media/ -type d -exec chmod 775 {} ';'"
%shell% "find /data/media/ -type f -exec chmod 664 {} ';'"
%shell% "restorecon -FR /data/media/"
::%twrp% fixperms /
::%twrp% fixperms /system/
::%twrp% fixperms /data/
::%twrp% fixperms /sdcard/
%sleep% 5
echo.
echo Neustart...
echo.
%sleep% 8
echo.
echo Warten auf Cache Rebuild und ADB Service...
echo.
echo Dauert 5 Minuten oder mehr
echo.
echo Bitte warten...
echo.
adb.exe reboot
%adbWait%
%sleep% 100
goto finished
:finished
echo.
color 0a
echo Fast Fertig!
echo.
echo Einstellungen mit oandbackups wiederherstellen
echo.
echo.
echo weiter mit Taste...
pause>nul
adb shell am start -n dk.jens.backup/dk.jens.backup.OAndBackup
echo jetzt wiederherstellen
echo Danch Reboot mit Taste...
pause>nul
%sleep% 25
adb.exe reboot
%sleep% 10
echo.
echo Fertig!
echo.
pause
:end
Click to expand...
Click to collapse

Example of my debloat Script for Mantis.
Example of my debloat Script for Mantis.
@echo off
color 0a
adb shell settings put secure install_non_market_apps 1
adb shell settings put global adb_enabled 1
adb shell settings put global setup_wizard_has_run 1
adb shell settings put secure user_setup_complete 1
adb shell settings put global device_provisioned 1
echo remove Bloatware
adb push disableBloat.sh /sdcard/
adb shell su -c "cp /sdcard/disableBloat.sh /data/local/tmp/"
adb shell su -c "chmod 755 /data/local/tmp/disableBloat.sh"
adb shell su -c "sh /data/local/tmp/disableBloat.sh"
echo.
adb install -r AmazonYouTube.apk
adb install -r Filemanager.apk
adb install -r dk.jens.backup_305.apk
adb install -r MarkusLauncher.apk
adb install -r FTVLaunchX-1.0.1.apk
adb install -r Mizuu.apk
echo adb install -r NewSettingsGerRoot.apk
adb install -r VLC.apk
adb shell su -c "pm grant de.codefaktor.ftvlaunchx android.permission.WRITE_SECURE_SETTINGS"
adb shell pm grant de.codefaktor.ftvlaunchx android.permission.WRITE_SECURE_SETTINGS
echo reboot recovery
adb shell reboot recovery
wait 30
adb shell mount -o rw /system
adb shell rm -r /system/app/ATVLauncher/
echo.
echo Pushing Restore Data to /sdcard/...
echo.
adb shell "rm -r /sdcard/oandbackups/"
adb shell "mkdir /sdcard/oandbackups/"
adb.exe push "oandbackups" /sdcard/oandbackups/
echo.
wait 2
echo.
echo Disable Wifi Direct
adb.exe push "android.hardware.wifi.direct.xml" /sdcard/android.hardware.wifi.direct.xml
adb shell "cp /sdcard/android.hardware.wifi.direct.xml /system/etc/permissions/android.hardware.wifi.direct.xml"
adb shell "chown root:root /system/etc/permissions/android.hardware.wifi.direct.xml"
adb shell "rm -r /system/app/Backtool/"
adb shell "rm -r /system/app/ATVLauncher/"
adb shell "rm -r /system/app/Filemanager/"
adb shell "rm -r /system/app/ScriptRunner/"
adb shell "rm -r /system/priv-app/Backtool/"
adb shell "rm -r /system/priv-app/ATVLauncher/"
adb shell "rm -r /system/priv-app/Filemanager/"
adb shell "rm -r /system/priv-app/ScriptRunner/"
echo.
echo Re-Installing BusyBox...
adb push Busybox.zip /sdcard/Busybox.zip
adb shell twrp install /sdcard/Busybox.zip
echo.
echo.
echo Wiping Cache and Dalvik Cache...
echo.
adb shell twrp wipe cache
wait 5
adb shell twrp wipe dalvik
wait 5
echo.
echo Re-Installing Magisk for SU Access...
echo.
adb.exe push Magisk-v20.4.zip /sdcard/Magisk-v20.4.zip
adb shell twrp install /sdcard/Magisk-v20.4.zip
wait 2
echo.
echo Fixing Permissions...
echo.
adb shell "chown -R media_rw:media_rw /data/media/"
adb shell "find /data/media/ -type d -exec chmod 775 {} ';'"
adb shell "find /data/media/ -type f -exec chmod 664 {} ';'"
adb shell "restorecon -FR /data/media/"
wait 5
echo.
echo Neustart...
echo.
wait 8
echo.
echo Warten auf Cache Rebuild und ADB Service...
echo.
echo Dauert 5 Minuten oder mehr
echo.
echo Bitte warten...
echo.
adb.exe reboot
echo.
color 0a
echo Fast Fertig!
echo.
echo Einstellungen mit oandbackups wiederherstellen
echo.
echo.
Click to expand...
Click to collapse

So the instructions at first post work only for Fire Stick 4k.
They are not good for the 2nd gen stick, as I have already tried them with my device.
Does anyone else has some idea how to make it work with Root at 2nd Gen?
I have adb access through my windows computer.

1st Post from me is for 2nd gen stick with root.

As soon as I insert "sh /sdcard/Android/data/moe.shizuku.privileged.api/files/start.sh" I'm getting the following error message:
Code:
info: start.sh begin
/sdcard/Android/data/moe.shizuku.privileged.api/files/start.sh[39]: chgrp: not found
chcon: Could not label /data/local/tmp/shizuku_starter with u:object_r:shell_data_file:s0: Permission denied
WARNING: linker: shizuku_starter: unused DT entry: type 0x6ffffef5 arg 0xa20
WARNING: linker: shizuku_starter: unused DT entry: type 0x6ffffffe arg 0xd28
WARNING: linker: shizuku_starter: unused DT entry: type 0x6fffffff arg 0x2
info: source dex path is /storage/emulated/0/Android/data/moe.shizuku.privileged.api/files/server-v5.dex
fatal: can't access /storage/emulated/0/Android/data/moe.shizuku.privileged.api/files/server-v5.dex, please open Shizuku app and try again.
info: shizuku_starter exit with non-zero value 1
Any idea?
Firestick 1st Gen ..

Icebox does not work on Tank.
Only works on 4k stick.

Does anyone know exactly which packages and settings are required for Amazon Prime to work? All the debloating I tried in bulk broke Amazon Prime. I noticed some posted tweaks apply to TWRP and require rooting, but which tweaks do not?

DirtyAngelicaSecured said:
Does anyone know exactly which packages and settings are required for Amazon Prime to work? All the debloating I tried in bulk broke Amazon Prime. I noticed some posted tweaks apply to TWRP and require rooting, but which tweaks do not?
Click to expand...
Click to collapse
Allowing these three in firestick/tv to run allows Amazon Prime to work. Blocking them causes Amazon Prime videos to not play:
com.amazon.device.messaging
com.amazon.device.messaging.sdk.internal.library
com.amazon.device.messaging.sdk.library

RASTAVIPER said:
So the instructions at first post work only for Fire Stick 4k.
They are not good for the 2nd gen stick, as I have already tried them with my device.
Does anyone else has some idea how to make it work with Root at 2nd Gen?
I have adb access through my windows computer.
Click to expand...
Click to collapse
I didn't use a script but sat and went through the full list form @0815hoffi script above with esfile explorer and manually deleted each package. Rebooted and all good:good:
I'm using hoffi amazon launcher 1.1 replacement with pre rooted 5.2.7.2 and @Skel40 build.prop tweaks for the 4k and all is working good. Incase anyone is wondering all this works fine

Related

Any way to write a batch script to remove apps in Clockwork?

This is a list of the apps I remove while in clockwork, with /system mounted etc... My question is, is there a way to have it do these commands automatically? I hate having to copy from notepad the commands as i have them saved, then right click in my cmd, paste, enter each and every single one
rm -r amazonmp3_1.6+24_signed_zipaligned.apk
rm -r AppPack2.0.apk
rm -r YouTube.apk
rm -r IM.apk
rm -r Mail.apk
rm -r vvm-signed.apk
rm -r Faves.apk
rm -r mytouchmusic-signed.apk
rm -r HtcTwitter.apk
rm -r com.htc.TwitterWidget.apk
rm -r FavesWidget.apk
rm -r htcmailwidgets.apk
rm -r HTCSetupWizard.apk
rm -r SelfHelp.apk
rm -r Hoops.apk
rm -r NatureTheme.apk
rm -r Palazzo.apk
rm -r Surf.apk
rm -r Wildflower.apk
rm -r com.htc.FriendStreamWidget.apk
rm -r com.htc.NewsReaderWidget.apk
rm -r com.htc.StockWidget.apk
rm -r com.htc.WeatherWidget.apk
You could create a batch script and put adb shell before each line, then when you have mounted /system just type in the name of the script IE remove.bat
sent from my *ROOTED* myTouch 3G Slide
adb does have an "uninstall" option. I'm not sure it would work in this situation. You could try a batch file that has "adb uninstall AppPack2.0.apk" for example and see if it works.
^ Will that work on the Slide?
<--- ADB newb
I tried removing apps using root explorer but when I mount the system again the phone reboots and the app is still there. Im just trying to find a way to remove some of the pointless apps.
You have to be in recovery mode because the /system NAND is protected otherwise.
Here's what I do:
1. Reboot the phone in recovery.
2. Run Clockworkmod (by applying update.zip in recovery).
3. Mount /system in Clockworkmod.
4. Now using adb shell, you can remove the apps in /system/app.
Thankyou very much

[Q] Got root via adb, how do I make it permanent?

Code below works as far as getting root via adb
But after reboot I get following error:
Code:
? su
link_image[1717]: 2977 missing essential tablesCANNOT LINK EXECUTABLE
Do you know what's missing here?
Code:
./adblinux push psneuter /data/local/tmp
./adblinux push su-v3 /data/local/tmp
./adblinux push busybox /data/local/tmp
./adblinux shell chmod +x /data/local/tmp/psneuter
./adblinux shell chmod +x /data/local/tmp/su-v3
./adblinux shell
$ /data/local/tmp/psneuter
# exit
./adblinux shell
# cat /proc/mounts
# mount -o rw,remount -t yaffs2 /dev/stl5 /system
# busybox cp -vaf /data/local/tmp/su-v3 /system/xbin/su
# ls -l /system/xbin/su
# busybox chown 0.2000 /system/xbin/su
# busybox chmod 06755 /system/xbin/su
# ls -l /system/xbin/su
# rm /system/bin/su
# busybox ln -s /system/xbin/su /system/bin/su
# ls -l /system/bin/su
# busybox cp -f /data/local/tmp/busybox /system/xbin
# busybox chown 0.2000 /system/xbin/busybox
# busybox chmod 0755 /system/xbin/busybox
# ls -l /system/xbin/busybox
# exit
./adblinux install -r Superuser.apk
./adblinux reboot
Hi,
I am new here, but advanced linux user
I have already done this succesfully on my X10i - thanks 1st working howto on linux OS
Theres propably mistake with these steps:
./adblinux shell chmod +x /data/local/tmp/psneuter
./adblinux shell chmod +x /data/local/tmp/su-v3
In my case these commands left errors. They have to simply mark these binaries as executable. But chmod +x * doesnt work (dont ask why ) - so I marked them as executables (su,psneuter,busybox) in desktop linux os before transfer and it worked.
The next mistake is in the line:
busybox cp -vaf /data/local/tmp/su-v3 /system/xbin/su
Because busybox is not yet in the system path - so you have to type:
# /data/local/tmp/busybox cp -vaf /data/local/tmp/su-v3 /system/xbin/su
Until
# /data/local/busybox cp -f /data/local/tmp/busybox /system/xbin
You can use busybox directly.
chmod +x doesn't work on android, you have to use chmod 777 or 666 or the like to get it to work properly.
Semperverus said:
chmod +x doesn't work on android, you have to use chmod 777 or 666 or the like to get it to work properly.
Click to expand...
Click to collapse
Or do it on linux GUI and mark as executable before transfer to Android device

[HOWTO + BLACKHAWK ROM] Galaxy Ace firmware in ext4 format

Just want to share my command list to convert Galaxy Ace firmware from rfs to ext4.
Code:
cd /home/user/rfs2ext4
dd if=/dev/zero of=system.rfs bs=4096 count=53696
losetup /dev/loop0 system.rfs
mkfs.ext4 -T ext4 -b 4096 -m 0 -J size=4 -O ^resize_inode,^ext_attr,^huge_file,^has_journal /dev/loop0
tune2fs -c 100 -i 100d -m 0 /dev/loop0
mkdir /tmp/ext4
sudo mount /dev/loop0 /tmp/ext4
chmod 755 fix-*.sh
cp fix-*.sh /tmp
mkdir /tmp/rfs
sudo mount -o loop source/system.rfs /tmp/rfs
sudo cp -a /tmp/rfs/* /tmp/ext4
cd /tmp/ext4
sudo ../fix-system.sh
cd /home/user/rfs2ext4
sudo umount /tmp/ext4
sudo umount /tmp/rfs
dd if=/dev/zero of=data.rfs bs=4096 count=46400
losetup /dev/loop0 data.rfs
mkfs.ext4 -T ext4 -b 4096 -m 0 -J size=16 -O ^resize_inode,^ext_attr,^huge_file /dev/loop0
tune2fs -c 100 -i 100d -m 0 /dev/loop0
mount /dev/loop0 /tmp/ext4
sudo mount -o loop source/data.rfs /tmp/rfs
sudo cp -a /tmp/rfs/* /tmp/ext4
cd /tmp/ext4
sudo ../fix-data.sh
cd /home/user/rfs2ext4
sudo umount /tmp/ext4
sudo umount /tmp/rfs
dd if=/dev/zero of=csc.rfs bs=4096 count=6464
losetup /dev/loop0 csc.rfs
mkfs.ext4 -T ext4 -b 4096 -m 0 -J size=4 -O ^resize_inode,^ext_attr,^huge_file /dev/loop0
tune2fs -c 100 -i 100d -m 0 /dev/loop0
mount /dev/loop0 /tmp/ext4
sudo mount -o loop source/csc.rfs /tmp/rfs
sudo cp -a /tmp/rfs/* /tmp/ext4
cd /tmp/ext4
sudo ../fix-csc.sh
cd /home/user/rfs2ext4
sudo umount /tmp/ext4
sudo umount /tmp/rfs
tar -H ustar -c boot.img recovery.img data.rfs system.rfs > CODE_S5830XWKPN_CL375596_REV03_blackhawk.tar
md5sum -t CODE_S5830XWKPN_CL375596_REV03_blackhawk.tar >> CODE_S5830XWKPN_CL375596_REV03_blackhawk.tar
mv CODE_S5830XWKPN_CL375596_REV03_blackhawk.tar CODE_S5830XWKPN_CL375596_REV03_blackhawk.tar.md5
tar -H ustar -c csc.rfs > CSC_S5830OXXKP7_CL375596_REV03_blackhawk.tar
md5sum -t CSC_S5830OXXKP7_CL375596_REV03_blackhawk.tar >> CSC_S5830OXXKP7_CL375596_REV03_blackhawk.tar
mv CSC_S5830OXXKP7_CL375596_REV03_blackhawk.tar CSC_S5830OXXKP7_CL375596_REV03_blackhawk.tar.md5
tar -H ustar -c arm11boot mibib oemsbl qcsbl > APBOOT_S5830XWKPN_CL375596_REV03.tar
md5sum -t APBOOT_S5830XWKPN_CL375596_REV03.tar >> APBOOT_S5830XWKPN_CL375596_REV03.tar
mv APBOOT_S5830XWKPN_CL375596_REV03.tar CAPBOOT_S5830XWKPN_CL375596_REV03.tar.md5
tar -H ustar -c amss > MODEM_S5830XWKP6_CL375596_REV03.tar
md5sum -t MODEM_S5830XWKP6_CL375596_REV03.tar >> MODEM_S5830XWKP6_CL375596_REV03.tar
mv MODEM_S5830XWKP6_CL375596_REV03.tar MODEM_S5830XWKP6_CL375596_REV03.tar.md5
fix-system.sh script, not perfect but work
Code:
#!/bin/sh
rm -f bin/cat
rm -f bin/chmod
rm -f bin/chown
rm -f bin/cmp
rm -f bin/date
rm -f bin/dd
rm -f bin/df
rm -f bin/dmesg
rm -f bin/getevent
rm -f bin/getprop
rm -f bin/hd
rm -f bin/id
rm -f bin/ifconfig
rm -f bin/iftop
rm -f bin/insmod
rm -f bin/ioctl
rm -f bin/ionice
rm -f bin/kill
rm -f bin/ln
rm -f bin/log
rm -f bin/ls
rm -f bin/lsmod
rm -f bin/lsof
rm -f bin/mkdir
rm -f bin/mount
rm -f bin/mv
rm -f bin/nandread
rm -f bin/netstat
rm -f bin/newfs_msdos
rm -f bin/notify
rm -f bin/printenv
rm -f bin/ps
rm -f bin/reboot
rm -f bin/renice
rm -f bin/rm
rm -f bin/rmdir
rm -f bin/rmmod
rm -f bin/route
rm -f bin/schedtop
rm -f bin/sendevent
rm -f bin/setconsole
rm -f bin/setprop
rm -f bin/sleep
rm -f bin/smd
rm -f bin/start
rm -f bin/stop
rm -f bin/sync
rm -f bin/top
rm -f bin/umount
rm -f bin/uptime
rm -f bin/vmstat
rm -f bin/watchprops
rm -f bin/wipe
rm -f bin/dumpmesg
mkdir -p etc/init.d
mkdir -p sd
chown -R 0:0 .
for i in $( find . ); do
if [ -d $i ]; then
chmod 755 $i
else
chmod 644 $i
fi
done
chown -R 0:0 etc/init.d
chmod -R 777 etc/init.d
chown -R 0:2000 bin
chmod -R 755 bin
chown 0:3003 bin/ip
chmod 6755 bin/ip
chown 0:3003 bin/netcfg
chmod 2750 bin/netcfg
chown 0:3004 bin/ping
chmod 2755 bin/ping
chown 0:2000 bin/run-as
chmod 6750 bin/run-as
chown -R 1002:1002 etc/bluetooth
chmod -R 440 etc/bluetooth
chown 0:0 etc/bluetooth
chmod 755 etc/bluetooth
chown 1000:1000 etc/bluetooth/auto_pairing.conf
chmod 640 etc/bluetooth/auto_pairing.conf
chown 3002:3002 etc/bluetooth/blacklist.conf
chmod 444 etc/bluetooth/blacklist.conf
chown 1002:1002 etc/dbus.conf
chmod 440 etc/dbus.conf
chown 1014:2000 etc/dhcpcd/dhcpcd-run-hooks
chmod 550 etc/dhcpcd/dhcpcd-run-hooks
chown 0:2000 etc/init.goldfish.sh
chmod 550 etc/init.goldfish.sh
chown -R 0:0 etc/ppp
chmod -R 555 etc/ppp
chmod 0755 etc/ppp
chown -R 0:2000 xbin
chmod -R 755 xbin
# For pre-rooted firmware
if [ -f xbin/su ]; then
chmod 4755 xbin/su
fi
if [ -f xbin/sqlite3 ]; then
chmod 4755 xbin/sqlite3
fi
if [ -f bin/su ]; then
chmod 4755 bin/su
fi
if [ -f bin/sqlite3 ]; then
chmod 4755 bin/sqlite3
fi
cd bin
ln -s toolbox cat
ln -s toolbox chmod
ln -s toolbox chown
ln -s toolbox cmp
ln -s toolbox date
ln -s toolbox dd
ln -s toolbox df
ln -s toolbox dmesg
ln -s toolbox getevent
ln -s toolbox getprop
ln -s toolbox hd
ln -s toolbox id
ln -s toolbox ifconfig
ln -s toolbox iftop
ln -s toolbox insmod
ln -s toolbox ioctl
ln -s toolbox ionice
ln -s toolbox kill
ln -s toolbox ln
ln -s toolbox log
ln -s toolbox ls
ln -s toolbox lsmod
ln -s toolbox lsof
ln -s toolbox mkdir
ln -s toolbox mount
ln -s toolbox mv
ln -s toolbox nandread
ln -s toolbox netstat
ln -s toolbox newfs_msdos
ln -s toolbox notify
ln -s toolbox printenv
ln -s toolbox ps
ln -s toolbox reboot
ln -s toolbox renice
ln -s toolbox rm
ln -s toolbox rmdir
ln -s toolbox rmmod
ln -s toolbox route
ln -s toolbox schedtop
ln -s toolbox sendevent
ln -s toolbox setconsole
ln -s toolbox setprop
ln -s toolbox sleep
ln -s toolbox smd
ln -s toolbox start
ln -s toolbox stop
ln -s toolbox sync
ln -s toolbox top
ln -s toolbox umount
ln -s toolbox uptime
ln -s toolbox vmstat
ln -s toolbox watchprops
ln -s toolbox wipe
ln -s dumpstate dumpmesg
cd ../
fix-data.sh script:
Code:
#!/bin/sh
if [ -d data_test ]; then
rm -rf data_test
fi
if [ -d kernel-tests ]; then
rm -rf kernel-tests
fi
if [ -d local ]; then
rm -rf local
fi
if [ -d qmi_test ]; then
rm -rf qmi_test
fi
chown -R 1013:1000 .
chmod -R 777 .
fix-csc.sh script:
Code:
#!/bin/sh
chown -R 0:0 .
for i in $( find . ); do
if [ -d $i ]; then
chmod 755 $i
else
chmod 644 $i
fi
done
chown 1000:2001 recovery
CSC updater script:
Code:
#!/sbin/busybox sh
usage="usage: sec_csc <sales code>"
if [ "$(id | grep -c root)" != "1" ]; then
echo "You have no permission to run sec_csc."
exit 1;
fi
if ! [ "$1" = "" ]; then
if [ -d /system/csc/$1 ]; then
echo -n "Apply $1 sales code? y/N: "
read answer
if [ "$answer" = "y" ]; then
/sbin/busybox mount -o rw,remount /system
cp -f /system/csc/$1/system/CSCFiles.txt /system/
cp -f /system/csc/$1/system/CSCVersion.txt /system/
cp -f /system/csc/$1/system/csc/* /system/csc/
rm -f /data/property/persist.sys.country
rm -f /data/property/persist.sys.language
rm -f /data/property/persist.sys.localevar
echo -n $1 > /proc/LinuStoreIII/efs_info
setprop ril.sales_code $1
/sbin/busybox mount -o ro,remount /system
echo "Turn off and then turn on your phone"
echo "using the dedicated power button to"
echo "apply the new CSC."
fi
else
echo "$1 sales code not found."
fi
else
echo $usage
fi
Q: What's really above scripts do?
A: I do not directly use system.rfs (in rfs format) but making a new system.rfs in ext4 format. Copying the whole contents of the old system.rfs (rfs) into the new system.rfs (ext4), make modifications in the system.rfs (ext4) mount point, and then fix the access rights. Using ext3 format is also not problems as long as you use boot and recovery image that support ext3 and ext4 filesystems. After all the modifications, do not forget to umount both image.
Q: Why?
A: RFS filesystem in linux read as FAT filesystem. FAT filesystem permissions can not be set correctly according to the needs of the operating system (in this case Android). You're lucky if you modify the firmware and do not occur bootloop
Q: Is Odin support *.rfs formatted in ext4?
A: Odin raw writes the filesystem partition, no matter the form as long as *.rfs no larger than the physical partition.
Q: Does this really work?
A: You can try If you want to take the risk why not try XWKPN firmware already formatted to ext4 in ODIN package as follows:
S5830XWKPN_S5830XWKP6_S5830OXXKP7_blackhawk.rar (137.59 MB)
Password: ketut.kumajaya
Inside the package:
CF-Root-S5830 v3.7 b81 candidate
deodexed and zipaligned /system/app and /system/framework, thanks to dsixda
cifs (Samba/Windows share) and tun (openVPN) kernel modules included
BLN service support, modified services.jar. Thanks to neldar
Android Scribble 2.0 boot animation from here, thanks to GLa'DOS
multi CSC taken from XWKPN (Europe?) and DXKC1 (Asia?), XSE sales code (Indonesia as default country)
csc.rfs, data.rfs and system.rfs in ext4 format, no need to convert filesystem manually using ext4 Manager
keep application and themes as a plain XWPKN
DT apps2sd included, a modified version special for CF-Root-S5830. You can find the original Darktremor apps2sd here, thanks to tkirton.
ODIN fullpack, the safest way to flash Samsung firmware
Instructions:
Follow these instructions to the letter. Do not touch any buttons or checkboxes that are not listed below to touch!
Decompress S5830XWKPN_S5830XWKP6_S5830OXXKP7_blackhawk.rar
(USB) Disconnect your phone from your computer
Start ODIN v4.38
Click the OPS button, and select Cooper_v1.0.ops
Click the BOOT button, and select APBOOT_S5830XWKPN_CL375596_REV03.tar.md5
Click the Phone button, and select MODEM_S5830XWKP6_CL375596_REV03.tar.md5
Click the PDA button, and select CODE_S5830XWKPN_CL375596_REV03_blackhawk.tar.md5
Click the CSC button, and select CSC_S5830OXXKP7_CL375596_REV03_blackhawk.tar.md5
Put your phone in download mode
(USB) Connect the phone to your computer
Click the START button
Wait for the phone to reboot
No need to wipe the /data and /cache partitions, has been automatically when flashing.
Done
If you expect a better benchmark results. Enable "Media: Stagefright" on "Tweak Manager" and make sure you do not select "CPU: Conservative gov.".
UPDATE:
- Samsung keyboard have more language
- A new script to apply your CSC, run it over "adb shell" or Terminal Emulator or ConnectBot. For example to apply SER (Russia?) sales code:
Code:
sec_csc SER
To activate your new sales code, you must power off and then power on your phone using the dedicated power button.
Apply this update over CWM or CWM Manager app.
Wow sweet i might make a video for this
Thanks any ways
Script updated for pre-rooted firmware.
Maybe I should show the results to get people interested
You are the real dev, ketut.kumajaya!
Thanks for sharing such a great guide to us...
Hey, I think this guide can be applied to build a CWM-flashable ROM
fla.sh said:
You are the real dev, ketut.kumajaya!
Thanks for sharing such a great guide to us...
Hey, I think this guide can be applied to build a CWM-flashable ROM
Click to expand...
Click to collapse
Your welcome!
fix-system.sh and fix-csc.sh updated for better/faster recursive chmod.
CWM flashable? Of course yes, my fix-*.sh scripts is a bash port of dsixda/tools/update_files
Examples of ROM which all *.rfs formatted as ext4 filesystem. Do not expect too much from a ROM made in two short days after work But read the features
Password: ketut.kumajaya
ask how to flash?
wow..what a great work...i gotta try this...do i need to flash KPN 2.3.3 first then i can use this? can i flash this one from froyo for example? is this ROM already included check RAM script or something like that?
sorry for my bad english
LeimRen said:
wow..what a great work...i gotta try this...do i need to flash KPN 2.3.3 first then i can use this? can i flash this one from froyo for example? is this ROM already included check RAM script or something like that?
sorry for my bad english
Click to expand...
Click to collapse
You have to full flash (BOOT, Phone, PDA, CSC) your phone using ODIN. You can flash your own sec_csc.zip (extracted from csc.rfs using WinImage or MagicISO or linux) then. This firmware have all CF-Root- S5830 have, incl. CF-Root-S5830 CWM4 recovery b79 (b78 have CSC flashing error). The boot image using a modified version CF-Root-S5830 b80 for fast boot and apply ondemand CPU governer after boot complete. Fast boot but better battery life. If you need more efficient battery usage, set CPU governer to conservative using Tweak Manager. CF-Root-S5830 installed by default, /res/misc cleared so the boot image freeing some memory.
ketut.kumajaya said:
You have to full flash (BOOT, Phone, PDA, CSC) your phone using ODIN. You can flash your own sec_csc.zip (extracted from csc.rfs using WinImage or MagicISO or linux) then. This firmware have all CF-Root- S5830 have, incl. CF-Root-S5830 CWM4 recovery b79 (b78 have CSC flashing error). The boot image using a modified version CF-Root-S5830 b80 for fast boot and apply ondemand CPU governer after boot complete. Fast boot but better battery life. If you need more efficient battery usage, set CPU governer to conservative using Tweak Manager. CF-Root-S5830 installed by default, /res/misc cleared so the boot image freeing some memory.
Click to expand...
Click to collapse
okay...thanks for the explanation, sir...downloading now....
LeimRen said:
okay...thanks for the explanation, sir...downloading now....
Click to expand...
Click to collapse
You're welcome! For ROM modificator (what I have call you), feel free to use my ROM as your template. I purposely did not make many changes in the userspace, but the core only. A proper credit for me is enough
wow! this rom is blazing fast. imo, this is much faster and smoother than coderomv2x.2v.
thanks for your great work my friend. i'll test this rom further and report if i find any bugs ^^
AdobongKamote said:
wow! this rom is blazing fast. imo, this is much faster and smoother than coderomv2x.2v.
thanks for your great work my friend. i'll test this rom further and report if i find any bugs ^^
Click to expand...
Click to collapse
Your first post? Thanks for your report.
ketut.kumajaya said:
Your first post? Thanks for your report.
Click to expand...
Click to collapse
yeah. i registered just to thank you for your great efforts
Hey guys,
sorry for that question, but what's the password to decompress the archive?
Sprint82 said:
Hey guys,
sorry for that question, but what's the password to decompress the archive?
Click to expand...
Click to collapse
that should be indicated on the first page.
HINT: it's the dev's username
lol
can it be so easy?
Thanks
Then, I give it a try
Thanks Ketut.kumajaya for this. Actually, this modified KPN should have its very own thread. It's fast and by far one of the best ROM out there for the Ace.
http://www.multiupload.com/S6JSJSSZF2
works for my phone, thanks so much!
just one question (I may sound dumb asking this, but I seriously have no idea), but how do I access app2sd?
chinoyray said:
Thanks Ketut.kumajaya for this. Actually, this modified KPN should have its very own thread. It's fast and by far one of the best ROM out there for the Ace.
http://www.multiupload.com/S6JSJSSZF2
Click to expand...
Click to collapse
It's just part of my tutorial on converting rfs to ext4. Incidentally CF-Root-S5830 also from me, then this is the official combination of KPN and CF-Root-S5830

SecurityScript & unbloatscript & batch install userapp scripts

I "made" a security script for cm/aosp and wanted to share. Ok, so I copied a lot from what I could find off the net, and thought I would share Seems as if this closes some of the security holes in android in general, but also cm/aokp.
If any of these are rediculous please help contribute to making it better. I just added what I thought could be true.
Warning: doesnt work on touchwiz roms, only cm/aosp
Warning: at own risk, I take no responsibility
Warning: this could render other scripts useless.
Warning: I am no codemonkey, I find after boot I need to manually apply ro access with rootexplorer for some of the directories used here. Havent been able to solve that with tasker/init.d scripts.
How to use:
run in terminal with su privileges.
Or set as script/task/init.d to run on boot. For some stuff to stick you need to do this. I recommend tasker, thats what I ran this with on boot.
Sources are to various to mention. One of them is secdroid. A lot of what that app has I could verify from a lot of sources. But is missing a lot of other stuff.
Tested Improvements are welcome! Donations/beer also
Spoiler
#!/system/bin/sh
mount -o remount, -rw /sbin
mount -o remount, -rw /system
mount -o remount, -rw /system/xbin
####enable the adbd daemon and busybox
mount -o remount, -rw -t rootfs rootfs /
chmod 777 /sbin/adbd
chmod 777 /system/xbin/busybox
###Disable NFC
chmod 000 /dev/ttyO3
chmod 000 /dev/tty3
###hardening TCP/IP stack for IPV4
###Avoid a smurf attack
sysctl -w net.ipv4.icmp_echo_ignore_broadcasts=1;
###ICMP broadcast
busybox sysctl -e -w net.ipv4.conf.all.accept_redirects=0;
###ICMP redirects ipv4
busybox sysctl -e -w net.ipv6.conf.all.accept_redirects=0;
###ICMP redirects ipv6
busybox sysctl -e -w net.ipv4.conf.all.send_redirects=0;
### ICMP redirects
busybox sysctl -e -w net.ipv4.conf.all.accept_source_route=0; ###source routing disable
busybox sysctl -e -w net.ipv4.conf.all.forwarding=0;
###Forwarding traffic
busybox sysctl -e -w net.ipv4.conf.all.rp_filter=1;
busybox sysctl -e -w net.ipv4.conf.all.log_martians=1;
###filter martians
busybox sysctl -e -w net.ipv4.tcp_max_syn_backlog=1280;
###TCP syn half-opened
sysctl -w net.ipv4.ip_forward=0;
###Block Redirects
busybox sysctl -e -w net.ipv4.conf.default.accept_redirects=0;
busybox sysctl -e -w net.ipv4.conf.all.secure_redirects=0;
busybox sysctl -e -w net.ipv4.conf.default.secure_redirects=0;
###Block Source-Routing
busybox sysctl -e -w net.ipv4.conf.default.accept_source_route=0;
busybox sysctl -e -w net.ipv4.conf.all.accept_source_route=0;
### IPv4 Tweaks
busybox sysctl -e -w net.ipv4.tcp_timestamps=0;
busybox sysctl -e -w net.ipv4.tcp_sack=1;
busybox sysctl -e -w net.ipv4.tcp_fack=1;
busybox sysctl -e -w net.ipv4.tcp_congestion_control=cubic;
busybox sysctl -e -w net.ipv4.tcp_window_scaling=1;
###Protection against SYN Attacks
busybox sysctl -e -w net.ipv4.tcp_syncookies=1;
busybox sysctl -e -w net.ipv4.conf.all.rp_filter=1;
busybox sysctl -e -w net.ipv4.conf.default.rp_filter=1;
busybox sysctl -e -w net.ipv4.tcp_synack_retries=2;
busybox sysctl -e -w net.ipv4.tcp_syn_retries=2;
busybox sysctl -e -w net.ipv4.tcp_max_syn_backlog=1024;
busybox sysctl -e -w net.ipv4.tcp_max_tw_buckets=16384;
busybox sysctl -e -w net.ipv4.icmp_echo_ignore_all=1;
###Turn on protection for bad icmp error messages
busybox sysctl -e -w net.ipv4.icmp_ignore_bogus_error_responses=1;
busybox sysctl -e -w net.ipv4.tcp_no_metrics_save=1;
busybox sysctl -e -w net.ipv4.tcp_fin_timeout=15;
busybox sysctl -e -w net.ipv4.tcp_keepalive_intvl=30;
busybox sysctl -e -w net.ipv4.tcp_keepalive_probes=5;
busybox sysctl -e -w net.ipv4.tcp_keepalive_time=1800;
###Tune IPv6 and disable lol
busybox sysctl -e -w net.ipv6.conf.default.router_solicitations=0;
busybox sysctl -e -w net.ipv6.conf.default.accept_ra_rtr_pref=0;
busybox sysctl -e -w net.ipv6.conf.default.accept_ra_pinfo=0;
busybox sysctl -e -w net.ipv6.conf.default.accept_ra_defrtr=0;
busybox sysctl -e -w net.ipv6.conf.default.autoconf=0;
busybox sysctl -e -w net.ipv6.conf.default.dad_transmits=0;
busybox sysctl -e -w net.ipv6.conf.default.max_addresses=1;
busybox sysctl -e -w net.ipv6.conf.all.disable_ipv6=1;
busybox sysctl -e -w net.ipv6.conf.default.disable_ipv6=1;
busybox sysctl -e -w net.ipv6.conf.lo.disable_ipv6=1;
### Don't act as a router
busybox sysctl -e -w net.ipv4.ip_forward=0;
busybox sysctl -e -w net.ipv4.conf.all.send_redirects=0;
busybox sysctl -e -w net.ipv4.conf.default.send_redirects=0;
### Removing/ disabling unnecessary binaries. Some of them have access to Internet
mount -o remount, -rw /system/xbin
rm -f /system/xbin/irsii
rm -f /system/xbin/nano
rm -f /system/xbin/nc
rm -f /system/xbin/telnet
rm -f /system/xbin/telnetd
rm -f /system/xbin/telnetd
rm -f /system/xbin/opcontrol
chmod 000 /system/xbin/irsii
chmod 000 /system/xbin/nc
chmod 000 /system/xbin/netserver
chmod 000 /system/xbin/netperf
chmod 000 /system/xbin/opcontrol
chmod 000 /system/xbin/scp
chmod 740 /system/xbin/rsync
chmod 740 /system/xbin/sdptest
chmod 000 /system/xbin/ssh
chmod 000 /system/xbin/sshd
chmod 000 /system/xbin/ssh-keygen
chmod 740 /system/xbin/strace
chmod 000 /system/xbin/tcpdump
chmod 740 /system/xbin/vim
chmod 000 /system/xbin/nano
chmod 000 /system/xbin/telnet
mount -o remount, -ro /system/xbin
###Let's make sure they aren't in bin either
rm -f /system/bin/irsii
rm -f /system/bin/nano
rm -f /system/bin/nc
rm -f /system/bin/telnet
rm -f /system/bin/telnetd
rm -f /system/bin/opcontrol
chmod 000 /system/bin/irsii
chmod 000 /system/bin/nc
chmod 000 /system/bin/netserver
chmod 000 /system/bin/netperf
chmod 000 /system/bin/opcontrol
chmod 000 /system/bin/scp
chmod 740 /system/bin/rsync
chmod 740 /system/bin/sdptest
chmod 000 /system/bin/ssh
chmod 000 /system/bin/sshd
chmod 000 /system/bin/ssh-keygen
chmod 740 /system/bin/strace
chmod 000 /system/bin/tcpdump
chmod 740 /system/bin/vim
chmod 000 /system/bin/nano
chmod 000 /system/bin/telnet
### This disables Bluetooth (Most users want it on)
###chmod 000 /system/bin/bluetoothd
### ONLY root should need these:
chmod 750 /system/bin/iptables
chmod 750 /system/bin/ping
### Let's remove suid from ping (prevent a Privilege escalation attack)
mount -o remount, -rw /system/xbin
chmod 777 /system/xbin/busybox
mount -o remount, -rw /system/bin
busybox chmod -s /system/bin/ping
mount -o remount, -ro /system/bin
chmod 000 /system/xbin/busybox
mount -o remount, -ro /system/xbin
###disable the Packet Management binary - Prevents installing apps
via ADB or remotely
###disable ssh
###remove uiautomator permissions havent found a use for it anyways
mount -o remount, -rw /system/bin
chmod 000 /system/bin/pm
chmod 000 /system/bin/ssh
chmod 000 /system/bin/sshd
chmod 000 /system/bin/sshd
chmod 000 /system/bin/start-ssh
chmod 000 /system/bin/uiautomator
mount -o remount, -ro /system/bin
mount -o remount, -rw /sbin
###Disable the adbd daemon again
mount -o remount, -rw -t rootfs rootfs /
chmod 000 /sbin/adbd
###Prevents adb from running. This protects against attacks like P2P-ADB by Kos
###disable config ssh. No server for me...
###remove files with dictionary for terminals lol wtf
mount -o remount, -rw /etc
rm -rf /etc/terminfo/*
mv /etc/ssh/ssh_config /etc/ssh/ssh_config.donthinkso
mount -o remount, -ro /etc
###close
mount -o remount, -ro -t rootfs rootfs /
mount -o remount, -ro /sbin
mount -o remount, -ro /system/xbin
mount -o remount, -ro /system
mount -o remount, -ro /
###Cause I cant code lol no errors reported. Test without exit 0 to see in terminal if it works for your rom. its here so tasker wont error out if it cant find something.
exit 0
edit, put a /* after terminfo to delete all there
edit, small fix in code, not yet able to properly mount system and root as ro
Unbloatscript
Just removing some of the stuff I dont use. You can add/remove what you like
edit: some apps might forceclose if they are running, thats no issue.
After running wipe cache and dalvik and reboot. To further clean.
warning I added reboot at end so device will reboot!
Spoiler
#!/system/bin/sh
mount -o remount, -rw /sbin
mount -o remount, -rw /system
mount -o remount, -rw /system/xbin
# enable the adbd daemon and busybox
chmod 777 /sbin/adbd
chmod 777 /system/xbin/busybox
rm -f /system/app/QuickSearchBox.apk
rm -f /system/app/VoiceSearchStub.apk
rm -f /system/app/Talkback.apk
rm -f /system/app/Talk.apk
rm -f /system/app/Email2.apk
rm -f /system/app/Exchange2.apk
rm -f /system/app/HoloSpiralWallpaper.apk
rm -f /system/app/MagicSmokeWallpapers.apk
rm -f /system/app/VoiceDialer.apk
rm -f /system/app/VpnDialogs.apk
rm -f /system/app/Apollo.apk
rm -f /system/app/BasicDreams.apk
rm -f /system/app/CMFileManager.apk
rm -f /system/app/CMWallpapers.apk
rm -f /system/app/Development.apk
rm -f /system/app/DSPManager.apk
rm -f /system/app/LiveWallpapers.apk
rm -f /system/app/LiveWallpaperPicker.apk
rm -f /system/app/LockClock.apk
rm -f /system/app/MagicSmokeWallpapers.apk
rm -f /system/app/MediaUploader.apk
rm -f /system/app/NoiseField.apk
rm -f /system/app/Phasebeam.apk
rm -f /system/app/SoundRecorder.apk
rm -f /system/app/Term.apk
rm -f /system/app/Trebuchet.apk
rm -f /system/app/WAPPushManager.apk
###remove dalvik and cache
rm -f /data/dalvik-cache/*
rm -f /cache/dalvik-cache/*
rm -f /cache/lost+found/*
chmod 000 /sbin/adbd
chmod 000 /system/xbin/busybox
mount -o remount, -ro /sbin
mount -o remount, -ro /system/xbin
mount -o remount, -ro /system
exit 0
reboot
Edit, added remove dalvik cache, cache and Reboot after running this to prevent fc. You will get some of apps running but that should be no issue
edit, closing, foolish me didnt mount as ro. and removed a bit of other code
edit some more cleaning
Batch install script
As I run a lot of scripts to automate my post flash activities. I set my phone on airplane mode and run the following script batch install from a certain folder.
Its nowhere near as sophisticated as Chasmodos roms scripts, but it does the job for my user apps
Here I have a folder (batchlove) where I store my backed upped apps (no data) from playstore on my external sdcard. So far play recognizes the apps and lets me update it. However then you would need tro update the apks in this folder in order to always have up to date versions.You can put apks backed up with a lot off aps here.
Ofcourse I dont keep my tasker app here because it installs everything in that folder, and installing tasker while running this script is not a good idea.
You can run this script from a terminal as wel.
Spoiler
#!/system/bin/sh
mount -o remount, -rw /sbin
mount -o remount, -rw /system
mount -o remount, -rw /system/xbin
mount -o remount, -rw /system/bin
# enable the adbd daemon and busybox
mount -o remount, -rw -t rootfs rootfs /
chmod 777 /sbin/adbd
chmod 777 /system/xbin/busybox
chmod 777 /system/bin/pm
cd /storage/sdcard1/batchlove;
for app in *.apk; do pm install -r $app; done
chmod 000 /sbin/adbd
chmod 000 /system/xbin/busybox
chmod 000 /system/bin/pm
mount -o remount, -rw /sbin
mount -o remount, -rw /system
mount -o remount, -rw /system/xbin
mount -o remount, -rw /system/bin
exit 0
You copied SecDroid and added some stuff, now you call it your own project. Why not continue SecDroid?
SecUpwN said:
You copied SecDroid and added some stuff, now you call it your own project. Why not continue SecDroid?
Click to expand...
Click to collapse
I copied a bunch of other stuff also, as even secdroid is not the source of most of those lines. It is an awesome initiative though. An app for the masses. For those insterested http://forum.xda-developers.com/showthread.php?t=2086276.
With the script, not really my project, I wanted to set the values immediately as I flash every other day. I got a script for that. As I would still need that for reopening the closed the stuff,every once in a while.
edit submitted most to secdroid git for the security script
added some extra scripts, handy for unbloat/batchinstall.
tip: get tasker, save these scripts as tasks, backup tasker data (from within tasker) and add task to move the backup to external card. Then you only need to install tasker copy the backup to sdcard, restore and run. Its another way
if enough people are interested I can export these scripts as apps from tasker, just install and it will do what the script does.
remember to check folder permissions as these dont always stick lol
hope you find it handy, if anyone has a script that is handy please share
delete

Fire TV Stick 2/4K Launcher replacement ROOT

Store and Voice input will be lost.
1, Install Launcher of your choice. ( adb install 123launcher.apk )
2, adb shell su -c "pm disable-user --user 0 com.amazon.tv.launcher"
wait 5 seconds
3, adb shell su -c "pm disable-user --user 0 com.amazon.firehomestarter"
wait 5 seconds
5, adb shell reboot
6, adb install com.markus.firetools-1.2.apk (to access Settings "allow Root" )
#########
Disable OTA Updates:
adb shell "su -c pm disable com.amazon.tv.forcedotaupdater.v2"
adb shell "su -c pm disable com.amazon.device.software.ota"
adb shell "su -c pm disable com.amazon.device.software.ota.override"
adb shell "pm clear com.amazon.device.software.ota"
########
to restore the Amazon Launcher
adb shell su -c "pm enable com.amazon.firehomestarter"
wait 4 seconds
adb shell su -c "pm enable com.amazon.tv.launcher"
Update
New Settings APK in 1st Post
0815hoffi said:
After Tests i found out , you can replace amazon launcher without other Tools.
Please test if you want.
1 install launcher of your choice.
Boot twrp.
adb shell mount -o rw /system
Backup Apps
adb shell "cp /system/priv-app/com.amazon.firehomestarter/com.amazon.firehomestarter.apk /sdcard/"
adb shell "cp /system/priv-app/com.amazon.tv.launcher/com.amazon.tv.launcher.apk /sdcard/"
Delete amazon launcher.
adb shell "rm -r /data/app/com.amazon.tv.launcher-1/"
adb shell "rm -r /data/app/com.amazon.firehomestarter/"
adb shell "rm -r /data/data/com.amazon.tv.launcher/"
adb shell "rm -r /data/data/com.amazon.firehomestarter/"
adb shell "rm /system/priv-app/com.amazon.firehomestarter/com.amazon.firehomestarter.apk"
adb shell "rm /system/priv-app/com.amazon.tv.launcher/com.amazon.tv.launcher.apk"
adb push NewSettingsRoot.apk /sdcard/NewSettingsRoot.apk
adb shell "mkdir /system/priv-app/NewSettingsRoot/"
adb shell "chmod 0775 /system/priv-app/NewSettingsRoot/"
adb shell "chown root:root /system/priv-app/NewSettingsRoot/"
adb shell "cp /sdcard/NewSettingsRoot.apk /system/priv-app/NewSettingsRoot/NewSettingsRoot.apk"
adb shell "chmod 644 /system/priv-app/NewSettingsRoot/NewSettingsRoot.apk"
adb shell reboot
Workaround : The Settings app. Requires root
Click to expand...
Click to collapse
Works great! I'm really glad to see the last of the Amazon launcher screen. Thanks for your hard work.
TWRP Flashable Zip 1st Post.
Install launcher of your choice.
Then flash the zip.
Modified Leanbacklauncher with FireTvSettings.
Needs Root for Settings.
Will this work on the 2nd Gen sticks?
Yes it should.
Would it not be easier to just freeze pm disable com.amazon.firehomestarter and com.amazon.tv.launcher instead of deleting it? I'm using leanback launcher 1.18. I found it here on xda but I don't have the link anymore.
mrxtc89117 said:
Would it not be easier to just freeze pm disable com.amazon.firehomestarter and com.amazon.tv.launcher instead of deleting it? I'm using leanback launcher 1.18. I found it here on xda but I don't have the link anymore.
Click to expand...
Click to collapse
You can try it.
I haven't tested
Deleted some more on my Stick. See delete.txt
MarkusOnFire.apk is based on leanback launcher 1.19 .
Org. Leanback Launcher you can find here.
https://github.com/tsynik/LeanbackLauncher/releases/
Next step is to try using the stick without an amazon account and Initial Setup maybe
This is what worked for me on a fire stick 2nd gen
NewSettingsRoot.apk
adb push NewSettingsRoot.apk /sdcard/NewSettingsRoot.apk
adb shell su -c mount -o remount,rw /system
adb shell su -c mkdir /system/priv-app/NewSettingsRoot/
adb shell su -c chmod 0775 /system/priv-app/NewSettingsRoot/
adb shell su -c chown root:root /system/priv-app/NewSettingsRoot/
adb shell su -c cp /sdcard/NewSettingsRoot.apk /system/priv-app/NewSettingsRoot/NewSettingsRoot.apk
adb shell su -c chmod 644 /system/priv-app/NewSettingsRoot/NewSettingsRoot.apk
adb shell su -c mount -o remount,ro /system
adb shell su -c rm /sdcard/NewSettingsRoot.apk
adb shell pm grant com.markus.firetools android.permission.WRITE_SECURE_SETTINGS
adb shell pm grant com.amazon.tv.leanbacklauncher android.permission.WRITE_SECURE_SETTINGS
On a rooted FireTV2 (sloane) the Settings App doesn't work
If I select anything it goes back to the Home Screen!
I Flashed the zip with TWRP and also tried that Method which is discribed above, any Idea whats wrong?
Try this commands in adb shell.
su -c am start -a com.amazon.device.settings.action.APPLICATIONS -n com.amazon.tv.settings.v2/.tv.applications.ApplicationsActivity
su -c am start -a com.amazon.device.settings.action.APPS -n com.amazon.tv.settings/.tv.BuellerApplicationsSettingsActivity
su -c am start -a com.amazon.device.settings.action.MANAGE_APPLICATIONS -n com.amazon.tv.settings/com.amazon.tv.settings.tv.applications.ApplicationsActivity
su -c am start -a com.amazon.device.settings.action.MANAGE_APPLICATIONS -n com.amazon.tv.settings/com.amazon.tv.settings.tv.applications.ApplicationsActivity
Is one of them working?
If yes, i Think that i must make a New settings apk for firetv2.
This one is for 4k.
0815hoffi said:
Try this commands in adb shell.
su -c am start -a com.amazon.device.settings.action.APPLICATIONS -n com.amazon.tv.settings.v2/.tv.applications.ApplicationsActivity
su -c am start -a com.amazon.device.settings.action.APPS -n com.amazon.tv.settings/.tv.BuellerApplicationsSettingsActivity
su -c am start -a com.amazon.device.settings.action.MANAGE_APPLICATIONS -n com.amazon.tv.settings/com.amazon.tv.settings.tv.applications.ApplicationsActivity
su -c am start -a com.amazon.device.settings.action.MANAGE_APPLICATIONS -n com.amazon.tv.settings/com.amazon.tv.settings.tv.applications.ApplicationsActivity
Is one of them working?
If yes, i Think that i must make a New settings apk for firetv2.
This one is for 4k.
Click to expand...
Click to collapse
The first one works for me.
[[email protected] firestick]$ adb shell
-n com.amazon.tv.settings.v2/.tv.applications.ApplicationsActivity <
Starting: Intent { act=com.amazon.device.settings.action.APPLICATIONS cmp=com.amazon.tv.settings.v2/.tv.applications.ApplicationsActivity }
amazon.tv.settings/.tv.BuellerApplicationsSettingsActivity <
Starting: Intent { act=com.amazon.device.settings.action.APPS cmp=com.amazon.tv.settings/.tv.BuellerApplicationsSettingsActivity }
Error type 3
Error: Activity class {com.amazon.tv.settings/com.amazon.tv.settings.tv.BuellerApplicationsSettingsActivity} does not exist.
mantis:/ $
.settings/com.amazon.tv.settings.tv.applications.Application sActivity <
Starting: Intent { act=com.amazon.device.settings.action.MANAGE_APPLICATI pkg=ONS }
Error: Activity not started, unable to resolve Intent { act=com.amazon.device.settings.action.MANAGE_APPLICATI flg=0x10000000 pkg=ONS }
.settings/com.amazon.tv.settings.tv.applications.Application sActivity <
Starting: Intent { act=com.amazon.device.settings.action.MANAGE_APPLICATI pkg=ONS }
Error: Activity not started, unable to resolve Intent { act=com.amazon.device.settings.action.MANAGE_APPLICATI flg=0x10000000 pkg=ONS }
mantis:/ $
---------- Post added at 09:27 PM ---------- Previous post was at 09:20 PM ----------
0815hoffi said:
Try this commands in adb shell.
su -c am start -a com.amazon.device.settings.action.APPLICATIONS -n com.amazon.tv.settings.v2/.tv.applications.ApplicationsActivity
su -c am start -a com.amazon.device.settings.action.APPS -n com.amazon.tv.settings/.tv.BuellerApplicationsSettingsActivity
su -c am start -a com.amazon.device.settings.action.MANAGE_APPLICATIONS -n com.amazon.tv.settings/com.amazon.tv.settings.tv.applications.ApplicationsActivity
su -c am start -a com.amazon.device.settings.action.MANAGE_APPLICATIONS -n com.amazon.tv.settings/com.amazon.tv.settings.tv.applications.ApplicationsActivity
Is one of them working?
If yes, i Think that i must make a New settings apk for firetv2.
This one is for 4k.
Click to expand...
Click to collapse
Just noticed a couple of extraneous spaces in #3 & #4. Removing the spaces results in a different error.
mantis:/ $
.settings/com.amazon.tv.settings.tv.applications.Application sActivity <
Starting: Intent { act=com.amazon.device.settings.action.MANAGE_APPLICATI pkg=ONS }
Error: Activity not started, unable to resolve Intent { act=com.amazon.device.settings.action.MANAGE_APPLICATI flg=0x10000000 pkg=ONS }
MANAGE_APPLICATIONS -n com.amazon.tv.settings/com.amazon.tv.settings.tv.applic*
Starting: Intent { act=com.amazon.device.settings.action.MANAGE_APPLICATIONS cmp=com.amazon.tv.settings/.tv.applications.ApplicationsActivity }
Error type 3
Error: Activity class {com.amazon.tv.settings/com.amazon.tv.settings.tv.applications.ApplicationsActivity} does not exist.
.settings.action.MANAGE_APPLICATIONS -n com.amazon.tv.settings/com.amazon.tv.s*
Starting: Intent { act=com.amazon.device.settings.action.MANAGE_APPLICATIONS cmp=com.amazon.tv.settings/.tv.applications.ApplicationsActivity }
Error type 3
Error: Activity class {com.amazon.tv.settings/com.amazon.tv.settings.tv.applications.ApplicationsActivity} does not exist.
mantis:/ $
Yes the 1st one is for mantis an Stick2 an should work in this devices.
This command style is used for my app.
I not have a FireTV2 to test what is the correct am start command for this device
So i need any one Who can test it.
Edit:
Sry hatte das eben nur überflogen!
Also bei jedem der Befehle kommt der gleiche Fehler raus, Nr 3 und 4 sind gleich, hab dann nochmal einen Versuch gemacht ohne die 2 Leerzeichen aus 3/4, aber wieder der selbe Fehler
Code:
[email protected]:~/Downloads$ adb connect 192.168.2.51
already connected to 192.168.2.51:5555
[email protected]:~/Downloads$ adb shell su -c am start -a com.amazon.device.settings.action.APPLICATIONS -n com.amazon.tv.settings.v2/.tv.applications.ApplicationsActivity
Error type 2
android.util.AndroidException: Can't connect to activity manager; is the system running?
at com.android.commands.am.Am.onRun(Am.java:299)
at com.android.internal.os.BaseCommand.run(BaseCommand.java:47)
at com.android.commands.am.Am.main(Am.java:97)
at com.android.internal.os.RuntimeInit.nativeFinishInit(Native Method)
at com.android.internal.os.RuntimeInit.main(RuntimeInit.java:256)
[email protected]:~/Downloads$ adb shell su -c am start -a com.amazon.device.settings.action.APPS -n com.amazon.tv.settings/.tv.BuellerApplicationsSettingsActivity
Error type 2
android.util.AndroidException: Can't connect to activity manager; is the system running?
at com.android.commands.am.Am.onRun(Am.java:299)
at com.android.internal.os.BaseCommand.run(BaseCommand.java:47)
at com.android.commands.am.Am.main(Am.java:97)
at com.android.internal.os.RuntimeInit.nativeFinishInit(Native Method)
at com.android.internal.os.RuntimeInit.main(RuntimeInit.java:256)
[email protected]:~/Downloads$ adb shell su -c am start -a com.amazon.device.settings.action.MANAGE_APPLICATI ONS -n com.amazon.tv.settings/com.amazon.tv.settings.tv.applications.Application sActivity
Error type 2
android.util.AndroidException: Can't connect to activity manager; is the system running?
at com.android.commands.am.Am.onRun(Am.java:299)
at com.android.internal.os.BaseCommand.run(BaseCommand.java:47)
at com.android.commands.am.Am.main(Am.java:97)
at com.android.internal.os.RuntimeInit.nativeFinishInit(Native Method)
at com.android.internal.os.RuntimeInit.main(RuntimeInit.java:256)
[email protected]:~/Downloads$ adb shell su -c am start -a com.amazon.device.settings.action.MANAGE_APPLICATIONS -n com.amazon.tv.settings/com.amazon.tv.settings.tv.applications.ApplicationsActivity
Error type 2
android.util.AndroidException: Can't connect to activity manager; is the system running?
at com.android.commands.am.Am.onRun(Am.java:299)
at com.android.internal.os.BaseCommand.run(BaseCommand.java:47)
at com.android.commands.am.Am.main(Am.java:97)
at com.android.internal.os.RuntimeInit.nativeFinishInit(Native Method)
at com.android.internal.os.RuntimeInit.main(RuntimeInit.java:256)
So with each of the commands the same error comes out, No. 3 and 4 are the same, then I tried again without the 2 spaces from 3/4, but again the same error
0815hoffi said:
You can try it.
I haven't tested
Deleted some more on my Stick. See delete.txt
MarkusOnFire.apk is based on leanback launcher 1.19 .
Click to expand...
Click to collapse
@0815hoffi
I would be interested in how and from where you execute start the delete.txt file,
thank you
Akki67 said:
@0815hoffi
I would be interested in how and from where you execute start the delete.txt file,
thank you
Click to expand...
Click to collapse
On your Windows PC folder where the adb.exe is located.
Download cleanup.cmd.txt, rename to cleanup.cmd and run.
Hi
thank you first. Unfortunately, nothing is deleted for me, see log.
Code:
C:\adbLink>adb devices
List of devices attached
G070VM1600230K52 device
C:\adbLink>cleanup.cmd
Wait for TWRP
Drücken Sie eine beliebige Taste . . .
Debloating Amazon Apps...
rm: can't remove '/system/priv-app/android.amazon.perm': No such file or directory
rm: can't remove '/system/priv-app/com.amazon.android.marketplace': No such file or directory
rm: can't remove '/system/priv-app/com.amazon.awvflingreceiver': No such file or directory
USB cable from the PC goes directly to the FireTV4K, without a USB hub.
Or do I have to enter or install something in TWRP?

Categories

Resources