Hell, really? Well, okay. Thanks, man.as has been stated dozens of times in this thread...
you can flash the new OTA but will always have to follow the directions in the OP every time you update to remove TegraOTA to prevent the killswitch.
Hell, really? Well, okay. Thanks, man.as has been stated dozens of times in this thread...
you can flash the new OTA but will always have to follow the directions in the OP every time you update to remove TegraOTA to prevent the killswitch.
just keep in mind you do not want your tablet to connect to the internet until after you have safely removed the killswitch mechanism.
best way:
flash the update from recovery
reboot directly into recovery (to prevent possible mounting errors after the update)
flash the zip in the OP
confirm TegraOTA is gone using the recovery file manager.
boot system like normal.
enjoy!
I rather delete it directly from Solid Explorer than using the Flashable zip. In any case, since i have unlocked the bootloader, i could mount any image i want even if this is "killed"
yea but HOW do you delete tegraOTA? using what to delete it?? I have rooted my shield and there is no file manager and i cant connect to the internet to get a file manager other wise the kill switch will be enabled.
i don't have the folder /system/app/ . there're someone that have the same problem?
what can i do?
It's this in TWRP? If so you need to mount /system firsti don't have the folder /system/app/ . there're someone that have the same problem?
what can i do?
What is that random combination of letters and numbers that automatically downloaded by my tablet? Does anyone also experienced this? it is a .unity3d file. What is it? is part of the killswitch process or not? If not, why is it automatically downloading without my permission and i have no option to stop it unless i force stop the download manager, can someone enlighten me please? thank you
WTF! is it really a virus? this freaks me out. as i mentioned from my previous post it is a .unity3d file.. i just want to know if some other shield owners also experienced this auto download of a certain .unity3d file
My new tablet is still sealed in the box. That means my kill switch has not been activated yet, correct? That has not changed since I was last here 2 months ago?
getprop("ro.product.device") == "shieldtablet" || abort("This package is for \"shieldtablet\" devices; this is a \"" + getprop("ro.product.device") + "\".");
nv_copy_blob_file("blob", "/staging");
reboot_now("/dev/block/platform/sdhci-tegra.3/by-name/MSC", "");
package biz.underpants_gnomes.android.xposed.mods.nvsilentupdatekiller;
import android.content.Context;
import java.lang.reflect.Array;
import de.robv.android.xposed.IXposedHookLoadPackage;
import de.robv.android.xposed.XC_MethodHook;
import de.robv.android.xposed.XC_MethodReplacement;
import de.robv.android.xposed.XposedBridge;
import de.robv.android.xposed.XposedHelpers;
import de.robv.android.xposed.callbacks.XC_LoadPackage;
public class NVSilentUpdateKiller implements IXposedHookLoadPackage {
@Override
public void handleLoadPackage(final XC_LoadPackage.LoadPackageParam lpparam) {
if (!lpparam.packageName.equals("com.nvidia.ota"))
return;
try {
final Class<?> mClsRomInfo = XposedHelpers.findClass("com.nvidia.ota.utils.RomInfo", lpparam.classLoader);
XposedHelpers.findAndHookMethod("com.nvidia.ota.UpdateCheckService", lpparam.classLoader, "silentDownloadUpdate",
Context.class, mClsRomInfo, XC_MethodReplacement.returnConstant(null));
final Class mClsArrOfRomInfo = Array.newInstance(mClsRomInfo, 0).getClass();
XposedHelpers.findAndHookMethod("com.nvidia.ota.utils.RomInfo.FetchInfoTask", lpparam.classLoader, "onPostExecute",
mClsArrOfRomInfo, new XC_MethodHook() {
@Override
protected void beforeHookedMethod(MethodHookParam param) throws Throwable {
if ((param.args[0] == null) || (Array.getLength(param.args[0]) == 0)) { return; }
Object mRomInfo = Array.get(param.args[0], 0);
XposedHelpers.setBooleanField(mRomInfo, "urgent", false);
}
});
} catch (Throwable t) { XposedBridge.log(t); }
}
}