OK I got lazy (or smart?) and patched the lk partition. It has the code that enables the power-on write protection from sec1-super. I changed it to sec1-tee2 and shrunk it. Then I decided I wanted boot writable, and I put sec1-lk2 and it must not have that name in the table because it just lost the entire 2nd write protection but whatever.

Here is what was write protected before:

Write Protect Groups 36-321 (Blocks 589824-5275647), Power-on Write Protection
  22          589824          593919   2.0 MiB     0700  sec1
  23          593920          594943   512.0 KiB   0700  efuse
  24          594944          726015   64.0 MiB    0700  md1img
  25          726016          758783   16.0 MiB    0700  md1dsp
  26          758784          760831   1024.0 KiB  0700  spmfw
  27          760832          762879   1024.0 KiB  0700  mcupmfw
  28          762880          795647   16.0 MiB    0700  gz1
  29          795648          828415   16.0 MiB    0700  gz2
  30          828416          832511   2.0 MiB     0700  lk
  31          832512          836607   2.0 MiB     0700  lk2
  32          836608          885759   24.0 MiB    0700  boot
  33          885760         1016831   64.0 MiB    0700  vendor_boot
  34         1016832         1033215   8.0 MiB     0700  logo
  35         1033216         1049599   8.0 MiB     0700  dtbo
  36         1049600         1051647   1024.0 KiB  0700  vbmeta
  37         1051648         1053695   1024.0 KiB  0700  vbmeta_system
  38         1053696         1055743   1024.0 KiB  0700  vbmeta_vendor
  39         1055744         1061887   3.0 MiB     0700  tee1
  40         1061888         1081343   9.5 MiB     0700  tee2
  41         1081344         5275647   2.0 GiB     0700  super
Gflip6_TF:/data/local/tmp # ./mmc writeprotect user get /dev/block/mmcblk0
Write Protect Group size in blocks/bytes: 16384/8388608
Write Protect Groups 0-1 (Blocks 0-32767), Power-on Write Protection
Write Protect Groups 2-924 (Blocks 32768-15155199), No Write Protection
Write Protect Groups 925-925 (Blocks 15155200-15171583), Permanent Write Protection
Write Protect Groups 926-931 (Blocks 15171584-15269887), No Write Protection

EDIT: File removed. Just use /vendor/bin/write_protect 0

  • flashboot flash lk lk-neutron.img
  • mount -o rw,remount /
  • rm -rf /system/app/Chromium
  • reboot. see if it's gone.

    Biden2020prez I already tried it and it works. My browser is gone after reboot. The system_root partition now shows 96M free to add other things.

    WE DID IT. I'M DONE! hah

    Woah. Neutronscott should Get another honored member badge. We never could have done this without you!
    now we just remove what we want and pull super?

      lgexalter1 putting it mildly lol. For a custom firmware, the user still wont have write permissions because he modified lk not super correct?

      i guess now we make a firmware without browser, I think Apps4flip admin May have a good idea for app integration. I may be able to get a semi functional cursor going, Ill post details when i have them.

        Biden2020prez now we just remove what we want and pull super?

        That should suffice.

        lgexalter1 This guy is genius!

        Eh if that were the case I'd have got recovery to work instead of just blowing open the doors.

        I briefly looked at Launcherv3 and it looks like it tests if the app exists on system partition. Not going to mess with that now but hopefully just putting things in system makes it show up there. I did find this setting settings put global all_app_layout_type=1 to change the Launcher to a list.

        Biden2020prez the user still wont have write permissions because he modified lk not super correct?

        If you don't flash lk, the user won't have write access.. until they flash it. If you want to distribute super without Magisk there may be some AVB things to disable yourself that Magisk does.

          neutronscott Eh if that were the case I'd have got recovery to work instead of just blowing open the doors

          i know your so dumb. Anyone could have done that.. 🙂

          that was very very sarcastic in case someone didn't realize

          Biden2020prez settings display menu layout

          Yep I am such dumb. I was trying anything in the code to see if it bypass any check but it's hard coded. Haven't actually played with many settings on the phone yet so didn't know 🤣

          lgexalter1 that's sad. Does button mapper also only support those keys?
          even if it does we can probably map a long press to toggle voice access, But it would be very disappointing if most keys cannot be mapped.
          how about mouse? I know it doesn't work, but does it recognize the star key?

          • darthLevel 6 - Platinum Elite Member

            neutronscott not working for me. I flash your lk image, reboot, adb shell, su, mount, rm, reboot and Chromium is still there. What am I doing wrong?

              • darthLevel 6 - Platinum Elite Member

                lgexalter1 Yes its strange that button mapper wont detect the extra keys. I have another app (key event display) which I used to test the buttons id number and it also wont detect the extra keys.

                  darth But if you put 17 into mouse app will it toggle?

                  darth did this work for anyone else?
                  maybe neutronscott did something that didn't work, but solved half the issue and this is the second half.

                  lgexalter1 perfect. Maybe try again darth?

                  Now about the mouse: try changing the package name of listlauncher to the package name of the browser. Launch it and does the mouse appear? How about if you click on an app?

                  i think that's how it works on the etalk. The mouse has some advantages over the virresh Like dragging, but doesn't have scroll and cant click the top or bottom of the screen.
                  Let me know if this works!

                  • darthLevel 6 - Platinum Elite Member

                    lgexalter1 I tried again still isnt working for me. What exactly did you do?

                    Has anyone pulled super and reflashed it? I have pulled it and used lpunpack to get system.img and am trying to modify the system but I was wondering if it would flash back on to the phone ok? Is there anything I need to make sure of before I flash it back?

                      darth Sounds like there is no point because we can remove system apps. I am not sure what's causing your issues maybe try a factory reset.

                      darth not working for me. I flash your lk image, reboot, adb shell, su, mount, rm, reboot and Chromium is still there. What am I doing wrong?

                      I'm not sure. Here is the mmc utility I was using: [Login to see the link]
                      Does it show only groups 0-1 as power-on write protection?

                      Gflip6_TF:/data/local/tmp # ./mmc writeprotect user get /dev/block/mmcblk0
                      Write Protect Group size in blocks/bytes: 16384/8388608
                      Write Protect Groups 0-1 (Blocks 0-32767), Power-on Write Protection
                      Write Protect Groups 2-924 (Blocks 32768-15155199), No Write Protection
                      Write Protect Groups 925-925 (Blocks 15155200-15171583), Permanent Write Protection
                      Write Protect Groups 926-931 (Blocks 15171584-15269887), No Write Protection

                        How well does voice access Click?
                        i am thinking of try options for mouse

                        1. Edit virreshs app to use the same clicking Method as voice access. I don't know how to do this but i would Take a shot if i have time.
                        2. With root maybe we can make the mouse click with adb input tap. But i don't think root is a good idea in a kosher firmware. Maybe something that uses the same trick as ladb. But that seems far off.