Hello, can you tell how could I make system.img file From a system.zip file?
I hope this helps:
Code:
So here is how you do it.
First create a directory to unzip or un-tar all the files into. I called mine system_orig
Then this is my script to build a system.img The harder part is getting the IMG file size correct. You have to watch out making it too big as the parameter file defines how big system can be. If yours is bigger than what the parameter file allows, you will need to adjust the parameter file. I believe most parameter files today allow up to 500megs.
#create the system dir
mkdir system2
# create the system image using DD. Set size here:
dd if=/dev/zero of=system.img count=471000000
#format the image you just created. This is EXT4 but you can use anything the kernel allows as defined in init.rc
sudo /sbin/mkfs.ext4 -q system.img
#Now mount it in Linux
sudo mount -o loop system.img system2
# Now copy everything from your unzipped folder into the new image.
sudo cp -r system_orig/* system2
#OK lets create all the symbolic links
#make symlinks
sudo ln -s Roboto-Bold.ttf system2/fonts/DroidSans-Bold.ttf
sudo ln -s Roboto-Regular.ttf system2/fonts/DroidSans.ttf
sudo ln -s mksh system2/bin/sh
sudo ln -s toolbox system2/bin/cat
sudo ln -s toolbox system2/bin/chmod
sudo ln -s toolbox system2/bin/chown
sudo ln -s toolbox system2/bin/cmp
sudo ln -s toolbox system2/bin/date
sudo ln -s toolbox system2/bin/dd
sudo ln -s toolbox system2/bin/df
sudo ln -s toolbox system2/bin/dmesg
sudo ln -s toolbox system2/bin/getevent
sudo ln -s toolbox system2/bin/getprop
sudo ln -s toolbox system2/bin/hd
sudo ln -s toolbox system2/bin/id
sudo ln -s toolbox system2/bin/ifconfig
sudo ln -s toolbox system2/bin/iftop
sudo ln -s toolbox system2/bin/insmod
sudo ln -s toolbox system2/bin/ioctl
sudo ln -s toolbox system2/bin/ionice
sudo ln -s toolbox system2/bin/kill
sudo ln -s toolbox system2/bin/ln
sudo ln -s toolbox system2/bin/log
sudo ln -s toolbox system2/bin/ls
sudo ln -s toolbox system2/bin/lsmod
sudo ln -s toolbox system2/bin/lsof
sudo ln -s toolbox system2/bin/md5
sudo ln -s toolbox system2/bin/mkdir
sudo ln -s toolbox system2/bin/mount
sudo ln -s toolbox system2/bin/mv
sudo ln -s toolbox system2/bin/nandread
sudo ln -s toolbox system2/bin/netstat
sudo ln -s toolbox system2/bin/newfs_msdos
sudo ln -s toolbox system2/bin/notify
sudo ln -s toolbox system2/bin/printenv
sudo ln -s toolbox system2/bin/ps
sudo ln -s toolbox system2/bin/r
sudo ln -s toolbox system2/bin/reboot
sudo ln -s toolbox system2/bin/renice
sudo ln -s toolbox system2/bin/rm
sudo ln -s toolbox system2/bin/rmdir
sudo ln -s toolbox system2/bin/rmmod
sudo ln -s toolbox system2/bin/route
sudo ln -s toolbox system2/bin/schedtop
sudo ln -s toolbox system2/bin/sendevent
sudo ln -s toolbox system2/bin/setconsole
sudo ln -s toolbox system2/bin/setprop
sudo ln -s toolbox system2/bin/sleep
sudo ln -s toolbox system2/bin/smd
sudo ln -s toolbox system2/bin/start
sudo ln -s toolbox system2/bin/stop
sudo ln -s toolbox system2/bin/sync
sudo ln -s toolbox system2/bin/top
sudo ln -s toolbox system2/bin/touch
sudo ln -s toolbox system2/bin/umount
sudo ln -s toolbox system2/bin/uptime
sudo ln -s toolbox system2/bin/vmstat
sudo ln -s toolbox system2/bin/watchprops
sudo ln -s toolbox system2/bin/wipe
#OK now lets set all the permissions
sudo chown -R 0:0 system2
sudo chmod -R 0755 system2
sudo find system2 -type d -exec chmod 0755 {} \;
sudo find system2 -type f -exec chmod 0644 {} \;
sudo chown -R 0:2000 system2/bin
sudo chmod 0755 system2/bin
sudo find system2/bin -type d -exec chmod 0755 {} \;
sudo find system2/bin -type f -exec chmod 0755 {} \;
sudo chown 0:3003 system2/bin/netcfg
sudo chmod 2750 system2/bin/netcfg
sudo chown 0:3004 system2/bin/ping
sudo chmod 2755 system2/bin/ping
sudo chown 0:2000 system2/bin/run-as
sudo chmod 6755 system2/bin/run-as
sudo chown -R 1002:1002 system2/etc/bluetooth
sudo chmod 0755 system2/etc/bluetooth
sudo find system2/etc/bluetooth -type d -exec chmod 0755 {} \;
sudo find system2/etc/bluetooth -type f -exec chmod 0440 {} \;
sudo chown 0:0 system2/etc/bluetooth
sudo chmod 0755 system2/etc/bluetooth
sudo chown 1000:1000 system2/etc/bluetooth/auto_pairing.conf
sudo chmod 0640 system2/etc/bluetooth/auto_pairing.conf
sudo chown 3002:3002 system2/etc/bluetooth/blacklist.conf
sudo chmod 0444 system2/etc/bluetooth/blacklist.conf
sudo chown 1002:1002 system2/etc/dbus.conf
sudo chmod 0440 system2/etc/dbus.conf
sudo chown 1014:2000 system2/etc/dhcpcd/dhcpcd-run-hooks
sudo chmod 0550 system2/etc/dhcpcd/dhcpcd-run-hooks
sudo chown 0:2000 system2/etc/init.goldfish.sh
sudo chmod 0550 system2/etc/init.goldfish.sh
sudo chown 0:0 system2/etc/install-recovery.sh
sudo chmod 0544 system2/etc/install-recovery.sh
sudo chown -R 0:0 system2/etc/ppp
sudo chmod -R 0755 system2/etc/ppp
sudo find system2/etc/ppp -type d -exec chmod 0755 {} \;
sudo find system2/etc/ppp -type f -exec chmod 0555 {} \;
sudo chown -R 0:2000 system2/vendor
sudo chmod -R 0755 system2/vendor
sudo find system2/vendor -type d -exec chmod 0755 {} \;
sudo find system2/vendor -type f -exec chmod 0644 {} \;
sudo chown -R 0:2000 system2/xbin
sudo chmod -R 0755 system2/xbin
sudo find system2/xbin -type d -exec chmod 0755 {} \;
sudo find system2/xbin -type f -exec chmod 0755 {} \;
sudo chown 0:0 system2/xbin/librank
sudo chmod 06755 system2/xbin/librank
sudo chown 0:0 system2/xbin/procmem
sudo chmod 06755 system2/xbin/procmem
sudo chown 0:0 system2/xbin/procrank
sudo chmod 06755 system2/xbin/procrank
sudo chown 0:0 system2/xbin/tcpdump
sudo chmod 06755 system2/xbin/tcpdump
# Note I added this to ROOT the new ROM. I simply copied in SU and Superuser and busybox.
# However if you want stock remove this area.
# Also note, some only put busybox and SU in /bin or /xbin. I usually do both.
sudo chown 0:0 system2/bin/su
sudo chmod 06755 system2/bin/su
sudo chown 0:0 system2/xbin/su
sudo chmod 06755 system2/xbin/su
sudo chown 0:0 system2/bin/busybox
sudo chmod 6755 system2/bin/busybox
sudo chown 0:0 system2/xbin/busybox
sudo chmod 6755 system2/xbin/busybox
sudo chown 0:0 system2/app/Superuser.apk
sudo chmod 6755 system2/app/Superuser.apk
# OK now lets unmount system.img
sudo umount system2
# for clean up I usually delete system2 folder.
sudo rm -f -R system2
Sorry I don't know the use of ADB. Any other easy method for Windows?
Related
Can someone please help me to undo this code so all my cache will go back to the /data?
thank you in advance
Code:
rm -R /data/data/com.android.vending/cache
mkdir /sdcard/cache/marketCache
ln -s /sdcard/cache/marketCache /data/data/com.android.vending/cache
rm -R /data/data/com.android.browser/cache/webviewCache
mkdir /sdcard/cache/webviewCache
ln -s /sdcard/cache/webviewCache /data/data/com.android.browser/cache/webviewCache
rm -R /data/data/com.google.android.street/cache
mkdir /sdcard/cache/streetCache
ln -s /sdcard/cache/streetCache /data/data/com.google.android.street/cache
jrherras said:
Can someone please help me to undo this code so all my cache will go back to the /data?
thank you in advance
Code:
rm -R /data/data/com.android.vending/cache
rm -R /sdcard/cache/marketCache
mkdir /data/data/com.android.vending/cache
rm -R /data/data/com.android.browser/cache/webviewCache
rm -R /sdcard/cache/webviewCache
mkdir /data/data/com.android.browser/cache/webviewCache
rm -R /data/data/com.google.android.street/cache
rm -R /sdcard/cache/streetCache
mkdir /data/data/com.google.android.street/cache
Click to expand...
Click to collapse
this this should be right... delete all links
make new dirs on the phone.. someone else check this..
I just followed the "cache to your sd" post but i changed my mind and I want to undo this
it worked ty
Hi,
I found a nice exploit for Xperia which works fine for Nexus one too ( the DooMLoRD exploit ).
I modified the script to flash the recovery without unlocking the bootloader, so you can flash the rom you like
The exploit works fine on Nexus one 2.3.4 GRJ22 with stock rom and locked bootloader, if you don't have a nexus one:
- remplace files/recovery.img with the right one!
- modify the line in script with the right system partition path.
here's the linux script to do the trick :
2shared.com/file/4uu5h2NH/zergRush_automated_Linux_roott.html
i'm sure someone will port it to windows
NB : backup data, and apps, when you flash a new rom, all data are deleted ( except SD Card).
Automatic installation using the script :
tar -xjvf zergRush_automated_Linux_root.tar.bz2
cd zergRush_automated_Linux_root/
chmod a+x runme-linux
sudo ./runme-linux
Manual installation :
tar -xjvf zergRush_automated_Linux_root.tar.bz2
cd zergRush_automated_Linux_root/
./files/adb kill-server
./files/adb wait-for-device
./files/adb shell rm -r /data/local/tmp
./files/adb shell mkdir /data/local/tmp
./files/adb push ./files/zergRush /data/local/tmp/
./files/adb shell chmod 755 /data/local/tmp/zergRush
./files/adb shell /data/local/tmp/zergRush
./files/adb wait-for-device
./files/adb push ./files/busybox /data/local/tmp
./files/adb shell chmod 755 /data/local/tmp/busybox
./files/adb shell /data/local/tmp/busybox mount -o remount,rw /system
./files/adb push files/busybox /system/xbin
./files/adb shell chown root.shell /system/xbin/busybox
./files/adb shell chmod 04755 /system/xbin/busybox
./files/adb shell /system/xbin/busybox --install -s /system/xbin
./files/adb shell rm -r /data/local/tmp/busybox
./files/adb push ./files/su /system/bin/su
./files/adb shell chown root.shell /system/bin/su
./files/adb shell chmod 06755 /system/bin/su
./files/adb shell rm /system/xbin/su
./files/adb shell ln -s /system/bin/su /system/bin/su
./files/adb push files/Superuser.apk /system/app/
./files/adb shell rm -r /data/local/tmp
./files/adb push files/flash_image /data/flash_image
./files/adb shell chmod 755 /data/flash_image
./files/adb push files/recovery.img /data/recovery.img
./files/adb shell /data/flash_image recovery /data/recovery.img
./files/adb shell rm /data/flash_image
./files/adb reboot recovery
In less than a minute, your phone will reboot to amonRA recovery, flash the rom you want, and Enjoy!
This was missing in all batch files I stumbled on. As I have not posted 10 times I thought to place it here to increase awareness.
http://forum.xda-developers.com/showpost.php?p=21308895&postcount=53
So correct batch file is:
Code:
@echo ---------------------------------------------------------------
@echo Easy rooting toolkit for Transformer Prime!
@echo Script by Max Lee from TransformerPrimeRoot.com
@echo Credits go to XDA users sparkym3 and Dan Rosenburg for exploit.
@echo ---------------------------------------------------------------
@echo [*] This script will:
@echo (1) root your Transformer Prime on ICS
@echo (2) install Busybox
@echo (3) install SU files
@echo [*] Before u begin:
@echo (4) Make sure to read full instructions at TransformerPrimeRoot.com!
@echo ---------------------------------------------------------------
@echo CONFIRM ALL THE ABOVE THEN
@echo Please hit Enter when ready.
@pause
@echo Rooting...
@adb wait-for-device
@echo Start Rooting...
@adb shell mv /data/local/tmp /data/local/tmp.bak
@adb shell ln -s /data /data/local/tmp
@adb reboot
@echo reboot #1 - DO NOT DISCONNECT YOUR DEVICE!
@PING 1.1.1.1 -n 1 -w 5000 >NUL
@adb wait-for-device
@adb shell rm /data/local.prop
@adb shell "echo \"ro.kernel.qemu=1\" > /data/local.prop"
@adb reboot
@echo reboot #2 - DO NOT DISCONNECT YOUR DEVICE!
@PING 1.1.1.1 -n 1 -w 5000 >NUL
@adb wait-for-device
@adb remount
@PING 1.1.1.1 -n 1 -w 1000 >NUL
@adb push su /system/bin/su
@adb shell "chown root.shell /system/bin/su"
@adb shell "chmod 06755 /system/bin/su"
@adb shell "rm /system/xbin/su"
@adb shell "ln -s /system/bin/su /system/xbin/su"
@adb push Superuser.apk /system/app/.
@adb shell rm /data/local.prop
@adb shell rm /data/local/tmp
@adb shell mv /data/local/tmp.bak /data/local/tmp
@adb push busybox /data/local/tmp/.
@adb shell "chmod 755 /data/local/tmp/busybox"
@adb shell "/data/local/tmp/busybox mount -o remount,rw /system"
@adb shell "dd if=/data/local/tmp/busybox of=/system/xbin/busybox"
@adb shell "chown root.shell /system/xbin/busybox"
@adb shell "chmod 04755 /system/xbin/busybox"
@adb shell "/system/xbin/busybox --install -s /system/xbin"
@adb shell "rm -r /data/local/tmp/busybox"
@echo rebooting
@adb reboot
@echo All Done rooting Transformer Prime, check out TransformerPrimeRoot.com for more cool stuff!
@pause
Do I need to explain what a permission fixer script is supposed to do?
It fixes all the permissions (currently only for /system) and removes some knox bloatware folders along the way.
Root and busybox is required.
---
NOTE: This is the first step for a "rom installer script".
Please let me know if you find any errors or want any folders added to the additional permission fixes.
Or if you know any enhancements too off course.
There might be some redundancy within the script, but I wanted to better be safe
---.
So here it goes (download attached below):
Copy it to wherever you like and make it runnable (chmod 755) to execute.
I just copied it to my /system/xbin folder so I just have to type "fix_permissions.sh" when I want to fix em.
(could even get rid of the ".sh" to get the fix_permission command back kind of)
Code:
#!/system/bin/sh
echo
echo zro\'s ultimate permission fixer script v1.0
echo ============================================
echo
echo Step 1: Mounting /system writable
echo ---------------------------------
mount -o rw,remount /system
# >>> STOCK PERMISSIONS >>>
echo
echo Step 2: Fixing stock permissions
echo --------------------------------
# /system
echo fixing permissions for /system
busybox chown 0.0 /system
busybox chown 0.0 /system/*
busybox chown 0.2000 /system/bin
busybox chown 0.2000 /system/vendor
busybox chown 0.2000 /system/xbin
busybox chmod 755 /system/*
find /system -type f -maxdepth 1 -exec busybox chmod 644 {} \;
# /system/app
echo fixing permissions for /system/app
busybox chown 0.0 /system/app/*
busybox chmod 644 /system/app/*
# /system/cameradata
echo fixing permissions for /system/cameradata
busybox chown -R 0.0 /system/cameradata
find /system/cameradata \( -type d -exec busybox chmod 755 {} + \) -o \( -type f -exec busybox chmod 644 {} + \)
# /system/bin
echo fixing permissions for /system/bin
busybox chmod 755 /system/bin/*
busybox chown 0.2000 /system/bin/*
busybox chown -h 0.2000 /system/bin/*
busybox chown 0.0 /system/bin/log /system/bin/ping /system/bin/sysinit
busybox chmod 777 /system/bin/log
busybox chown 0.3003 /system/bin/netcfg
busybox chmod 2750 /system/bin/netcfg
busybox chmod 750 /system/bin/run-as
busybox chown 0.0 /system/bin/su
busybox chmod 6755 /system/bin/su
busybox chown 0.0 /system/bin/daemonsu
busybox chmod 6755 /system/bin/daemonsu
# /system/containers - Knox Bloatware (will be removed)
echo fixing permissions for /system/containers - Knox Bloatware - will be removed
rm -r /system/containers
# /system/csc
echo fixing permissions for /system/csc
busybox chown -R 0.0 /system/csc
find /system/csc \( -type d -exec busybox chmod 755 {} + \) -o \( -type f -exec busybox chmod 644 {} + \)
# /system/etc
echo fixing permissions for /system/etc
busybox chown -R 0.0 /system/etc
find /system/etc \( -type d -exec busybox chmod 755 {} + \) -o \( -type f -exec busybox chmod 644 {} + \)
busybox chown 0.2000 /system/etc/init.goldfish.sh
busybox chmod 550 /system/etc/init.goldfish.sh
busybox chmod 664 /system/etc/boot_fixup
busybox chown 1014.2000 /system/etc/dhcpcd/dhcpcd-run-hooks
busybox chmod 550 /system/etc/dhcpcd/dhcpcd-run-hooks
busybox chmod 755 /system/etc/init.d/*
busybox chmod 6755 /system/etc/install-recovery.sh
# /system/finder_cp
echo fixing permissions for /system/finder_cp
busybox chown 0.0 /system/finder_cp/*
busybox chmod 644 /system/finder_cp/*
# /system/fonts
echo fixing permissions for /system/fonts
busybox chown 0.0 /system/fonts/*
busybox chmod 644 /system/fonts/*
# /system/framework
echo fixing permissions for /system/framework
busybox chown 0.0 /system/framework/*
busybox chmod 644 /system/framework/*
# /system/lib
echo fixing permissions for /system/lib
busybox chown -R 0:0 /system/lib
find /system/lib \( -type d -exec busybox chmod 755 {} + \) -o \( -type f -exec busybox chmod 644 {} + \)
# /system/media
echo fixing permissions for /system/media
busybox chown -R 0:0 /system/media
find /system/media \( -type d -exec busybox chmod 755 {} + \) -o \( -type f -exec busybox chmod 644 {} + \)
# /system/preloadedkiosk - Bloatware (will be removed)
echo fixing permissions for /system/preloadedkiosk - Bloatware - will be removed
rm -r /system/preloadedkiosk
# /system/preloadedsso - Knox Bloatware (will be removed)
echo fixing permissions for /system/preloadedsso - Knox Bloatware - will be removed
rm -r /system/preloadedsso
# /system/sipdb
echo fixing permissions for /system/sipdb
busybox chown 0.0 /system/sipdb/*
busybox chmod 655 /system/sipdb/*
# /system/tts
echo fixing permissions for /system/tts
busybox chown -R 0:0 /system/tts
find /system/tts \( -type d -exec busybox chmod 755 {} + \) -o \( -type f -exec busybox chmod 644 {} + \)
# /system/usr
echo fixing permissions for /system/usr
busybox chown -R 0:0 /system/usr
find /system/usr \( -type d -exec busybox chmod 755 {} + \) -o \( -type f -exec busybox chmod 644 {} + \)
# /system/vendor
echo fixing permissions for /system/vendor
find /system/vendor \( -type d -exec busybox chown 0.2000 {} + \) -o \( -type f -exec busybox chown 0.0 {} + \)
find /system/vendor \( -type d -exec busybox chmod 755 {} + \) -o \( -type f -exec busybox chmod 644 {} + \)
# /system/voicebargeindata
echo fixing permissions for /system/voicebargeindata
busybox chown -R 0:0 /system/voicebargeindata
find /system/voicebargeindata \( -type d -exec busybox chmod 755 {} + \) -o \( -type f -exec busybox chmod 644 {} + \)
# /system/vold
echo fixing permissions for /system/vold
busybox chown 0.0 /system/vold/*
busybox chmod 644 /system/vold/*
# /system/wakeupdata
echo fixing permissions for /system/wakeupdata
busybox chown -R 0:0 /system/wakeupdata
find /system/wakeupdata \( -type d -exec busybox chmod 755 {} + \) -o \( -type f -exec busybox chmod 644 {} + \)
# /system/wallpaper
echo fixing permissions for /system/wallpaper
busybox chown 0.0 /system/wallpaper/*
busybox chmod 644 /system/wallpaper/*
# /system/xbin
echo fixing permissions for /system/xbin
busybox chmod 755 /system/xbin/*
busybox chown 0.2000 /system/xbin/*
busybox chown -h 0.2000 /system/xbin/*
busybox chown 0.0 /system/xbin/su
busybox chmod 6755 /system/xbin/su
busybox chown 0.0 /system/xbin/daemonsu
busybox chmod 6755 /system/xbin/daemonsu
# <<< STOCK PERMISSIONS END <<<
# ==============================
# >>> ADDITIONAL PERMISSIONS >>>
echo
echo Step 3: Fixing additional permissions
echo -------------------------------------
# /system/photoreader
echo fixing permissions for /system/photoreader
busybox chown -R 0.2000 /system/photoreader/*
find /system/photoreader/ \( -type d -exec busybox chmod 755 {} + \) -o \( -type f -exec busybox chmod 644 {} + \)
# <<< ADDITIONAL PERMISSIONS END <<<
RESERVED
zroice said:
RESERVED
Click to expand...
Click to collapse
Thanks for this, just what is was needing on my N3...
The thing is, I cannot boot the system... can you help me to run it on CWM recovery? Maybe converting it into a 'flashable script'?
this stuff is old - the kn0x0ut toolbox includes the current version of the fix permission script.
This should also work over adb on recovery. But you need some adb skills.
zroice said:
...
There might be some redundancy within the script, but I wanted to better be safe
...
Click to expand...
Click to collapse
I wonder if (for max safety) you might need to add selinux refresh stuff in some places?
Hello,
i used debloating to get rid of some apps i dont want. But i removed something that is used for the "hey google" function. I cant activate it in the google app now too anymore.
Can someone tell me what i need to reinstall?
Things i removed:
Code:
adb -s 0c7ef144 shell rm -r /system/app/BackupRestoreRemoteService
adb -s 0c7ef144 shell rm -r /system/app/BasicDreams
adb -s 0c7ef144 shell rm -r /system/app/BookmarkProvider
adb -s 0c7ef144 shell rm -r /system/app/FBAppmanager
adb -s 0c7ef144 shell rm -r /system/app/GoogleAssistant
adb -s 0c7ef144 shell rm -r /system/app/GooglePrintRecommendationService
adb -s 0c7ef144 shell rm -r /system/app/netflix-activation
adb -s 0c7ef144 shell rm -r /system/app/netflix-stub
adb -s 0c7ef144 shell rm -r /system/app/OPFilemanager
adb -s 0c7ef144 shell rm -r /system/app/PartnerBookmarksProvider
adb -s 0c7ef144 shell rm -r /system/app/PlayAutoInstallConfig
adb -s 0c7ef144 shell rm -r /system/app/YTMusic
adb -s 0c7ef144 shell rm -r /system/priv-app/BackupRestoreConfirmation
adb -s 0c7ef144 shell rm -r /system/priv-app/FBInstaller
adb -s 0c7ef144 shell rm -r /system/priv-app/FBServices
adb -s 0c7ef144 shell rm -r /system/priv-app/SharedStorageBackup
adb -s 0c7ef144 shell rm -r /system/priv-app/TagGoogle
adb -s 0c7ef144 shell rm -r /system/product/app/CalendarGoogle
adb -s 0c7ef144 shell rm -r /system/product/app/Chrome
adb -s 0c7ef144 shell rm -r /system/product/app/Drive
adb -s 0c7ef144 shell rm -r /system/product/app/Duo
adb -s 0c7ef144 shell rm -r /system/product/app/Gmail2
adb -s 0c7ef144 shell rm -r /system/product/app/GoogleLocationHistory
adb -s 0c7ef144 shell rm -r /system/product/app/GooglePayIndia
adb -s 0c7ef144 shell rm -r /system/product/app/GooglePay
adb -s 0c7ef144 shell rm -r /system/product/app/GoogleTTS
adb -s 0c7ef144 shell rm -r /system/product/app/Maps
adb -s 0c7ef144 shell rm -r /system/product/app/Photos
adb -s 0c7ef144 shell rm -r /system/product/app/talkback
adb -s 0c7ef144 shell rm -r /system/product/app/Videos
adb -s 0c7ef144 shell rm -r /system/product/app/Nearme
adb -s 0c7ef144 shell rm -r /system/product/app/YouTube
adb -s 0c7ef144 shell rm -r /system/product/priv-app/AndroidAutoStub
adb -s 0c7ef144 shell rm -r /system/product/priv-app/GoogleFeedback
adb -s 0c7ef144 shell rm -r /system/product/priv-app/OobConfig
adb -s 0c7ef144 shell rm -r /system/product/priv-app/GoogleOneTimeInitializer
adb -s 0c7ef144 shell rm -r /system/product/priv-app/GooglePartnerSetup
adb -s 0c7ef144 shell rm -r /system/product/priv-app/GoogleRestore
adb -s 0c7ef144 shell rm -r /system/product/priv-app/SetupWizard
adb -s 0c7ef144 shell rm -r /system/product/priv-app/Turbo
adb -s 0c7ef144 shell rm -r /system/product/priv-app/Wellbeing
adb -s 0c7ef144 shell rm -r /system/product/priv-app/Velvet
adb -s 0c7ef144 shell rm -r /system/reserve/Audible
adb -s 0c7ef144 shell rm -r /system/reserve/GameCenter
adb -s 0c7ef144 shell rm -r /system/reserve/AmazonShoppingMDIP
adb -s 0c7ef144 shell rm -r /system/reserve/AudibleMDIP
adb -s 0c7ef144 shell rm -r /system/reserve/card
adb -s 0c7ef144 shell rm -r /system/reserve/facebook-localapk-stub
adb -s 0c7ef144 shell rm -r /system/reserve/instagram-localapk-stub
adb -s 0c7ef144 shell rm -r /system/reserve/Kindle
adb -s 0c7ef144 shell rm -r /system/reserve/messenger-localapk-stub
adb -s 0c7ef144 shell rm -r /system/reserve/OPBackupRestore
adb -s 0c7ef144 shell rm -r /system/reserve/OPForum
adb -s 0c7ef144 shell rm -r /system/reserve/OPIconpackOnePlusH2
adb -s 0c7ef144 shell rm -r /system/reserve/OPIconpackOnePlusO2
adb -s 0c7ef144 shell rm -r /system/reserve/OPNote
adb -s 0c7ef144 shell rm -r /system/reserve/OPSports
adb -s 0c7ef144 shell rm -r /system/reserve/PrimeVideo
adb -s 0c7ef144 shell rm -r /system/reserve/OPWidget
adb -s 0c7ef144 shell rm -r /system/reserve/SoundRecorder
adb -s 0c7ef144 shell rm -r /system/reserve/Weather
adb -s 0c7ef144 shell rm -r /system/app/OPPush
adb -s 0c7ef144 shell rm -r /system/app/BTtestmode
adb -s 0c7ef144 shell rm -r /system/app/CarrierDefaultApp
adb -s 0c7ef144 shell rm -r /system/app/CtsShimPrebuilt
adb -s 0c7ef144 shell rm -r /system/app/EngineeringMode
adb -s 0c7ef144 shell rm -r /system/app/EngSpecialTest
adb -s 0c7ef144 shell rm -r /system/app/LogKitSdService
adb -s 0c7ef144 shell rm -r /system/app/NFCTestMode
adb -s 0c7ef144 shell rm -r /system/app/NVBackupUI
adb -s 0c7ef144 shell rm -r /system/app/oem_tcma
adb -s 0c7ef144 shell rm -r /system/app/OemAutoTestServer
adb -s 0c7ef144 shell rm -r /system/app/OEMLogKit
adb -s 0c7ef144 shell rm -r /system/app/OPBackup
adb -s 0c7ef144 shell rm -r /system/app/OPCommonLogTool
adb -s 0c7ef144 shell rm -r /system/app/OPBugReportLite
adb -s 0c7ef144 shell rm -r /system/app/OPFilemanager
adb -s 0c7ef144 shell rm -r /system/app/OPGeoIpTime
adb -s 0c7ef144 shell rm -r /system/app/OPYellowpage
adb -s 0c7ef144 shell rm -r /system/app/PhotosOnline
adb -s 0c7ef144 shell rm -r /system/priv-app/CtsShimPrivPrebuilt
adb -s 0c7ef144 shell rm -r /system/app/Rftoolkit
adb -s 0c7ef144 shell rm -r /system/app/SensorTestTool
adb -s 0c7ef144 shell rm -r /system/app/SmscPlugger
adb -s 0c7ef144 shell rm -r /system/app/SoterService
adb -s 0c7ef144 shell rm -r /system/app/Stk
adb -s 0c7ef144 shell rm -r /system/app/OPSesAuthentication
adb -s 0c7ef144 shell rm -r /system/app/Traceur
adb -s 0c7ef144 shell rm -r /system/app/OPTelephonyCollectionData
adb -s 0c7ef144 shell rm -r /system/priv-app/IFAAService
adb -s 0c7ef144 shell rm -r /system/priv-app/OnePlusWizard
adb -s 0c7ef144 shell rm -r /system/priv-app/OPCellBroadcastReceiver
adb -s 0c7ef144 shell rm -r /system/priv-app/OPDeviceManagerProvider
adb -s 0c7ef144 shell rm -r /system/priv-app/OPDeviceManager
adb -s 0c7ef144 shell rm -r /system/priv-app/OPSimContacts
adb -s 0c7ef144 shell rm -r /system/product/app/PowerOffAlarm
adb -s 0c7ef144 shell rm -r /system/product/app/TmoEngMode
adb -s 0c7ef144 shell rm -r /system/product/app/Nearme
adb -s 0c7ef144 shell rm -r /system/reserve/Audible
adb -s 0c7ef144 shell rm -r /system/reserve/AmazonShoppingMDIP
adb -s 0c7ef144 shell rm -r /system/reserve/AudibleMDIP
adb -s 0c7ef144 shell rm -r /system/reserve/card
adb -s 0c7ef144 shell rm -r /system/reserve/facebook-localapk-stub
adb -s 0c7ef144 shell rm -r /system/reserve/instagram-localapk-stub
adb -s 0c7ef144 shell rm -r /system/reserve/Kindle
adb -s 0c7ef144 shell rm -r /system/reserve/messenger-localapk-stub
adb -s 0c7ef144 shell rm -r /system/reserve/OPBackupRestore
adb -s 0c7ef144 shell rm -r /system/reserve/OPForum
adb -s 0c7ef144 shell rm -r /system/reserve/GameCenter
adb -s 0c7ef144 shell rm -r /system/reserve/OPIconpackOnePlusH2
adb -s 0c7ef144 shell rm -r /system/reserve/OPIconpackOnePlusO2
adb -s 0c7ef144 shell rm -r /system/reserve/OPNote
adb -s 0c7ef144 shell rm -r /system/reserve/OPSports
adb -s 0c7ef144 shell rm -r /system/reserve/PrimeVideo
adb -s 0c7ef144 shell rm -r /system/reserve/OPWidget
adb -s 0c7ef144 shell rm -r /system/reserve/SoundRecorder
adb -s 0c7ef144 shell rm -r /system/reserve/Weather
adb -s 0c7ef144 shell rm -r /system/priv-app/DynamicSystemInstallationService
adb -s 0c7ef144 shell rm -r /system/product/app/DynamicDDSService
adb -s 0c7ef144 shell rm -r /system/app/OPBackup
For sure you need
Code:
GoogleAssistant
that is what Hey Google triggers.
For Google to talk back to you, you might need
Code:
GoogleTTS
I would only add that back if you can't hear Google's replies.
Hey! Did you try updating Google?