Hello all,
I want to remove applications that were on my phone since the beginning but I don't use them. I have Sony Xperia P and one of the apps I want to get rid of is joyn, which uses about 20% of battery although I don't use it and I also tried disabling all of its parts in settings/applications (with no luck).
I rooted my phone and tried to use adb to uninstall the app but the attempt always fails.
What I did:
C:\adb -s YT9100UAAX shell
shell#android:/ $ su
The first time on the phone, I needed to allow access to super user in SuperSU application and from now on the ABD shell is in the list of elevated applications in SuperSU.
root#android:/ # pm uninstall com.rechild.advancedtaskkiller
Success
Regular application uninstallation works fine, but when I try to uninstall something else I get:
root#android:/ # pm uninstall com.orangelabs.rcs
Failure
root#android:/ # pm uninstall com.vodafone.vodafone360updates
Failure
What am I doing wrong?
Thanks for the help
Based on corsair992's advice I downloaded Titanium Backup and I was able to uninstall everything I wanted (incl. the bloatware). Didn't know this app was so powerful!
Thx a lot corsair992
Related
I uninstalled a ton of bloatware while setting up a new Samsung Galaxy phone using command pm uninstall -k --user 0 <package-name>. All went fine except that the 'Accessibility' section under Settings menu does not open and crashes repeatedly. Not sure which package to reinstall in order to fix it. I see the packages com.samsung.accessibility and com.samsung.android.accessibility.talkback are already installed and I did not even touched them.
Already tried restarting the device. Don't want to do a factory reset cause then I have to start cleaning all over again.
Will greatly appreciate any help. TIA
Solved it!
cmd package install-existing com.samsung.android.honeyboard
Don't forget to use the -k before --user in pm uninstall -k --user 0
All that does is to prevent the system from deleting any associated data from the app, in case you want to reinstall it later without having to set everything up again.
For adb shell using Wireless Debugging method, the command should be like this :
pm install-existing --user 0 com.samsung.android.honeyboard
A few days ago I received complaints from several customers who told me that "adware is installed automatically on your device Krono NET K5". I made invesigar and found a few apk on / system / app that had different permissions to the usual "rw-r - r--". I could erase the few simple steps in a shell:
adb shell "su -c 'mount -o rw, remount /'"
adb shell "su -c 'rm /system/app/156.apk'"
adb shell "su -c 'rm /system/app/Launcher0607wxDjbOa.apk'"
adb shell "su -c 'rm /system/app/Sync.apk'"
adb shell "su -c 'rm /system/app/SettingProvider.apk'"
(Note that a suspect name as there is a apk using the system call SettingsProvider.apk with letter s)
So far everything worked properly, however there is a apk which is the main cause of all adware and causing the discharge cone apk other battery savers, system cleaners, among others. This application is:
"/system/app/providerdown.apk" Permits "rwsr-sr-x"
I tried to remove it by the above method, I tried to change the permissions to remove it and it has not worked. I tried to install a recovery to eliminate apk thence Aroma File Manager (CWM, TWRP) MTK but this device does not support any custom recovery for devices MTK.
Any idea? Thanks in advance (sorry for my bad english)
I have same problem. You will have to be rooted for this, but i guess you have root because of that code you wrote, and the fact that app somehow gains root access and installs itself in system. Only thing I did to make things easier is:
Download Avast to your phone.
Download Clean Master to your phone and with Clean master make backup of your avast apk.
Go to your stock recovery. I used an app from google store to boot to recovery but any way is good.
Clean cache and do a factory reset.
Boot the device.
DO NOT CONNECT DEVICE TO ANY NETWORK.
Just skip all the stuff like login to your google account and other settings.
Find your Avast apk in the sd card and install it.
Turn on firewall and block all acces to TimeService-that is the name that apk uses when seen from android system.
Go to android system and disable time service. It is probably version 1.1.6
You will still have malware in your device but it wont make mess anymore.
I would like the permanent solution too.
I need to uninstall some package on my Android phone. This app is not listed by the Application Manager
Using Terminal Emulator, I can see the package using pm list packages | grep com.mycompany.mypackage
However pm uninstall com.mycompany.mypackage gives me
Failed to connect to dumpstate server
Killed
Since pm sees the package I would think I am not that far.
I also tried abd uninstall com.mycompany.mypackage which just stalls at
- waiting for device -
It may be noteworthy that this package is an Android Wear App. Hence it contains a mobile app which wraps a wearable APK (which gets deployed on the wearable). For clarity I am only caring about the phone for now.
Note: Rooting the device is not an option.
Can I get rid of this package from Terminal Emulator?
I had to go adb shell on Computer --USB--> Phone, which I was trying to avoid.
Terminal Emulator clearly doesn't have the same reach as adb shell
Follow the step to enable the debug mode on your device until you get something when you run
adb devices
http://www.companionlink.com/support/kb/Enable_Android_USB_Debugging_Mode
And try again with
adb uninstall your.package.name
I'm looking to uninstall a custom watch face from a running emulator without resorting to wiping the emulator and rebooting. Which ADB commands might I send to the emulator to perform this task?
Just like any Android device, you can use adb. From a command line:
adb uninstall com.your.package.name
If multiple devices are connected, get their names with adb devices and then use:
adb -s device-name uninstall com.your.package.name
For the record, you can also delete a face from a watch as follows
Hook your host phone via usd to a computer with Android SDK
execute adb in shell mode adb shell
pm uninstall com.your.package_name
This will remove the package from the phone and the watch
Ideal for situations where you messed your APK signature leaving package name unchanged.
I have an Android-based phone (2.3.6) with unlocked root privileges.
Since i'd like to have access to my phone through my computer, today i've installed QtAdb and Android SDK.
If i open a command prompt and i do
adb shell su
i get
#
And so I am able to copy, remove, push files on my phone (on the phone i get a notification using the app "SuperSU".)
But if i launch QtAdb - under Windows 7 - i get the following error: "adbd cannot run as root in production builds". I miss something? There's something wrong with QtAdb?
The problem is that, even though your phone is rooted, the 'adbd' server on the phone does not use root permissions. You can try to bypass these checks or install a different adbd on your phone or install a custom kernel/distribution that includes a patched adbd.
Or, a much easier solution is to use 'adbd insecure' from chainfire which will patch your adbd on the fly. It's not permanent, so you have to run it before starting up the adb server (or else set it to run every boot). You can get the app from the google play store for a couple bucks:
https://play.google.com/store/apps/details?id=eu.chainfire.adbd&hl=en
Or you can get it for free, the author has posted a free version on xda-developers:
http://forum.xda-developers.com/showthread.php?t=1687590
Install it to your device (copy it to the device and open the apk file with a file manager), run adb insecure on the device, and finally kill the adb server on your computer:
% adb kill-server
And then restart the server and it should already be root.
For those who rooted the Android device with Magisk, you can install adb_root from https://github.com/evdenis/adb_root. Then adb root can run smoothly.
Use adb shell; su;
I still have not found any other solution for android 12 rooted with magisk. adb_root does not work with android 12. adbd insecure does not work for me and throws error could not patch adbd.
if anyone is still having issues, heres how i fixed it
you have to start the shell with the phone and go into the magisk app and in the superuser tab (bottom) you have to enable root access for the shell and it works!
You have to grant the Superuser right to the shell app (com.anroid.shell).
In my case, I use Magisk to root my phone Nexsus 6P (Oreo 8.1). So I can grant Superuser right in the Magisk Manager app, whih is in the left upper option menu.