2018-02-11 23:50:18 -05:00
|
|
|
#!/bin/bash
|
2024-04-22 07:48:54 -04:00
|
|
|
#DivestOS: A mobile operating system divested from the norm.
|
|
|
|
#Copyright (c) 2017-2023 Divested Computing Group
|
2018-02-11 23:50:18 -05:00
|
|
|
#
|
|
|
|
#This program is free software: you can redistribute it and/or modify
|
2024-07-27 18:00:56 -04:00
|
|
|
#it under the terms of the GNU Affero General Public License as published by
|
2018-02-11 23:50:18 -05:00
|
|
|
#the Free Software Foundation, either version 3 of the License, or
|
|
|
|
#(at your option) any later version.
|
|
|
|
#
|
|
|
|
#This program is distributed in the hope that it will be useful,
|
|
|
|
#but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
#MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
2024-07-27 18:00:56 -04:00
|
|
|
#GNU Affero General Public License for more details.
|
2018-02-11 23:50:18 -05:00
|
|
|
#
|
2024-07-27 18:00:56 -04:00
|
|
|
#You should have received a copy of the GNU Affero General Public License
|
2024-07-27 18:31:21 -04:00
|
|
|
#along with this program. If not, see <https://www.gnu.org/licenses/>.
|
2021-10-16 19:15:19 -04:00
|
|
|
umask 0022;
|
2021-10-16 15:28:15 -04:00
|
|
|
set -uo pipefail;
|
2021-10-16 19:15:19 -04:00
|
|
|
source "$DOS_SCRIPTS_COMMON/Shell.sh";
|
2018-02-11 23:50:18 -05:00
|
|
|
|
|
|
|
#Goal: Remove as many proprietary blobs without breaking core functionality
|
|
|
|
#Outcome: Increased battery/performance/privacy/security, Decreased ROM size
|
|
|
|
#TODO: Clean init*.rc files, Modularize, Remove more variants
|
|
|
|
|
2020-08-29 16:03:11 -04:00
|
|
|
echo "Deblobbing...";
|
2018-02-11 23:50:18 -05:00
|
|
|
|
|
|
|
#
|
|
|
|
#START OF BLOBS ARRAY
|
|
|
|
#
|
|
|
|
#WARNING: STRAY DELIMITERS WILL RESULT IN FILE DELETIONS
|
|
|
|
blobs=""; #Delimited using "|"
|
|
|
|
makes="";
|
2022-04-28 22:43:09 -04:00
|
|
|
manifests="";
|
2021-01-18 07:11:54 -05:00
|
|
|
overlay="invalid_placeholder_aekiekan";
|
2018-08-24 18:35:53 -04:00
|
|
|
ipcSec="";
|
2018-02-11 23:50:18 -05:00
|
|
|
kernels=""; #Delimited using " "
|
|
|
|
|
2019-03-22 19:35:28 -04:00
|
|
|
#ACDB (Audio Calibration DataBase) [Qualcomm] XXX: Breaks audio output
|
|
|
|
#blobs=$blobs".*.acdb|florida.*.bin"; #databases
|
|
|
|
#blobs=$blobs"|libacdb.*.so|libaditrtac.so|libaudcal.so"; #loaders
|
2018-02-11 23:50:18 -05:00
|
|
|
|
2018-07-01 00:34:34 -04:00
|
|
|
#ADSP/Hexagon (Hardware Digital Signal Processor) [Qualcomm]
|
2019-03-23 17:33:39 -04:00
|
|
|
#blobs=$blobs"[/]adsp[/]|.*adspd.*|.*adsprpc.*";
|
|
|
|
#blobs=$blobs"|libfastcvadsp_stub.so|libfastcvopt.so|libadsp.*.so|libscve.*.so";
|
2018-02-11 23:50:18 -05:00
|
|
|
|
2022-05-09 14:37:22 -04:00
|
|
|
#IFAA (???) [Qualcomm/OnePlus?]
|
2019-03-23 17:33:39 -04:00
|
|
|
blobs=$blobs"ifaadaemon|ifaadaemonProxy";
|
2020-02-17 18:06:39 -05:00
|
|
|
blobs=$blobs"|IFAAService.apk";
|
|
|
|
blobs=$blobs"|vendor.oneplus.hardware.ifaa.*";
|
2023-07-22 15:03:58 -04:00
|
|
|
makes=$makes"org.ifaa.android.manager|IFAAService";
|
2022-05-09 14:37:22 -04:00
|
|
|
manifests=$manifests"hardware.ifaa";
|
|
|
|
|
|
|
|
#Alipay (Payment Platform) [Alibaba]
|
|
|
|
blobs=$blobs"|alipay.*";
|
|
|
|
manifests=$manifests"|alipay";
|
|
|
|
|
|
|
|
#Mlipay (Payment Platform) [Xiaomi]
|
|
|
|
blobs=$blobs"|mlipayd.*";
|
|
|
|
blobs=$blobs"|libmlipay.*.so";
|
|
|
|
blobs=$blobs"|vendor.xiaomi.hardware.mlipay.*";
|
|
|
|
manifests=$manifests"|mlipay";
|
2019-03-23 12:49:58 -04:00
|
|
|
|
|
|
|
#AIV (DRM) [Amazon]
|
|
|
|
blobs=$blobs"|libaivdrmclient.so|libAivPlay.so";
|
2018-02-11 23:50:18 -05:00
|
|
|
|
2019-10-29 01:41:33 -04:00
|
|
|
#ANT (Wireless)
|
|
|
|
blobs=$blobs"|libantradio.so";
|
2020-02-19 22:07:57 -05:00
|
|
|
#blobs=$blobs"|com.qualcomm.qti.ant.*";
|
2020-02-17 18:06:39 -05:00
|
|
|
makes=$makes"|AntHalService|com.dsi.ant.antradio_library";
|
2022-04-28 22:43:09 -04:00
|
|
|
manifests=$manifests"|AntHci";
|
2019-10-29 01:41:33 -04:00
|
|
|
|
2018-02-11 23:50:18 -05:00
|
|
|
#aptX (Bluetooth Audio Compression Codec) [Qualcomm]
|
2022-02-21 23:30:45 -05:00
|
|
|
if [ "$DOS_DEBLOBBER_REMOVE_APTX" = true ]; then
|
|
|
|
blobs=$blobs"|.*aptX.*|libbt-aptx.*.so";
|
|
|
|
blobs=$blobs"|aptxui.apk";
|
2023-07-22 15:03:58 -04:00
|
|
|
#makes=$makes"|aptxui";
|
2022-02-21 23:30:45 -05:00
|
|
|
fi;
|
2018-02-11 23:50:18 -05:00
|
|
|
|
2018-08-24 23:56:38 -04:00
|
|
|
#AT Command Handling/Forwarding (See: https://atcommands.org)
|
2020-11-02 19:13:32 -05:00
|
|
|
blobs=$blobs"|bin[/]atd|drexe|log_serial_arm|at_distributor|connfwexe";
|
|
|
|
blobs=$blobs"|OBDM_Permissions.apk";
|
2021-10-23 15:19:51 -04:00
|
|
|
if [ "$DOS_DEBLOBBER_REMOVE_ATFWD" = true ]; then
|
2022-02-03 21:12:02 -05:00
|
|
|
blobs=$blobs"|ATFWD-daemon|atfwd_daemon";
|
2021-10-23 15:19:51 -04:00
|
|
|
blobs=$blobs"|vendor.qti.atcmdfwd.*|vendor.qti.hardware.radio.atcmdfwd.*";
|
|
|
|
blobs=$blobs"|atfwd.apk";
|
2023-07-22 15:03:58 -04:00
|
|
|
#makes=$makes"|atfwd";
|
2022-04-28 22:43:09 -04:00
|
|
|
manifests=$manifests"|AtCmdFwd";
|
2021-10-23 15:19:51 -04:00
|
|
|
fi;
|
2018-02-11 23:50:18 -05:00
|
|
|
|
2019-03-23 12:49:58 -04:00
|
|
|
#AudioFX (Audio Effects)
|
2018-06-30 14:49:22 -04:00
|
|
|
if [ "$DOS_DEBLOBBER_REMOVE_AUDIOFX" = true ]; then
|
2019-03-23 17:33:39 -04:00
|
|
|
blobs=$blobs"|fmas_eq.dat";
|
2021-10-23 15:19:51 -04:00
|
|
|
blobs=$blobs"|libasphere.so|libdownmix.so|libeffectproxy.so|libfmas.so|libldnhncr.so|libmmieffectswrapper.so|libreverbwrapper.so|libshoebox.so|libvisualizer.so|libvolumelistener.so|libLifevibes_lvverx.so|libLifevibes_lvvetx.so|libdynproc.so";
|
2020-10-11 19:22:14 -04:00
|
|
|
#blobs=$blobs"|libspeakerbundle.so|libmotaudioutils.so"; #XXX: Breaks audio on Motorola devices (?)
|
2019-03-23 17:33:39 -04:00
|
|
|
blobs=$blobs"|libqcbassboost.so|libqcreverb.so|libqcvirt.so"; #Qualcomm
|
2021-10-23 15:19:51 -04:00
|
|
|
#blobs=$blobs"|libbundlewrapper.so|libqcompostprocbundle.so|libqcomvoiceprocessing.so|libqcomvoiceprocessingdescriptors.so|libqcomvisualizer.so|libqtiautobundle.so";
|
|
|
|
blobs=$blobs"|libhwdap.so|libhwdap.*.so|libswdap.*.so|lib_dlb_msd.so|vendor.dolby.hardware.dms.*"; #Dolby
|
2019-03-23 17:33:39 -04:00
|
|
|
blobs=$blobs"|libsonypostprocbundle.so|libsonysweffect.so"; #Sony
|
2018-06-30 14:49:22 -04:00
|
|
|
fi;
|
2018-02-11 23:50:18 -05:00
|
|
|
|
|
|
|
#Clearkey (DRM) [Google]
|
2022-04-28 22:43:09 -04:00
|
|
|
blobs=$blobs"|libdrmclearkeyplugin.so";
|
|
|
|
makes=$makes"|android.hardware.drm.*clearkey.*|libdrmclearkeyplugin";
|
|
|
|
manifests=$manifests"|clearkey";
|
2018-02-11 23:50:18 -05:00
|
|
|
|
2019-10-11 13:29:04 -04:00
|
|
|
#CMN (?) [?]
|
2019-09-03 17:42:03 -04:00
|
|
|
#blobs=$blobs"|cmnlib.*";
|
2018-02-11 23:50:18 -05:00
|
|
|
|
Many fixes to get bluejay booting & working proper
- Enable APEX for Pixel 6/7, necessary for camera and pKVM
- Also drop hack removing pKVM for Pixel 6/7
- patch from GrapheneOS
- Extend hmalloc workaround to /apex
- Deblobber:
- actually handle wildcard f/w/b overlays
- move some stuff around
- remove some more Pixel blobs
- flag and disable removal of camera extensions, being able to use the second camera is nice
- Adjust what hardenDefconfig disables, caused boot issues
minimal impact as most of these are already default-disabled
can be narrowed down in future
- Disable some of the bionic hardening patches, causing more boot issues
annoying to lose, but having a phone that boots is more important
- Add LTE only mode to 17.1, 18.1, 19.1, and 20.0, credit GrapheneOS
- Remove Pixel 2 ramdisk compression reverts, fixed upstream
And yes, I know I should've split up this commit...
Signed-off-by: Tad <tad@spotco.us>
2022-12-23 22:00:31 -05:00
|
|
|
#CNE (VoWiFi) [Qualcomm]
|
2020-11-02 19:13:32 -05:00
|
|
|
if [ "$DOS_DEBLOBBER_REMOVE_CNE" = true ]; then
|
|
|
|
#blobs=$blobs"|libcneapiclient.so|libNimsWrap.so|com.quicinc.cne.*.so"; #XXX: Breaks radio
|
|
|
|
blobs=$blobs"|andsfCne.xml|ATT_profile.*.xml|cneapiclient.xml|com.quicinc.cne.xml|ConnectivityExt.xml|profile1.xml|profile2.xml|profile3.xml|profile4.xml|profile5.xml|ROW_profile.*.xml|SwimConfig.xml|VZW_profile.*.xml";
|
|
|
|
blobs=$blobs"|cnd";
|
|
|
|
blobs=$blobs"|cneapiclient.jar|com.quicinc.cne.*.jar|ConnectivityExt.jar";
|
2022-10-20 19:41:52 -04:00
|
|
|
blobs=$blobs"|CNEService.apk|CneApp.apk|IWlanService.apk";
|
2020-11-02 19:13:32 -05:00
|
|
|
blobs=$blobs"|libcneconn.so|libcneqmiutils.so|libcne.so|libvendorconn.so|libwms.so|libwqe.so|libcneoplookup.so";
|
2021-01-18 07:11:54 -05:00
|
|
|
#blobs=$blobs"|vendor.qti.data.factory.*|vendor.qti.hardware.data.dynamicdds.*|vendor.qti.hardware.data.latency.*|vendor.qti.hardware.data.qmi.*|vendor.qti.latency.*|vendor.qti.hardware.data.iwlan.*";
|
|
|
|
overlay=$overlay"|config_wlan_data_service_package|config_wlan_network_service_package|config_qualified_networks_service_package";
|
2021-06-17 09:34:21 -04:00
|
|
|
#makes=$makes"|libcnefeatureconfig"; XXX: breaks radio
|
2022-04-28 22:43:09 -04:00
|
|
|
manifests=$manifests"|com.quicinc.cne|iwlan";
|
Many fixes to get bluejay booting & working proper
- Enable APEX for Pixel 6/7, necessary for camera and pKVM
- Also drop hack removing pKVM for Pixel 6/7
- patch from GrapheneOS
- Extend hmalloc workaround to /apex
- Deblobber:
- actually handle wildcard f/w/b overlays
- move some stuff around
- remove some more Pixel blobs
- flag and disable removal of camera extensions, being able to use the second camera is nice
- Adjust what hardenDefconfig disables, caused boot issues
minimal impact as most of these are already default-disabled
can be narrowed down in future
- Disable some of the bionic hardening patches, causing more boot issues
annoying to lose, but having a phone that boots is more important
- Add LTE only mode to 17.1, 18.1, 19.1, and 20.0, credit GrapheneOS
- Remove Pixel 2 ramdisk compression reverts, fixed upstream
And yes, I know I should've split up this commit...
Signed-off-by: Tad <tad@spotco.us>
2022-12-23 22:00:31 -05:00
|
|
|
blobs=$blobs"|QualifiedNetworksService.apk"; #Google
|
|
|
|
blobs=$blobs"|qualifiednetworksservice.xml";
|
2023-07-22 15:03:58 -04:00
|
|
|
makes=$makes"|Iwlan|CNEService|CneApp|IWlanService";
|
2020-11-02 19:13:32 -05:00
|
|
|
fi;
|
2018-02-11 23:50:18 -05:00
|
|
|
|
2019-10-11 13:29:04 -04:00
|
|
|
#CPPF (DRM) [?]
|
|
|
|
blobs=$blobs"|libcppf.so";
|
|
|
|
blobs=$blobs"|cppf.*";
|
|
|
|
|
2018-08-24 18:35:53 -04:00
|
|
|
#Diagnostics
|
2020-10-22 15:24:17 -04:00
|
|
|
#https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/diag/ [headers]
|
|
|
|
#https://source.codeaurora.org/quic/imm/imm/sources/diag/ [related?]
|
|
|
|
blobs=$blobs"|[/]diag[/]|diag_callback_client|diag_dci_sample|diag_klog|diag_mdlog|diag_mdlog-getlogs|diag_mdlog-wrap|diag[/]mdm|diag_qshrink4_daemon|diag_socket_log|diag_uart_log|drmdiagapp|libdrmdiag.so|ssr_diag|test_diag|cnss_diag";
|
2022-05-01 22:39:49 -04:00
|
|
|
#blobs=$blobs"|libdiag.so|libsdm-diag.so|libDiagService.so"; #XXX: Breaks things
|
2018-08-24 18:35:53 -04:00
|
|
|
ipcSec="4097:4294967295:2002:2950:3009:2901|4097:4294967295:3009";
|
2018-02-11 23:50:18 -05:00
|
|
|
|
2018-05-20 23:28:01 -04:00
|
|
|
#Dirac (Audio Codec + Effects) [Dirac]
|
2020-10-11 04:46:19 -04:00
|
|
|
#if [ "$DOS_DEBLOBBER_REMOVE_AUDIOFX" = true ]; then
|
|
|
|
#blobs=$blobs"|libDiracAPI_SHARED.so|.*dirac.*"; #XXX: Breaks headphone jack
|
|
|
|
#blobs=$blobs"|diracmobile.config";
|
|
|
|
#fi;
|
2018-02-11 23:50:18 -05:00
|
|
|
|
|
|
|
#Discretix (DRM/HDCP) [Discretix Technologies]
|
2019-03-23 17:33:39 -04:00
|
|
|
blobs=$blobs"|DxDrmServerIpc|discretix";
|
|
|
|
blobs=$blobs"|libDxHdcp.so|libDxModularPluginNv.so|libDxDrmServer.so";
|
|
|
|
blobs=$blobs"|DxHDCP.cfg|DxDrmConfig.txt";
|
|
|
|
blobs=$blobs"|dxhdcp.*|dxcpr.*";
|
2019-08-12 17:14:25 -04:00
|
|
|
blobs=$blobs"|libhdcpsrm.so|libcpion.so";
|
2018-06-30 23:42:40 -04:00
|
|
|
makes=$makes"|DxHDCP.cfg";
|
2018-02-11 23:50:18 -05:00
|
|
|
|
2021-08-21 15:34:00 -04:00
|
|
|
#Display Color Tuning [Qualcomm] #XXX: still breaks boot on some devices
|
2020-10-20 07:20:40 -04:00
|
|
|
blobs=$blobs"|colorservice.apk|PPPreference.apk|CABLService.apk|QdcmFF.apk";
|
2021-10-23 15:19:51 -04:00
|
|
|
if [ "$DOS_DEBLOBBER_REMOVE_DPP" = true ]; then
|
|
|
|
blobs=$blobs"|mm-pp-daemon|mm-pp-dpps";
|
|
|
|
blobs=$blobs"|libmm-color-convertor.so|libsd_sdk_display.so|libdpps.so";
|
|
|
|
blobs=$blobs"|libdisp-aba.so|libmm-abl-oem.so|libmm-abl.so|libmm-als.so|libmm-disp-apis.so|libmm-qdcm.so"; #XXX: needed for hwcomposer(?)
|
|
|
|
blobs=$blobs"|vendor.display.color.*|vendor.display.postproc.*|vendor.qti.hardware.qdutils_disp.*|com.qti.snapdragon.sdk.display.*";
|
|
|
|
makes=$makes"|vendor.lineage.livedisplay.*service-legacymm";
|
|
|
|
fi;
|
2018-02-11 23:50:18 -05:00
|
|
|
|
|
|
|
#DivX (DRM) [DivX]
|
2019-03-23 17:33:39 -04:00
|
|
|
blobs=$blobs"|libDivxDrm.so|libSHIMDivxDrm.so";
|
2018-02-11 23:50:18 -05:00
|
|
|
|
2021-10-23 15:19:51 -04:00
|
|
|
#DPM (Data Power Management? Data Port Mapper?) [Qualcomm]
|
2020-10-22 15:24:17 -04:00
|
|
|
#https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/dpm/ [headers]
|
2021-10-23 15:19:51 -04:00
|
|
|
if [ "$DOS_DEBLOBBER_REMOVE_DPM" = true ]; then
|
|
|
|
blobs=$blobs"|com.qti.dpmframework.jar|dpmapi.jar|tcmclient.jar";
|
|
|
|
blobs=$blobs"|com.qti.dpmframework.xml|dpmapi.xml|dpm.conf|NsrmConfiguration.xml";
|
|
|
|
blobs=$blobs"|dpmd|dpmQmiMgr";
|
|
|
|
blobs=$blobs"|dpmserviceapp.apk";
|
|
|
|
blobs=$blobs"|libdpmctmgr.so|libdpmfdmgr.so|libdpmframework.so|libdpmnsrm.so|libdpmtcm.so|libdpmqmihal.so";
|
|
|
|
blobs=$blobs"|com.qualcomm.qti.dpm.*";
|
|
|
|
ipcSec=$ipcSec"|47:4294967295:1001:3004|48:4294967295:1000:3004";
|
2022-04-28 22:43:09 -04:00
|
|
|
manifests=$manifests"|dpmQmiService";
|
2023-07-22 15:03:58 -04:00
|
|
|
makes=$makes"|dpmserviceapp";
|
2021-10-23 15:19:51 -04:00
|
|
|
fi;
|
2018-02-11 23:50:18 -05:00
|
|
|
|
|
|
|
#DRM
|
|
|
|
blobs=$blobs"|liboemcrypto.so|libtzdrmgenprov.so";
|
|
|
|
blobs=$blobs"|libpvr.so|librmp.so|libsi.so|libSSEPKCS11.so";
|
2018-08-23 19:25:33 -04:00
|
|
|
blobs=$blobs"|libdrmctaplugin.so|libdrmmtkplugin.so|libdrmmtkwhitelist.so|libmockdrmcryptoplugin.so";
|
2019-03-23 12:49:58 -04:00
|
|
|
blobs=$blobs"|libOMXVideoDecoder.*Secure.so"; #Decoding
|
|
|
|
blobs=$blobs"|htc_drmprov.*|gpsample.mbn|gptauuid.xml"; #HTC
|
|
|
|
blobs=$blobs"|if.bin"; #Intel PAVP backend
|
|
|
|
blobs=$blobs"|liblgdrm.so"; #LG
|
|
|
|
#blobs=$blobs"|libtpa_core.so|libdataencrypt_tpa.so|libpkip.so"; #OMAP SMC
|
2022-01-20 19:13:08 -05:00
|
|
|
blobs=$blobs"|vendor.oneplus.hardware.drmkey.*|bin[/]hw[/]vendor.oneplus.hardware.hdcpkey.*|etc[/]init[/]vendor.oneplus.hardware.hdcpkey.*"; #OnePlus
|
|
|
|
#blobs=$blobs"|vendor.oneplus.hardware.hdcpkey.*.so"; #XXX: Breaks radio, linked by libril-qc-hal-qmi.so
|
2022-05-01 22:39:49 -04:00
|
|
|
manifests=$manifests"|OneplusHdcpKey";
|
2019-03-23 12:49:58 -04:00
|
|
|
blobs=$blobs"|smc_pa.ift|drmserver.samsung"; #Samsung
|
|
|
|
blobs=$blobs"|provision_device";
|
|
|
|
#blobs=$blobs"|libasfparser.so|libsavsff.so"; #Parsers
|
2022-12-15 18:00:23 -05:00
|
|
|
makes=$makes"|android.hardware.drm.*|liboemcrypto";
|
2022-04-28 22:43:09 -04:00
|
|
|
manifests=$manifests"|android.hardware.drm";
|
2018-06-17 19:42:17 -04:00
|
|
|
#makes=$makes"|libdrmframework.*"; #necessary to compile
|
|
|
|
#makes=$makes"|mediadrmserver|com.android.mediadrm.signer.*|drmserver"; #Works but causes long boot times
|
2018-02-11 23:50:18 -05:00
|
|
|
|
2019-03-21 08:55:01 -04:00
|
|
|
#eMBMS [Qualcomm]
|
2019-03-23 17:33:39 -04:00
|
|
|
blobs=$blobs"|embms.apk";
|
|
|
|
blobs=$blobs"|embms.xml";
|
|
|
|
blobs=$blobs"|embmslibrary.jar";
|
2022-04-28 22:43:09 -04:00
|
|
|
manifests=$manifests"|embms";
|
2023-07-22 15:03:58 -04:00
|
|
|
#makes=$makes"|embms";
|
2019-03-21 08:55:01 -04:00
|
|
|
|
2018-06-30 14:49:22 -04:00
|
|
|
#External Accessories
|
|
|
|
if [ "$DOS_DEBLOBBER_REMOVE_ACCESSORIES" = true ]; then
|
2024-05-04 20:58:49 -04:00
|
|
|
#tangorpro
|
2024-05-20 12:52:16 -04:00
|
|
|
if [[ "$DOS_VERSION" == "LineageOS-20.0" ]] || [[ "$DOS_VERSION" == "LineageOS-21.0" ]]; then
|
2024-05-04 20:58:49 -04:00
|
|
|
blobs=$blobs"|AndroidMediaShell.apk|CastAuthPrebuilt.apk|UsoniaPrebuilt.apk|HomegraphPrebuilt.apk|SmartDisplayPrebuilt.apk|DockManagerPrebuilt.apk|DockSetup.apk";
|
|
|
|
blobs=$blobs"|default-permissions_SmartDisplayPrebuilt.xml|com.google.android.apps.mediashell.xml|com.google.android.apps.nest.castauth.xml|pixel_docking_experience_2022.xml|appcompat[/]compat_framework_overrides.xml|com.google.assistant.hubui.xml|sysconfig[/]communal.xml|com.google.android.apps.nest.dockmanager.app.xml|google-nest-hiddenapi-package-whitelist.xml";
|
|
|
|
fi;
|
2019-03-23 17:33:39 -04:00
|
|
|
#dragon
|
|
|
|
blobs=$blobs"|DragonKeyboardFirmwareUpdater.apk";
|
|
|
|
#griffin
|
|
|
|
blobs=$blobs"|ProjectorApp.apk|MotCameraMod.apk|ModFmwkProxyService.apk|ModService.apk";
|
|
|
|
blobs=$blobs"|libcamera_mods_legacy_hal.so|libmodmanager.*.so|com.motorola.mod.*.so|libmodhw.so";
|
|
|
|
blobs=$blobs"|mods_camd";
|
|
|
|
blobs=$blobs"|projectormod.xml|com.motorola.modservice.xml";
|
|
|
|
blobs=$blobs"|motorola.hardware.mods_camera.*";
|
|
|
|
#mata
|
2020-11-02 19:13:32 -05:00
|
|
|
blobs=$blobs"|[/]Score[/]|[/]Klik[/]|Score.apk|Klik.apk";
|
2019-03-23 17:33:39 -04:00
|
|
|
blobs=$blobs"|vendor.essential.hardware.sidecar.*";
|
|
|
|
blobs=$blobs"|vendor-essential-hardware-sidecar.*.xml";
|
|
|
|
#albus
|
|
|
|
blobs=$blobs"|DTVPlayer.apk|DTVService.apk";
|
2018-06-30 14:49:22 -04:00
|
|
|
fi;
|
|
|
|
|
2018-02-11 23:50:18 -05:00
|
|
|
#Face Unlock [Google]
|
2023-09-01 20:51:15 -04:00
|
|
|
blobs=$blobs"|libfacenet.so|libfilterpack_facedetect.so|libfrsdk.so"; #legacy
|
2023-09-02 10:28:52 -04:00
|
|
|
if [ "$DOS_DEBLOBBER_REMOVE_FACE" = true ]; then #modern
|
|
|
|
blobs=$blobs"|android.hardware.biometrics.face.*"; #depends on airbrush
|
|
|
|
blobs=$blobs"|manifest_face.xml";
|
|
|
|
#blobs=$blobs"|firmware/faceauth";
|
|
|
|
makes=$makes"|android.hardware.biometrics.face.*";
|
|
|
|
fi;
|
2018-02-11 23:50:18 -05:00
|
|
|
|
|
|
|
#GPS [Qualcomm]
|
2019-03-23 17:33:39 -04:00
|
|
|
#blobs=$blobs"|gpsd";
|
|
|
|
#blobs=$blobs"|libflp.so|libgps.utils.so|libloc_api_v02.so|libloc_core.so|libloc_ds_api.so|libloc_eng.so|libloc_ext.so|libizat_core.so";
|
|
|
|
#blobs=$blobs"|flp.default.so|flp.msm.*.so|gps.default.so|gps.msm.*.so";
|
|
|
|
#blobs=$blobs"|flp.conf";
|
2018-02-11 23:50:18 -05:00
|
|
|
|
2018-06-30 19:52:46 -04:00
|
|
|
#Graphics
|
2024-05-20 12:52:16 -04:00
|
|
|
#blobs=$blobs"|eglsubAndroid.so|eglSubDriverAndroid.so|libbccQTI.so|libC2D2.so|libc2d30_bltlib.so|libc2d30.so|libc2d30.*.so|libCB.so|libEGL.*.so|libGLES.*.so|libgsl.so|libq3dtools_esx.so|libq3dtools.*.so|libQTapGLES.so|libscale.so|libsc.*.so";
|
|
|
|
#blobs=$blobs"|libglcore.so|libnvblit.so|libnvddk_vic.so|libnvglsi.so|libnvgr.so|libnvptx.so|libnvrmapi.*.so|libnvrm_graphics.so|libnvrm.so|libnvwsi.so"; #NVIDIA
|
|
|
|
#blobs=$blobs"|gralloc.*.so|hwcomposer.*.so|memtrack.*.so";
|
|
|
|
#blobs=$blobs"|libadreno_utils.so"; #Adreno
|
|
|
|
#blobs=$blobs"|libllvm.*.so"; #LLVM
|
|
|
|
#blobs=$blobs"|libOpenCL.*.so|libclcore_nvidia.bc"; #OpenCL
|
|
|
|
#blobs=$blobs"|vulkan.*.so"; #Vulkan
|
|
|
|
#makes=$makes"|android.hardware.vulkan.*|libvulkan";
|
|
|
|
#Renderscript
|
|
|
|
#blobs=$blobs"|android.hardware.renderscript.*";
|
|
|
|
#blobs=$blobs"|librs.*.so|libRSDriver.*.so|libnvRSCompiler.so|libnvRSDriver.so"; #Adreno
|
|
|
|
#blobs=$blobs"|libPVRRS.*.so|libufwriter.so"; #Intel
|
|
|
|
#makes=$makes"|android.hardware.renderscript.*";
|
2018-06-30 19:52:46 -04:00
|
|
|
|
2022-05-21 13:37:13 -04:00
|
|
|
#Felicia [Google?]
|
|
|
|
blobs=$blobs"|MobileFeliCaClient.apk|MobileFeliCaMenuMainApp.apk|MobileFeliCaSettingApp.apk|MobileFeliCaWebPlugin.apk|MobileFeliCaWebPluginBoot.apk";
|
|
|
|
blobs=$blobs"|etc[/]felica[/]";
|
|
|
|
|
2018-06-30 14:49:22 -04:00
|
|
|
#Fingerprint Reader
|
|
|
|
if [ "$DOS_DEBLOBBER_REMOVE_FP" = true ]; then
|
2022-05-01 22:39:49 -04:00
|
|
|
blobs=$blobs"|fingerprint.*.so|libbauthserver.so|libcom_fingerprints_service.so|libegis_fp_normal_sensor_test.so|lib_fpc_tac_shared.so|libfpfactory.*.so|libsynaFpSensorTestNwd.so|libbl_fp_algo.so|libBtlFpHal.so|libxuFPAlg.so|libgf_hal.so|libgoodixfingerprintd_binder.so|fp_hal_extension.so|libgf_ud_hal.so|goodix.fod.*.so";
|
|
|
|
blobs=$blobs"|fpc_early_loader|btlfpserver";
|
2019-03-23 17:33:39 -04:00
|
|
|
blobs=$blobs"|fpctzappfingerprint.*";
|
2022-05-01 22:39:49 -04:00
|
|
|
blobs=$blobs"|android.hardware.biometrics.fingerprint.*|vendor.qti.hardware.fingerprint.*";
|
2018-07-12 21:14:11 -04:00
|
|
|
makes=$makes"|android.hardware.biometrics.fingerprint.*|android.hardware.fingerprint.*";
|
2018-06-30 14:49:22 -04:00
|
|
|
fi;
|
|
|
|
|
2019-03-21 08:55:01 -04:00
|
|
|
#FM Radio [Google]
|
|
|
|
blobs=$blobs"|FMRadioGoogle.apk|FmRadioTrampoline2.apk";
|
|
|
|
|
2020-10-20 07:20:40 -04:00
|
|
|
#[Google]
|
2022-02-10 15:36:44 -05:00
|
|
|
blobs=$blobs"|TetheringEntitlement.apk|CarrierLocation.apk|CarrierWifi.apk";
|
2022-05-17 18:42:03 -04:00
|
|
|
blobs=$blobs"|CarrierSettings.apk|CarrierSetup.apk";
|
Many fixes to get bluejay booting & working proper
- Enable APEX for Pixel 6/7, necessary for camera and pKVM
- Also drop hack removing pKVM for Pixel 6/7
- patch from GrapheneOS
- Extend hmalloc workaround to /apex
- Deblobber:
- actually handle wildcard f/w/b overlays
- move some stuff around
- remove some more Pixel blobs
- flag and disable removal of camera extensions, being able to use the second camera is nice
- Adjust what hardenDefconfig disables, caused boot issues
minimal impact as most of these are already default-disabled
can be narrowed down in future
- Disable some of the bionic hardening patches, causing more boot issues
annoying to lose, but having a phone that boots is more important
- Add LTE only mode to 17.1, 18.1, 19.1, and 20.0, credit GrapheneOS
- Remove Pixel 2 ramdisk compression reverts, fixed upstream
And yes, I know I should've split up this commit...
Signed-off-by: Tad <tad@spotco.us>
2022-12-23 22:00:31 -05:00
|
|
|
blobs=$blobs"|CarrierServices.apk";
|
2020-10-20 07:20:40 -04:00
|
|
|
blobs=$blobs"|HardwareInfo.apk";
|
2023-07-13 10:45:43 -04:00
|
|
|
blobs=$blobs"|SCONE.apk"; #Adaptive Connectivity Services
|
2022-04-08 16:55:30 -04:00
|
|
|
blobs=$blobs"|DevicePersonalizationPrebuilt.*.apk|DeviceIntelligence.*.apk";
|
2022-05-21 13:37:13 -04:00
|
|
|
blobs=$blobs"|libhwinfo.jar|com.google.android.hardwareinfo.xml";
|
2023-03-22 16:23:26 -04:00
|
|
|
overlay=$overlay"|config_defaultAttentionService|config_defaultSystemCaptionsManagerService|config_defaultSystemCaptionsService|config_systemAmbientAudioIntelligence|config_systemAudioIntelligence|config_systemNotificationIntelligence|config_systemTextIntelligence|config_systemUiIntelligence|config_systemVisualIntelligence|config_defaultContentSuggestionsService|config_defaultAppPredictionService";
|
2022-05-07 20:22:49 -04:00
|
|
|
overlay=$overlay"|config_defaultWellbeingPackage|config_defaultSupervisionProfileOwnerComponent";
|
2022-05-17 18:42:03 -04:00
|
|
|
overlay=$overlay"|platform_carrier_config_package";
|
2021-04-04 17:06:47 -04:00
|
|
|
|
Many fixes to get bluejay booting & working proper
- Enable APEX for Pixel 6/7, necessary for camera and pKVM
- Also drop hack removing pKVM for Pixel 6/7
- patch from GrapheneOS
- Extend hmalloc workaround to /apex
- Deblobber:
- actually handle wildcard f/w/b overlays
- move some stuff around
- remove some more Pixel blobs
- flag and disable removal of camera extensions, being able to use the second camera is nice
- Adjust what hardenDefconfig disables, caused boot issues
minimal impact as most of these are already default-disabled
can be narrowed down in future
- Disable some of the bionic hardening patches, causing more boot issues
annoying to lose, but having a phone that boots is more important
- Add LTE only mode to 17.1, 18.1, 19.1, and 20.0, credit GrapheneOS
- Remove Pixel 2 ramdisk compression reverts, fixed upstream
And yes, I know I should've split up this commit...
Signed-off-by: Tad <tad@spotco.us>
2022-12-23 22:00:31 -05:00
|
|
|
#eUICC (Virtual SIM) [Google]
|
2022-05-02 23:38:55 -04:00
|
|
|
if [ "$DOS_DEBLOBBER_REMOVE_IMS" = true ] || [ "$DOS_DEBLOBBER_REMOVE_EUICC" = true ]; then
|
2023-07-27 20:44:53 -04:00
|
|
|
blobs=$blobs"|EuiccGoogle.apk|EuiccGoogleOverlay.apk"; #Google LPAD
|
|
|
|
makes=$makes"|GoogleParts"; #Disables apps if GMS is not available
|
2022-05-08 01:09:58 -04:00
|
|
|
#overlay=$overlay"|config_telephonyEuiccDeviceCapabilities"; #TODO handle multiple lines
|
2023-08-05 15:42:58 -04:00
|
|
|
if [ "$DOS_DEBLOBBER_REMOVE_EUICC_FULL" = true ]; then
|
|
|
|
blobs=$blobs"|EuiccSupportPixel.apk|EuiccSupportPixelPermissions.apk"; #Hardware support
|
|
|
|
blobs=$blobs"|esim0.img|esim-v1.img|esim-full-v0.img|esim-a1.img|esim-a2.img"; #Firmware
|
|
|
|
blobs=$blobs"|com.google.euiccpixel.xml|com.google.euiccpixel.permissions.xml"; #Permissions
|
|
|
|
makes=$makes"|android.hardware.telephony.euicc.*"; #Manifests
|
|
|
|
fi;
|
2022-05-02 23:38:55 -04:00
|
|
|
fi;
|
2020-10-20 07:20:40 -04:00
|
|
|
|
2023-08-30 13:46:07 -04:00
|
|
|
#Google Camera (app)
|
2023-09-02 10:28:52 -04:00
|
|
|
#blobs=$blobs"|com.google.android.camera.experimental.*";
|
2023-08-30 13:46:07 -04:00
|
|
|
|
|
|
|
#Google Camera (system) Extensions
|
|
|
|
blobs=$blobs"|PixelCameraServices.*.apk";
|
|
|
|
blobs=$blobs"|com.google.android.camera.extensions.*";
|
2022-05-21 13:37:13 -04:00
|
|
|
|
|
|
|
#Google NFC
|
|
|
|
blobs=$blobs"|PixelNfc.apk";
|
|
|
|
|
|
|
|
#Google RIL
|
|
|
|
blobs=$blobs"|grilservice.apk|RilConfigService.apk";
|
|
|
|
blobs=$blobs"|google-ril.jar|RadioConfigLib.jar";
|
|
|
|
blobs=$blobs"|google-ril.xml";
|
Many fixes to get bluejay booting & working proper
- Enable APEX for Pixel 6/7, necessary for camera and pKVM
- Also drop hack removing pKVM for Pixel 6/7
- patch from GrapheneOS
- Extend hmalloc workaround to /apex
- Deblobber:
- actually handle wildcard f/w/b overlays
- move some stuff around
- remove some more Pixel blobs
- flag and disable removal of camera extensions, being able to use the second camera is nice
- Adjust what hardenDefconfig disables, caused boot issues
minimal impact as most of these are already default-disabled
can be narrowed down in future
- Disable some of the bionic hardening patches, causing more boot issues
annoying to lose, but having a phone that boots is more important
- Add LTE only mode to 17.1, 18.1, 19.1, and 20.0, credit GrapheneOS
- Remove Pixel 2 ramdisk compression reverts, fixed upstream
And yes, I know I should've split up this commit...
Signed-off-by: Tad <tad@spotco.us>
2022-12-23 22:00:31 -05:00
|
|
|
blobs=$blobs"|ConnectivityThermalPowerManager.apk";
|
|
|
|
overlay=$overlay"|config_show_adaptive_connectivity";
|
2018-07-12 16:49:05 -04:00
|
|
|
|
2020-10-20 07:20:40 -04:00
|
|
|
#Google Setup Wizard
|
|
|
|
blobs=$blobs"|DreamlinerPrebuilt.apk|DreamlinerUpdater.apk";
|
|
|
|
blobs=$blobs"|com.google.android.apps.dreamliner.xml|dreamliner.xml";
|
|
|
|
|
2020-10-23 16:39:15 -04:00
|
|
|
#Google Tango
|
|
|
|
blobs=$blobs"|TangoCore.apk|TangoDiscovery.apk";
|
|
|
|
blobs=$blobs"|tango_service";
|
|
|
|
blobs=$blobs"|libtango_device.*.jar";
|
2020-10-23 18:15:01 -04:00
|
|
|
blobs=$blobs"|libtango_.*.so";
|
2020-10-23 16:39:15 -04:00
|
|
|
|
2018-07-12 16:49:05 -04:00
|
|
|
#Google TV
|
2019-03-21 08:55:01 -04:00
|
|
|
blobs=$blobs"|LeanbackIme.apk|LeanbackLauncher.apk|AtvRemoteService.apk|GamepadPairingService.apk|GlobalKeyInterceptor.apk|RemoteControlService.apk|TV.apk|CanvasPackageInstaller.apk|Overscan.apk";
|
|
|
|
|
2019-03-23 12:49:58 -04:00
|
|
|
#Gemini PDA [Planet]
|
|
|
|
blobs=$blobs"|ApplicationBar.apk|Gemini_Keyboard.apk|GeminiInputDevices.apk|notes.apk";
|
|
|
|
|
2019-03-21 08:55:01 -04:00
|
|
|
#[Huawei]
|
|
|
|
blobs=$blobs"|HWSarControlService.apk";
|
2018-07-12 16:49:05 -04:00
|
|
|
|
2018-02-11 23:50:18 -05:00
|
|
|
#HDCP (DRM)
|
2019-03-23 17:33:39 -04:00
|
|
|
blobs=$blobs"|libmm-hdcpmgr.so|libstagefright_hdcp.so|libhdcp2.so";
|
2020-10-23 16:39:15 -04:00
|
|
|
blobs=$blobs"|libtsechdcp.so|libtlk_secure_hdcp_up.so|libstagefright_hdcp.so|libnvhdcp.so";
|
2022-04-28 08:00:49 -04:00
|
|
|
blobs=$blobs"|android.hardware.drm.*hdcp.*";
|
2020-10-23 18:15:01 -04:00
|
|
|
blobs=$blobs"|srm.bin|insthk|hdcp_test|tsechdcp_test";
|
2019-03-24 13:39:14 -04:00
|
|
|
blobs=$blobs"|hdcp2xtest.srm";
|
2020-02-23 20:51:13 -05:00
|
|
|
blobs=$blobs"|hdcp1.*|hdcp2.*|tzhdcp.*";
|
2022-04-28 08:00:49 -04:00
|
|
|
makes=$makes"|android.hardware.drm.*hdcp.*";
|
2022-04-28 22:43:09 -04:00
|
|
|
manifests=$manifests"|HDCPSession";
|
2018-02-11 23:50:18 -05:00
|
|
|
|
2018-06-28 20:11:20 -04:00
|
|
|
#HDR
|
2021-10-23 15:19:51 -04:00
|
|
|
blobs=$blobs"|libdovi.so";
|
|
|
|
#blobs=$blobs"|libdolby.*.so"; #TODO: test me
|
|
|
|
#blobs=$blobs"|libhdr_tm.so"; #XXX: potential breakage
|
2019-03-23 17:33:39 -04:00
|
|
|
blobs=$blobs"|DolbyVisionService.apk";
|
2019-08-23 12:23:43 -04:00
|
|
|
blobs=$blobs"|dolby_vision.cfg|hdr_tm_config.xml";
|
2022-04-28 22:43:09 -04:00
|
|
|
manifests=$manifests"|dolby.hardware.dms";
|
2018-06-28 20:11:20 -04:00
|
|
|
|
2018-02-11 23:50:18 -05:00
|
|
|
#I/O Prefetcher [Qualcomm]
|
2019-03-25 20:30:27 -04:00
|
|
|
#blobs=$blobs"|libqc-opt.so"; #Can break camera in some cases
|
|
|
|
blobs=$blobs"|libqti-iop.*.so";
|
2019-03-23 17:33:39 -04:00
|
|
|
blobs=$blobs"|bin[/]iop";
|
|
|
|
blobs=$blobs"|QPerformance.jar";
|
|
|
|
blobs=$blobs"|vendor.qti.hardware.iop.*";
|
2022-04-28 22:43:09 -04:00
|
|
|
manifests=$manifests"|hardware.iop";
|
2018-02-11 23:50:18 -05:00
|
|
|
|
|
|
|
#IMS (VoLTE/Wi-Fi Calling) [Qualcomm]
|
2020-02-19 22:07:57 -05:00
|
|
|
if [ "$DOS_DEBLOBBER_REMOVE_IMS" = true ]; then
|
2020-05-02 22:29:23 -04:00
|
|
|
#blobs=$blobs"|libimsmedia_jni.so|vendor.qti.hardware.radio.ims.*";
|
|
|
|
blobs=$blobs"|lib-imsdpl.so|lib-imscamera.so|libimscamera_jni.so|lib-imsqimf.so|lib-imsSDP.so|lib-imss.so|lib-imsvt.so|lib-imsxml.so|lib-imsvideocodec.so|lib-imsvtextutils.so|lib-imsvtutils.so";
|
2020-02-19 22:07:57 -05:00
|
|
|
blobs=$blobs"|imscmservice|imsdatadaemon|imsqmidaemon";
|
2020-05-02 22:29:23 -04:00
|
|
|
blobs=$blobs"|imscm.xml|ims.xml|android.hardware.telephony.ims.xml";
|
2020-10-21 17:02:24 -04:00
|
|
|
blobs=$blobs"|qti_permissions.xml|qti-vzw-ims-internal.xml";
|
Many fixes to get bluejay booting & working proper
- Enable APEX for Pixel 6/7, necessary for camera and pKVM
- Also drop hack removing pKVM for Pixel 6/7
- patch from GrapheneOS
- Extend hmalloc workaround to /apex
- Deblobber:
- actually handle wildcard f/w/b overlays
- move some stuff around
- remove some more Pixel blobs
- flag and disable removal of camera extensions, being able to use the second camera is nice
- Adjust what hardenDefconfig disables, caused boot issues
minimal impact as most of these are already default-disabled
can be narrowed down in future
- Disable some of the bionic hardening patches, causing more boot issues
annoying to lose, but having a phone that boots is more important
- Add LTE only mode to 17.1, 18.1, 19.1, and 20.0, credit GrapheneOS
- Remove Pixel 2 ramdisk compression reverts, fixed upstream
And yes, I know I should've split up this commit...
Signed-off-by: Tad <tad@spotco.us>
2022-12-23 22:00:31 -05:00
|
|
|
blobs=$blobs"|ShannonIms.apk";
|
2020-02-19 22:07:57 -05:00
|
|
|
blobs=$blobs"|imssettings.apk|ims.apk";
|
2020-10-21 17:02:24 -04:00
|
|
|
blobs=$blobs"|imscmlibrary.jar|qti-vzw-ims-internal.jar";
|
|
|
|
blobs=$blobs"|com.qualcomm.qti.imscmservice.*|vendor.qti.ims.*";
|
2020-02-19 22:07:57 -05:00
|
|
|
#RTP
|
|
|
|
blobs=$blobs"|ims_rtp_daemon|lib-rtpcommon.so|lib-rtpcore.so|lib-rtpdaemoninterface.so|lib-rtpsl.so";
|
|
|
|
blobs=$blobs"|vendor.qti.imsrtpservice.*";
|
|
|
|
#Misc.
|
|
|
|
blobs=$blobs"|lib-dplmedia.so|librcc.so|libvcel.so|libvoice-svc.so";
|
2018-06-30 14:49:22 -04:00
|
|
|
blobs=$blobs"|volte_modem[/]";
|
2020-02-19 22:07:57 -05:00
|
|
|
makes=$makes"|ims-ext-common";
|
2018-08-24 18:35:53 -04:00
|
|
|
ipcSec=$ipcSec"|32:4294967295:1001";
|
2022-04-28 22:43:09 -04:00
|
|
|
manifests=$manifests"|qti.ims|radio.ims";
|
2018-06-30 14:49:22 -04:00
|
|
|
fi;
|
2020-10-21 17:02:24 -04:00
|
|
|
if [ "$DOS_DEBLOBBER_REMOVE_IMS" = true ] || [ "$DOS_DEBLOBBER_REMOVE_RCS" = true ]; then
|
|
|
|
#RCS (Proprietary messaging protocol)
|
2020-10-22 15:24:17 -04:00
|
|
|
#https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/rcs-service/ [useless]
|
2020-10-21 17:02:24 -04:00
|
|
|
blobs=$blobs"|imsrcsd";
|
|
|
|
blobs=$blobs"|lib-imsrcscmclient.so|lib-ims-rcscmjni.so|lib-imsrcscmservice.so|lib-imsrcscm.so|lib-imsrcs.so|lib-imsrcs-v2.so|lib-rcsimssjni.so|lib-rcsjni.so|lib-uceservice.so";
|
|
|
|
blobs=$blobs"|rcsimssettings.jar|rcsservice.jar";
|
|
|
|
blobs=$blobs"|rcsimssettings.xml|rcsservice.xml";
|
2022-02-10 15:36:44 -05:00
|
|
|
blobs=$blobs"|RCSBootstraputil.apk|RcsImsBootstraputil.apk|uceShimService.apk";
|
2022-12-15 18:00:23 -05:00
|
|
|
blobs=$blobs"|ShannonRcs.apk";
|
2020-10-21 17:02:24 -04:00
|
|
|
#blobs=$blobs"|vendor.qti.ims.rcsconfig.*";
|
|
|
|
blobs=$blobs"|com.qualcomm.qti.uceservice.*";
|
2022-04-28 22:43:09 -04:00
|
|
|
manifests=$manifests"|uceservice";
|
2022-05-02 23:38:55 -04:00
|
|
|
makes=$makes"|rcs_service.*|RcsService|PresencePolling";
|
2020-10-21 17:02:24 -04:00
|
|
|
ipcSec=$ipcSec"|18:4294967295:1001:3004";
|
|
|
|
fi;
|
|
|
|
|
2018-02-11 23:50:18 -05:00
|
|
|
|
|
|
|
#IPA (Internet Packet Accelerator) [Qualcomm]
|
2020-10-22 15:24:17 -04:00
|
|
|
#https://source.codeaurora.org/quic/la/platform/hardware/qcom/data/ipa-cfg-mgr/
|
|
|
|
#https://source.codeaurora.org/quic/la/platform/hardware/qcom/data/ipacfg-mgr/
|
|
|
|
#https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/data-ipa-cfg-mgr/
|
2018-02-11 23:50:18 -05:00
|
|
|
blobs=$blobs"|ipacm-diag";
|
2018-08-24 18:35:53 -04:00
|
|
|
if [ "$DOS_DEBLOBBER_REMOVE_IPA" = true ]; then
|
|
|
|
blobs=$blobs"|ipacm";
|
|
|
|
makes=$makes"|ipacm|IPACM_cfg.xml";
|
|
|
|
kernels=$kernels" drivers/platform/msm/ipa";
|
|
|
|
fi;
|
2018-02-11 23:50:18 -05:00
|
|
|
|
2018-05-16 14:21:20 -04:00
|
|
|
#IS? (DRM) [?]
|
|
|
|
blobs=$blobs"|isdbtmm.*";
|
|
|
|
|
2018-06-30 14:49:22 -04:00
|
|
|
#IR
|
|
|
|
if [ "$DOS_DEBLOBBER_REMOVE_IR" = true ]; then
|
2019-03-23 17:33:39 -04:00
|
|
|
blobs=$blobs"|cir_fw_update";
|
|
|
|
blobs=$blobs"|consumerir.*.so|ibcir_driver.so|libcir_driver.so|libhtcirinterface_jni.so";
|
|
|
|
blobs=$blobs"|htcirlibs.jar";
|
|
|
|
blobs=$blobs"|CIRModule.apk";
|
|
|
|
blobs=$blobs"|cir.img";
|
2018-07-12 21:14:11 -04:00
|
|
|
makes=$makes"|android.hardware.ir.*|android.hardware.consumerir.*";
|
2018-06-30 14:49:22 -04:00
|
|
|
fi;
|
|
|
|
|
2018-02-11 23:50:18 -05:00
|
|
|
#Keystore/TrustZone (HW Crypto) [Qualcomm]
|
2019-03-23 17:33:39 -04:00
|
|
|
#blobs=$blobs"|keystore.qcom.so|libdrmdecrypt.so|libdrmfs.so|libdrmtime.so|libQSEEComAPI.so|librpmb.so|libssd.so|libQTEEConnector.*.so";
|
|
|
|
#blobs=$blobs"|qseecomd";
|
2019-03-24 13:39:14 -04:00
|
|
|
blobs=$blobs"|qseecom_sample_client|qseecom_security_test|qseeproxysampledaemon";
|
2019-03-23 17:33:39 -04:00
|
|
|
#blobs=$blobs"|keymaster.*|tzapps.*";
|
|
|
|
#blobs=$blobs"|vendor.qti.hardware.qteeconnector.*";
|
2018-02-11 23:50:18 -05:00
|
|
|
|
2019-03-23 12:49:58 -04:00
|
|
|
#libMM (multimedia encoder/decoder/parser) [Qualcomm]
|
|
|
|
#blobs=$blobs"|libmmparser.so|libmmipstreamsourcehttp.so";
|
|
|
|
|
2018-02-11 23:50:18 -05:00
|
|
|
#Location (gpsOne/gpsOneXTRA/IZat/Lumicast/QUIP) [Qualcomm]
|
2020-10-22 15:24:17 -04:00
|
|
|
#https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/location/
|
2020-02-19 22:07:57 -05:00
|
|
|
blobs=$blobs"|libalarmservice_jni.so|libasn1cper.so|libasn1crt.so|libasn1crtx.so|libgdtap.so|libloc_ext.so|libloc_xtra.so|liblowi_wifihal_nl.so|liblowi_wifihal.so|libquipc_os_api.so|libquipc_ulp_adapter.so|libxt_native.so|libxtwifi_ulp_adaptor.so|libxtwifi_zpp_adaptor.so";
|
|
|
|
#blobs=$blobs"|libulp2.so|libxtadapter.so|libgeofence.so|liblbs_core.so|libdataitems.so|libdrplugin_client.so|libDRPlugin.so|libevent_observer.so|liblocationservice_glue.so|liblocationservice.so|liblowi_client.so";
|
2019-03-23 17:33:39 -04:00
|
|
|
blobs=$blobs"|cacert_location.pem|com.qti.location.sdk.xml|com.qualcomm.location.xml|izat.conf|izat.xt.srv.xml|lowi.conf|xtra_root_cert.pem|xtwifi.conf";
|
|
|
|
blobs=$blobs"|com.qti.location.sdk.jar|izat.xt.srv.jar";
|
2022-10-20 19:41:52 -04:00
|
|
|
blobs=$blobs"|com.qualcomm.location.apk|com.qualcomm.services.location.apk|xtra_t_app.apk|CACertService.apk";
|
2023-07-14 15:45:35 -04:00
|
|
|
blobs=$blobs"|gpsone_daemon|izat.xt.srv|location-mq|loc_launcher|lowi-server|slim_ap_daemon|slim_daemon|xtwifi-client|xtwifi-inet-agent|xtra-daemon|garden_app";
|
2021-01-18 07:11:54 -05:00
|
|
|
overlay=$overlay"|config_comboNetworkLocationProvider|config_enableFusedLocationOverlay|config_enableNetworkLocationOverlay|config_fusedLocationProviderPackageName|config_enableNetworkLocationOverlay|config_networkLocationProviderPackageName|com.qualcomm.location";
|
2018-02-11 23:50:18 -05:00
|
|
|
|
2023-08-26 17:50:21 -04:00
|
|
|
#Machine Learning [Google]
|
|
|
|
#blobs=$blobs"|libdarwinn_client.so|libdarwinn_compiler.so|libdarwinn_hal.so"; #breaks camera
|
|
|
|
#blobs=$blobs"|vendor.google.darwinn.service.*";
|
|
|
|
|
2020-10-20 07:20:40 -04:00
|
|
|
#Machine Learning [Qualcomm]
|
2021-12-11 00:12:00 -05:00
|
|
|
#blobs=$blobs"|vendor.qti.hardware.mlshal.*|vendor.qti.hardware.cvp.*";
|
|
|
|
#blobs=$blobs"|libopenvx.so|libnpu.so|libcvp.*.so"; #XXX: breaks camera
|
2020-10-20 07:20:40 -04:00
|
|
|
|
2018-02-11 23:50:18 -05:00
|
|
|
#Misc
|
|
|
|
blobs=$blobs"|libjni_latinime.so|libuiblur.so|libwifiscanner.so";
|
|
|
|
|
2020-10-20 07:20:40 -04:00
|
|
|
#Motion Sense
|
|
|
|
blobs=$blobs"|OsloFeedback.apk";
|
2023-08-26 21:33:52 -04:00
|
|
|
#blobs=$blobs"|oslo.so|oslo.napp_header";
|
|
|
|
#blobs=$blobs"|BufferConfigValOslo.bin|OsloSensorConfig.bin|OsloSensorPackage.bin";
|
|
|
|
#blobs=$blobs"|vendor.google.airbrush.*|libairbrush-pixel.so";
|
2020-10-20 07:20:40 -04:00
|
|
|
#blobs=$blobs"|pixelatoms-cpp.so|vendor-pixelatoms-cpp.so"; #???
|
|
|
|
|
2019-09-02 20:00:39 -04:00
|
|
|
#Music Detection [Google]
|
|
|
|
blobs=$blobs"|AmbientSensePrebuilt.apk";
|
Many fixes to get bluejay booting & working proper
- Enable APEX for Pixel 6/7, necessary for camera and pKVM
- Also drop hack removing pKVM for Pixel 6/7
- patch from GrapheneOS
- Extend hmalloc workaround to /apex
- Deblobber:
- actually handle wildcard f/w/b overlays
- move some stuff around
- remove some more Pixel blobs
- flag and disable removal of camera extensions, being able to use the second camera is nice
- Adjust what hardenDefconfig disables, caused boot issues
minimal impact as most of these are already default-disabled
can be narrowed down in future
- Disable some of the bionic hardening patches, causing more boot issues
annoying to lose, but having a phone that boots is more important
- Add LTE only mode to 17.1, 18.1, 19.1, and 20.0, credit GrapheneOS
- Remove Pixel 2 ramdisk compression reverts, fixed upstream
And yes, I know I should've split up this commit...
Signed-off-by: Tad <tad@spotco.us>
2022-12-23 22:00:31 -05:00
|
|
|
blobs=$blobs"|dnd.descriptor|dnd.sound_model|music_detector.descriptor|music_detector.sound_model|matcher_tah.leveldb";
|
2019-03-21 08:55:01 -04:00
|
|
|
|
2019-03-23 12:49:58 -04:00
|
|
|
#[Motorola] #See: http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html
|
2020-10-20 07:20:40 -04:00
|
|
|
blobs=$blobs"|BuaContactAdapter.apk|com.motorola.DirectedSMSProxy.xml|com.motorola.msimsettings.xml";
|
2019-03-23 17:33:39 -04:00
|
|
|
blobs=$blobs"|MotoDisplayFWProxy.apk|com.motorola.motodisplay.xml";
|
|
|
|
blobs=$blobs"|com.motorola.camera.xml|com.motorola.gallery.xml";
|
|
|
|
blobs=$blobs"|EasyAccessService.apk";
|
2019-03-23 20:15:38 -04:00
|
|
|
blobs=$blobs"|batt_health";
|
|
|
|
#blobs=$blobs"|dbvc_atvc_property_set";
|
2019-03-23 17:33:39 -04:00
|
|
|
blobs=$blobs"|com.motorola.motosignature.jar|com.motorola.motosignature.xml|MotoSignatureApp.apk";
|
|
|
|
blobs=$blobs"|TriggerEnroll.apk|TriggerTrainingService.apk|com.motorola.triggerenroll.xml";
|
2020-07-19 16:10:48 -04:00
|
|
|
blobs=$blobs"|audio.motvr.default.so";
|
2019-03-23 20:15:38 -04:00
|
|
|
blobs=$blobs"|libcce-socketjni.so|libmotocare.so";
|
|
|
|
#blobs=$blobs"|qmi_motext_hook|libmdmcutback.so|libqmimotext.so|libmotext_inf.so"; #necessary for radio
|
2018-02-11 23:50:18 -05:00
|
|
|
makes=$makes"|com.motorola.cameraone.xml";
|
|
|
|
|
2022-05-02 23:38:55 -04:00
|
|
|
#OEMLock (disables OEM unlock toggle) [Google?]
|
|
|
|
#XXX: cannot be removed because the AOSP no-op service just uses the PDB
|
|
|
|
#blobs=$blobs"|oemlock-bridge|oemlock-bridge-client|oemlock_provision";
|
|
|
|
#blobs=$blobs"|android.hardware.oemlock.*";
|
|
|
|
#blobs=$blobs"|liboemlock.so|liboemlock.*.so|liboemlock-provision.so";
|
|
|
|
#makes=$makes"|android.hardware.oemlock.*";
|
|
|
|
#manifests=$manifests"|OemLock";
|
2022-05-07 20:22:49 -04:00
|
|
|
overlay=$overlay"|config_persistentDataPackageName";
|
2022-05-02 23:38:55 -04:00
|
|
|
|
2019-03-23 12:49:58 -04:00
|
|
|
#OMA-DM/SyncML #See: https://www.blackhat.com/docs/us-14/materials/us-14-Solnik-Cellular-Exploitation-On-A-Global-Scale-The-Rise-And-Fall-Of-The-Control-Protocol.pdf
|
|
|
|
blobs=$blobs"|SyncMLSvc.apk|libsyncml_core.so|libsyncml_port.so"; #SyncML
|
|
|
|
blobs=$blobs"|libvdmengine.so|libvdmfumo.so"; #RedBend
|
|
|
|
blobs=$blobs"|libdme_main.so|libwbxmlparser.so|libprovlib.so";
|
|
|
|
blobs=$blobs"|dm_agent|dm_agent_binder";
|
|
|
|
blobs=$blobs"|npsmobex"; #Samsung?
|
2023-07-22 15:03:58 -04:00
|
|
|
blobs=$blobs"|ConnMO.apk|OmaDmclient.apk|SprintHiddenMenu.apk|UpdateSetting.apk|USCCDM.apk|com.android.omadm.service.xml|com.android.omadm.radioconfig.xml|DCMO.apk|DiagMon.apk|DMConfigUpdate.apk|DMConfigUpdateLight.apk|DMService.apk|libdmengine.so|libdmjavaplugin.so|SprintDM.apk|SDM.apk|whitelist_com.android.omadm.service.xml|com.android.sdm.plugins.connmo.xml|com.android.sdm.plugins.sprintdm.xml|com.google.omadm.trigger.xml|com.android.sdm.plugins.diagmon.xml|com.android.sdm.plugins.dcmo.xml|com.android.sdm.plugins.usccdm.xml"; #Sprint
|
2023-08-29 19:46:57 -04:00
|
|
|
makes=$makes"|OmaDmclient|SprintHiddenMenu|UpdateSetting|SecPhone|HiddenMenu|DMConfigUpdate|SprintDM"; #SDM
|
2019-03-23 12:49:58 -04:00
|
|
|
|
2019-03-23 20:15:38 -04:00
|
|
|
#OpenMobileAPI [SIM Alliance]
|
|
|
|
#https://github.com/seek-for-android/platform_packages_apps_SmartCardService
|
|
|
|
#blobs=$blobs"|org.simalliance.openmobileapi.jar";
|
|
|
|
#blobs=$blobs"|org.simalliance.openmobileapi.xml";
|
|
|
|
|
2018-02-11 23:50:18 -05:00
|
|
|
#Performance [Qualcomm]
|
|
|
|
#blobs=$blobs"|msm_irqbalance";
|
|
|
|
#Devices utilizing perfd won't hotplug cores without it
|
2019-03-23 17:33:39 -04:00
|
|
|
#blobs=$blobs"|mpdecision|perfd";
|
2022-05-21 23:46:24 -04:00
|
|
|
#blobs=$blobs"|libqti-perfd.*.so|libperfconfig.so|libperfgluelayer.so|libperfioctl.so";
|
2019-03-23 17:33:39 -04:00
|
|
|
#blobs=$blobs"|perf-profile.*.conf";
|
2022-05-21 23:46:24 -04:00
|
|
|
#blobs=$blobs"|vendor.qti.hardware.perf.*|vendor.qti.memory.pasrmanager.*";
|
|
|
|
#manifests=$manifests"|IPerf";
|
2019-03-21 08:55:01 -04:00
|
|
|
blobs=$blobs"|Perfdump.apk";
|
2018-02-11 23:50:18 -05:00
|
|
|
|
2018-06-30 19:52:46 -04:00
|
|
|
#Peripheral Manager
|
2020-10-22 15:24:17 -04:00
|
|
|
#https://source.codeaurora.org/quic/la/platform/system/peripheralmanager/ [headers]
|
2019-03-23 17:33:39 -04:00
|
|
|
#blobs=$blobs"|libperipheral_client.so|libspcom.so";
|
|
|
|
#blobs=$blobs"|pm-proxy|pm-service|spdaemon";
|
2018-06-30 19:52:46 -04:00
|
|
|
|
2019-09-02 20:00:39 -04:00
|
|
|
#Pixel Visual Core [Google]
|
|
|
|
#blobs=$blobs"|easelmanagerd";
|
|
|
|
#blobs=$blobs"|EaselServicePrebuilt.apk";
|
2021-08-09 23:39:16 -04:00
|
|
|
#blobs=$blobs"|libeaselcomm.so|libeaselcontrol.amber.so|libhdrplusclient.so|libhdrplusclientimpl.so|libhdrplusmessenger.so";
|
2019-09-02 20:00:39 -04:00
|
|
|
|
2018-02-11 23:50:18 -05:00
|
|
|
#Playready (DRM) [Microsoft]
|
2019-03-23 17:33:39 -04:00
|
|
|
blobs=$blobs"|prapp|scranton_RD";
|
2022-04-28 08:00:49 -04:00
|
|
|
blobs=$blobs"|libtzplayready.so|libdrmprplugin.so|libprdrmdecrypt.so|libprmediadrmdecrypt.so|libprmediadrmplugin.so|libseppr_hal.so|android.hardware.drm.*playready.*";
|
2019-03-23 17:33:39 -04:00
|
|
|
blobs=$blobs"|PR-ModelCert";
|
2019-03-23 12:49:58 -04:00
|
|
|
blobs=$blobs"|playread.*|hcheck.*";
|
2022-04-28 08:00:49 -04:00
|
|
|
makes=$makes"|android.hardware.drm.*playready.*";
|
2022-04-28 22:43:09 -04:00
|
|
|
manifests=$manifests"|playready";
|
2018-02-11 23:50:18 -05:00
|
|
|
|
2019-03-22 05:27:58 -04:00
|
|
|
#Power [Google]
|
|
|
|
blobs=$blobs"|LowPowerMonitorDevice.*.jar|PowerAnomaly.*.jar";
|
|
|
|
|
2018-02-11 23:50:18 -05:00
|
|
|
#Project Fi [Google]
|
|
|
|
blobs=$blobs"|Tycho.apk";
|
|
|
|
|
|
|
|
#Quickboot [Qualcomm]
|
2020-10-22 15:24:17 -04:00
|
|
|
#https://source.codeaurora.org/quic/la/platform/packages/apps/FastPowerOn/
|
2019-10-11 13:29:04 -04:00
|
|
|
blobs=$blobs"|power_off_alarm";
|
2019-03-21 08:55:01 -04:00
|
|
|
blobs=$blobs"|QuickBoot.apk|PowerOffAlarm.apk";
|
2019-10-11 13:29:04 -04:00
|
|
|
blobs=$blobs"|vendor.qti.hardware.alarm.*";
|
2018-02-11 23:50:18 -05:00
|
|
|
|
|
|
|
#QTI (Tethering Extensions) [Qualcomm]
|
2019-03-23 17:33:39 -04:00
|
|
|
blobs=$blobs"|libQtiTether.so";
|
|
|
|
blobs=$blobs"|QtiTetherService.apk";
|
2018-02-11 23:50:18 -05:00
|
|
|
|
2019-03-22 05:27:58 -04:00
|
|
|
#RIL [Qualcomm]
|
|
|
|
blobs=$blobs"|Asdiv.apk";
|
|
|
|
|
2019-03-21 08:55:01 -04:00
|
|
|
#[Samsung]
|
|
|
|
blobs=$blobs"|SystemUpdateUI.apk";
|
|
|
|
|
2018-02-11 23:50:18 -05:00
|
|
|
#SecProtect [Qualcomm]
|
|
|
|
blobs=$blobs"|SecProtect.apk";
|
|
|
|
|
2023-08-29 19:46:57 -04:00
|
|
|
#SecureUI [Qualcomm]
|
|
|
|
blobs=$blobs"|com.qualcomm.qti.services.secureui.*";
|
2023-09-04 14:18:32 -04:00
|
|
|
if [ "$DOS_VERSION" != "LineageOS-14.1" ]; then
|
|
|
|
blobs=$blobs"|lib-sec-disp.so|libSecureUILib.so|libsecureui.so|libsecureuisvc_jni.so|libsecureui_svcsock.so"; #XXX: Can break qseecomd
|
|
|
|
blobs=$blobs"|libHealthAuthClient.so|libHealthAuthJNI.so|libSecureExtAuthJNI.so";
|
|
|
|
fi;
|
2023-08-29 19:46:57 -04:00
|
|
|
blobs=$blobs"|libSampleAuthJNI.so|libSampleAuthJNIv1.so|libSampleExtAuthJNI.so|libSecureSampleAuthClient.so";
|
2021-10-23 15:19:51 -04:00
|
|
|
#blobs=$blobs"|libsdedrm.so"; #Direct Rendering Manager not evil DRM? #XXX: potential breakage
|
2023-08-29 22:58:52 -04:00
|
|
|
|
|
|
|
#TrustedUI [Qualcomm]
|
2019-10-11 13:29:04 -04:00
|
|
|
blobs=$blobs"|vendor.qti.hardware.tui.*";
|
2022-04-28 22:43:09 -04:00
|
|
|
manifests=$manifests"|tui_comm|trustedui";
|
2018-02-11 23:50:18 -05:00
|
|
|
|
2020-02-17 18:06:39 -05:00
|
|
|
#Soter (Biometric Auth) [Tencent]
|
|
|
|
blobs=$blobs"|SoterService.apk";
|
|
|
|
blobs=$blobs"|vendor.qti.hardware.soter.*";
|
2022-04-28 22:43:09 -04:00
|
|
|
manifests=$manifests"|ISoter|hardware.soter";
|
2020-02-17 18:06:39 -05:00
|
|
|
|
2018-02-11 23:50:18 -05:00
|
|
|
#[Sprint]
|
2020-11-15 08:16:23 -05:00
|
|
|
blobs=$blobs"|CQATest.apk|GCS.apk|HiddenMenu.apk|HiddenMenuLight.apk|LifetimeData.apk|SprintHM.apk|LifeTimerService.apk|SecPhone.apk|SprintMenu.apk";
|
2018-08-24 18:35:53 -04:00
|
|
|
ipcSec=$ipcSec"|238:4294967295:1001:3004";
|
2018-02-11 23:50:18 -05:00
|
|
|
|
|
|
|
#Thermal Throttling [Qualcomm]
|
2020-10-22 15:24:17 -04:00
|
|
|
#https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/thermal-engine/ [headers]
|
2019-03-23 17:33:39 -04:00
|
|
|
#blobs=$blobs"|thermal-engine";
|
|
|
|
#blobs=$blobs"|libthermalclient.so|libthermalioctl.so";
|
2018-02-11 23:50:18 -05:00
|
|
|
|
|
|
|
#Time Service [Qualcomm]
|
2020-10-22 15:24:17 -04:00
|
|
|
#https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/time-services/ [headers]
|
2018-06-24 01:27:33 -04:00
|
|
|
#Requires that android_hardware_sony_timekeep be included in repo manifest
|
2024-05-20 12:52:16 -04:00
|
|
|
#blobs=$blobs"|libtime_genoff.so"; #XXX: Breaks radio
|
|
|
|
#blobs=$blobs"|libTimeService.so";
|
|
|
|
#blobs=$blobs"|TimeService.apk";
|
|
|
|
#blobs=$blobs"|time_daemon";
|
2018-02-11 23:50:18 -05:00
|
|
|
|
2020-10-20 07:20:40 -04:00
|
|
|
#[T-Mobile]
|
|
|
|
blobs=$blobs"|TmobileGrsuPrebuilt.apk";
|
|
|
|
|
|
|
|
#Touchscreen [Qualcomm] XXX: breaks touch
|
|
|
|
#blobs=$blobs"|vendor.qti.hardware.improvetouch.*"; #TODO: test with just this line uncommented
|
|
|
|
#blobs=$blobs"|hbtp_daemon|hbtp_cmd.sh";
|
|
|
|
#blobs=$blobs"|libhbtpclient.so|libhbtpdsp.so|libhbtpfrmwk.so";
|
2022-04-28 22:43:09 -04:00
|
|
|
#manifests=$manifests"|improvetouch";
|
2020-10-20 07:20:40 -04:00
|
|
|
|
2018-02-11 23:50:18 -05:00
|
|
|
#Venus (Hardware Video Decoding) [Qualcomm]
|
2019-03-23 17:33:39 -04:00
|
|
|
#blobs=$blobs"|venus.*";
|
2018-02-11 23:50:18 -05:00
|
|
|
|
|
|
|
#[Verizon]
|
2019-08-26 14:36:48 -04:00
|
|
|
blobs=$blobs"|libmotricity.so|libakuaf.so";
|
2020-10-21 17:02:24 -04:00
|
|
|
blobs=$blobs"|com.qualcomm.location.vzw_library.jar|com.verizon.hardware.telephony.ehrpd.jar|com.verizon.hardware.telephony.lte.jar|com.verizon.ims.jar|VerizonUnifiedSettings.jar";
|
2022-02-10 15:36:44 -05:00
|
|
|
blobs=$blobs"|OemDmTrigger.apk|appdirectedsmspermission.apk|AppDirectedSMSService.apk|AppDirectedSMSProxy.apk|VerizonSSOEngine.apk|VZWAPNLib.apk|vzwapnpermission.apk|VZWAPNService.apk|VZWAVS.apk|VzwLcSilent.apk|vzw_msdc_api.apk|VzwOmaTrigger.apk|VerizonAuthDialog.apk|MyVerizonServices.apk|WfcActivation.apk|obdm_stub.apk|QAS_DVC_MSP.*.apk|Showcase.apk|LLKAgent.apk";
|
2020-10-21 17:02:24 -04:00
|
|
|
blobs=$blobs"|com.android.vzwomatrigger.xml|vzw_mvs_permissions.xml|obdm_permissions.xml|com.verizon.services.xml|features-verizon.xml|com.qualcomm.location.vzw_library.xml|com.verizon.apn.xml|com.verizon.embms.xml|com.verizon.hardware.telephony.ehrpd.xml|com.verizon.hardware.telephony.lte.xml|com.verizon.ims.xml|com.verizon.provider.xml|com.vzw.vzwapnlib.xml|vzw_sso_permissions.xml|com.vzw.hardware.lte.xml|com.vzw.hardware.ehrpd.xml|verizon_config_params.txt|com.verizon.llkagent.xml|vzw_mvs_sysconfig.xml";
|
2018-02-11 23:50:18 -05:00
|
|
|
|
|
|
|
#Voice Recognition
|
2020-02-19 22:07:57 -05:00
|
|
|
blobs=$blobs"|liblistenhardware.so|liblistenjni.so|liblisten.so|liblistensoundmodel.*.so|libqvop-service.so|librecoglib.so|libsupermodel.so|libtrainingcheck.so";
|
|
|
|
#blobs=$blobs"|libadpcmdec.so|sound_trigger.primary.*.so|libgcs.*.so|libsmwrapper.so";
|
2019-03-23 17:33:39 -04:00
|
|
|
blobs=$blobs"|audiomonitor|qvop-daemon";
|
|
|
|
blobs=$blobs"|HotwordEnrollment.apk|HotwordEnrollment.*.apk";
|
2021-03-26 16:32:02 -04:00
|
|
|
#blobs=$blobs"|es305_fw.bin"; #XXX: breaks audio
|
2021-01-01 20:16:19 -05:00
|
|
|
#blobs=$blobs"|aonvr1.bin|aonvr2.bin"; #XXX: required by adspd, likely for more than VR
|
2019-03-23 17:33:39 -04:00
|
|
|
blobs=$blobs"|vendor.qti.voiceprint.*";
|
2021-08-03 21:31:34 -04:00
|
|
|
blobs=$blobs"|com.android.hotwordenrollment.*";
|
2022-05-02 23:38:55 -04:00
|
|
|
#makes=$makes"|android.hardware.soundtrigger.*|libsoundtriggerservice|sound_trigger.*";
|
2020-02-19 22:07:57 -05:00
|
|
|
#makes=$makes"|sound_trigger_mixer_paths.xml|sound_trigger_platform_info.xml";
|
2018-02-11 23:50:18 -05:00
|
|
|
|
2020-10-20 07:20:40 -04:00
|
|
|
#Wi-Fi [Qualcomm]
|
2020-10-22 15:24:17 -04:00
|
|
|
#https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wigig/ [headers]
|
|
|
|
#https://source.codeaurora.org/quic/qsdk/oss/wigig-utils/ [useless]
|
2022-05-01 22:39:49 -04:00
|
|
|
blobs=$blobs"|wifilearner|wigighalsvc|wigignpt|fstman";
|
|
|
|
blobs=$blobs"|wigig-service.jar";
|
2020-10-22 15:24:17 -04:00
|
|
|
blobs=$blobs"|vendor.qti.hardware.wifi.wifilearner.*|vendor.qti.hardware.wigig.*";
|
2022-05-01 22:39:49 -04:00
|
|
|
blobs=$blobs"|libwigig_flashaccess.so|libwigig_pciaccess.so|libwigig_utils.so|libwigigsensing.so|libwigig.*.so";
|
|
|
|
manifests=$manifests"|wifilearner|wigig";
|
2020-10-20 07:20:40 -04:00
|
|
|
|
2020-10-22 15:24:17 -04:00
|
|
|
#Wfd (Wireless Display) [Qualcomm]
|
|
|
|
#https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wfd-commonsys/ [useless]
|
2021-12-13 00:10:50 -05:00
|
|
|
blobs=$blobs"|libmmrtpdecoder.so|libmmrtpencoder.so|libmmwfdinterface.so|libmmwfdsinkinterface.so|libmmwfdsrcinterface.so|libwfdavenhancements.so|libwfdclient.so|libwfdcodecv4l2_proprietary.so|libwfdcodecv4l2.so|libwfdcommonutils_proprietary.so|libwfdcommonutils.so|libwfdconfigutils_proprietary.so|libwfdconfigutils.so|libwfddisplayconfig_proprietary.so|libwfddisplayconfig.so|libwfdhaldsmanager.so|libwfdhdcpcp.so|libwfdhdcpservice_proprietary.so|libwfdmminterface_proprietary.so|libwfdmminterface.so|libwfdmmservice_proprietary.so|libwfdmmservice.so|libwfdmmsink.so|libwfdmmsrc_proprietary.so|libwfdmmsrc.so|libwfdmmsrc_system.so|libwfdmmutils.so|libwfdmodulehdcpsession.so|libwfdnative.so|libwfdrtsp_proprietary.so|libwfdrtsp.so|libwfdservice.so|libwfdsessionmodule.so|libwfdsinksm.so|libwfdsm.so|libwfdsourcesession_proprietary.so|libwfdsourcesm_proprietary.so|libwfduibcinterface_proprietary.so|libwfduibcinterface.so|libwfduibcsinkinterface_proprietary.so|libwfduibcsinkinterface.so|libwfduibcsink_proprietary.so|libwfduibcsink.so|libwfduibcsrcinterface_proprietary.so|libwfduibcsrcinterface.so|libwfduibcsrc_proprietary.so|libwfduibcsrc.so|libwfdutils_proprietary.so|libwfdaac.so";
|
2021-12-11 00:12:00 -05:00
|
|
|
blobs=$blobs"|wfdservice|wifidisplayhalservice|wfdhdcphalservice|wfdvndservice";
|
2019-03-23 17:33:39 -04:00
|
|
|
blobs=$blobs"|WfdService.apk";
|
|
|
|
blobs=$blobs"|WfdCommon.jar";
|
2021-12-11 00:12:00 -05:00
|
|
|
blobs=$blobs"|wfdvndservice.rc";
|
2019-03-23 17:33:39 -04:00
|
|
|
blobs=$blobs"|wfdconfigsink.xml|wfdconfig.xml";
|
2022-04-28 08:00:49 -04:00
|
|
|
blobs=$blobs"|com.qualcomm.qti.wifidisplayhal.*|vendor.qti.hardware.wifidisplaysession.*|android.hardware.drm.*wfdhdcp.*";
|
|
|
|
makes=$makes"|WfdCommon|android.hardware.drm.*wfdhdcp.*";
|
2022-04-28 22:43:09 -04:00
|
|
|
manifests=$manifests"|wfdhdcp|wifidisplayhdcphal|WifiDisplay";
|
2018-02-11 23:50:18 -05:00
|
|
|
|
|
|
|
#Widevine (DRM) [Google]
|
2022-04-28 08:00:49 -04:00
|
|
|
blobs=$blobs"|libdrmwvmplugin.so|libmarlincdmplugin.so|libwvdrmengine.so|libwvdrm_L1.so|libwvdrm_L3.so|libwvhidl.so|libwvm.so|libWVphoneAPI.so|libWVStreamControlAPI_L1.so|libWVStreamControlAPI_L3.so|libdrmmtkutil.so|libsepdrm.*.so|libvtswidevine32.so|libvtswidevine64.so|android.hardware.drm.*widevine.*";
|
2019-03-23 17:33:39 -04:00
|
|
|
blobs=$blobs"|test-wvdrmplugin|oemwvtest";
|
|
|
|
blobs=$blobs"|com.google.widevine.software.drm.jar";
|
|
|
|
blobs=$blobs"|com.google.widevine.software.drm.xml";
|
2020-10-20 07:20:40 -04:00
|
|
|
#blobs=$blobs"|smc_pa_wvdrm.ift"; breaks maguro/toro* boot
|
2018-05-11 06:50:57 -04:00
|
|
|
blobs=$blobs"|tzwidevine.*|tzwvcpybuf.*|widevine.*";
|
2022-04-28 08:00:49 -04:00
|
|
|
makes=$makes"|libshim_wvm|move_widevine_data.sh|android.hardware.drm.*widevine.*";
|
2018-02-11 23:50:18 -05:00
|
|
|
|
|
|
|
#WiPower (Wireless Charging) [Qualcomm]
|
2019-03-23 17:33:39 -04:00
|
|
|
blobs=$blobs"|libwbc_jni.so|wbc_hal.default.so";
|
|
|
|
blobs=$blobs"|a4wpservice.apk|com.quicinc.wbcserviceapp.apk";
|
|
|
|
blobs=$blobs"|com.quicinc.wbc.jar|com.quicinc.wbcservice.jar";
|
|
|
|
blobs=$blobs"|com.quicinc.wbcservice.xml|com.quicinc.wbc.xml";
|
2018-02-11 23:50:18 -05:00
|
|
|
makes=$makes"|android.wipower|android.wipower.xml|com.quicinc.wbcserviceapps|libwipower_jni|wipowerservice";
|
|
|
|
|
|
|
|
export blobs;
|
|
|
|
export makes;
|
|
|
|
export overlay;
|
2018-08-24 18:35:53 -04:00
|
|
|
export ipcSec;
|
2018-02-11 23:50:18 -05:00
|
|
|
export kernels;
|
2022-04-28 22:43:09 -04:00
|
|
|
export manifests;
|
2018-02-11 23:50:18 -05:00
|
|
|
#
|
|
|
|
#END OF BLOBS ARRAY
|
|
|
|
#
|
|
|
|
|
|
|
|
#
|
|
|
|
#START OF FUNCTIONS
|
|
|
|
#
|
|
|
|
deblobDevice() {
|
2019-09-17 00:55:50 -04:00
|
|
|
local devicePath="$1";
|
2023-03-08 00:22:01 -05:00
|
|
|
cd "$DOS_BUILD_BASE/$devicePath";
|
2018-02-11 23:50:18 -05:00
|
|
|
if [ -f Android.mk ]; then
|
|
|
|
#Some devices store these in a dedicated firmware partition, others in /system/vendor/firmware, either way the following are just symlinks
|
2018-06-25 07:59:24 -04:00
|
|
|
#sed -i '/ALL_DEFAULT_INSTALLED_MODULES/s/$(CMN_SYMLINKS)//' Android.mk; #Remove CMN firmware
|
2022-05-21 13:37:13 -04:00
|
|
|
if [ "$DOS_DEBLOBBER_REMOVE_CNE" = true ]; then sed -i '/ALL_DEFAULT_INSTALLED_MODULES/s/$(CNE_SYMLINKS)//' Android.mk; fi; #Remove CNE blobs
|
|
|
|
sed -i '/ALL_DEFAULT_INSTALLED_MODULES/s/$(DM_SYMLINKS)//' Android.mk; #Remove OMA-DM blobs
|
2018-02-11 23:50:18 -05:00
|
|
|
sed -i '/ALL_DEFAULT_INSTALLED_MODULES/s/$(DXHDCP2_SYMLINKS)//' Android.mk; #Remove Discretix firmware
|
2018-06-29 00:55:21 -04:00
|
|
|
if [ "$DOS_DEBLOBBER_REMOVE_IMS" = true ]; then sed -i '/ALL_DEFAULT_INSTALLED_MODULES/s/$(IMS_SYMLINKS)//' Android.mk; fi; #Remove IMS firmware
|
2018-02-11 23:50:18 -05:00
|
|
|
sed -i '/ALL_DEFAULT_INSTALLED_MODULES/s/$(PLAYREADY_SYMLINKS)//' Android.mk; #Remove Microsoft Playready firmware
|
2023-08-29 19:46:57 -04:00
|
|
|
sed -i '/ALL_DEFAULT_INSTALLED_MODULES/s/$(SECUREUI_SYMLINKS)//' Android.mk; #Remove SecureUI blobs
|
2018-02-11 23:50:18 -05:00
|
|
|
sed -i '/ALL_DEFAULT_INSTALLED_MODULES/s/$(WIDEVINE_SYMLINKS)//' Android.mk; #Remove Google Widevine firmware
|
|
|
|
sed -i '/ALL_DEFAULT_INSTALLED_MODULES/s/$(WV_SYMLINKS)//' Android.mk; #Remove Google Widevine firmware
|
|
|
|
fi;
|
2020-11-02 19:13:32 -05:00
|
|
|
if [ "$DOS_DEBLOBBER_REMOVE_CNE" = true ]; then sed -i 's/BOARD_USES_QCNE := true/BOARD_USES_QCNE := false/' BoardConfig*.mk &>/dev/null || true; fi; #Disable CNE
|
2020-02-19 22:07:57 -05:00
|
|
|
sed -i 's/BOARD_USES_WIPOWER := true/BOARD_USES_WIPOWER := false/' BoardConfig*.mk &>/dev/null || true; #Disable WiPower
|
|
|
|
sed -i 's/TARGET_HAS_HDR_DISPLAY := true/TARGET_HAS_HDR_DISPLAY := false/' BoardConfig*.mk &>/dev/null || true; #Disable HDR
|
2021-01-18 09:11:37 -05:00
|
|
|
sed -i 's/BOARD_SUPPORTS_SOUND_TRIGGER := true/BOARD_SUPPORTS_SOUND_TRIGGER := false/' BoardConfig*.mk &>/dev/null || true; #Disable Sound Trigger
|
|
|
|
sed -i 's/BOARD_SUPPORTS_SOUND_TRIGGER_HAL := true/BOARD_SUPPORTS_SOUND_TRIGGER_HAL := false/' BoardConfig*.mk &>/dev/null || true;
|
|
|
|
sed -i 's/BOARD_SUPPORTS_SOUND_TRIGGER_5514 := true/BOARD_SUPPORTS_SOUND_TRIGGER_5514 := false/' BoardConfig*.mk &>/dev/null || true;
|
2022-02-21 23:30:45 -05:00
|
|
|
if [ "$DOS_DEBLOBBER_REMOVE_AUDIOFX" = true ]; then sed -i 's/AUDIO_FEATURE_ENABLED_DS2_DOLBY_DAP := true/AUDIO_FEATURE_ENABLED_DS2_DOLBY_DAP := false/' BoardConfig*.mk &>/dev/null || true; fi; #Disable Dolby
|
2020-02-19 22:07:57 -05:00
|
|
|
sed -i 's/BOARD_ANT_WIRELESS_DEVICE := true/BOARD_ANT_WIRELESS_DEVICE := false/' BoardConfig*.mk &>/dev/null || true; #Disable ANT
|
2020-02-23 20:51:13 -05:00
|
|
|
awk -i inplace '!/BOARD_ANT_WIRELESS_DEVICE/' BoardConfig*.mk &>/dev/null || true;
|
2024-05-20 12:52:16 -04:00
|
|
|
#awk -i inplace '!/RS_DRIVER/' BoardConfig*.mk &>/dev/null || true; #Renderscript
|
2020-02-19 22:07:57 -05:00
|
|
|
|
2023-07-24 03:59:03 -04:00
|
|
|
sed -i '/loc.nlp_name/d' *.prop *.mk &>/dev/null || true; #Disable QC Location Provider
|
2021-01-18 07:11:54 -05:00
|
|
|
sed -i 's/drm.service.enabled=true/drm.service.enabled=false/' *.prop *.mk &>/dev/null || true;
|
2022-02-21 23:30:45 -05:00
|
|
|
if [ "$DOS_DEBLOBBER_REMOVE_APTX" = true ]; then sed -i 's/bt.enableAptXHD=true/bt.enableAptXHD=false/' *.prop *.mk &>/dev/null || true; fi; #Disable aptX
|
2021-01-18 07:11:54 -05:00
|
|
|
if [ "$DOS_DEBLOBBER_REMOVE_CNE" = true ]; then sed -i 's/cne.feature=./cne.feature=0/' *.prop *.mk &>/dev/null || true; fi; #Disable CNE
|
2021-10-23 15:19:51 -04:00
|
|
|
if [ "$DOS_DEBLOBBER_REMOVE_DPM" = true ]; then
|
|
|
|
sed -i 's/dpm.feature=11/dpm.feature=0/' *.prop *.mk &>/dev/null || true; #Disable DPM
|
|
|
|
sed -i 's/dpm.feature=./dpm.feature=0/' *.prop *.mk &>/dev/null || true; #Disable DPM
|
|
|
|
sed -i 's/sys.dpmd.nsrm=./sys.dpmd.nsrm=0/' *.prop *.mk &>/dev/null || true; #Disable DPM
|
|
|
|
fi;
|
2021-01-18 07:11:54 -05:00
|
|
|
sed -i 's/gps.qc_nlp_in_use=./gps.qc_nlp_in_use=0/' *.prop *.mk &>/dev/null || true; #Disable QC Location Provider
|
|
|
|
sed -i 's/bluetooth.emb_wp_mode=true/bluetooth.emb_wp_mode=false/' *.prop *.mk &>/dev/null || true; #Disable WiPower
|
|
|
|
sed -i 's/bluetooth.wipower=true/bluetooth.wipower=false/' *.prop *.mk &>/dev/null || true; #Disable WiPower
|
2021-01-29 20:37:43 -05:00
|
|
|
sed -i 's/wfd.enable=1/wfd.enable=0/' *.prop *.mk &>/dev/null || true; #Disable Wi-Fi display
|
2023-07-24 14:13:51 -04:00
|
|
|
sed -i '/vendor.camera.extensions/d' *.prop *.mk &>/dev/null || true; #Disable camera extensions
|
2018-02-11 23:50:18 -05:00
|
|
|
if [ -f system.prop ]; then
|
2024-08-07 14:50:53 -04:00
|
|
|
if ! grep -q "drm.service.enabled=false" system.prop; then echo -e "\ndrm.service.enabled=false\n" >> system.prop; fi; #Disable DRM server
|
2020-02-19 22:07:57 -05:00
|
|
|
fi
|
|
|
|
if [ "$DOS_DEBLOBBER_REMOVE_IMS" = true ]; then
|
2021-01-18 07:11:54 -05:00
|
|
|
sed -i 's/ims.volte=true/ims.volte=false/' *.prop *.mk &>/dev/null || true;
|
|
|
|
sed -i 's/ims.vt=true/ims.vt=false/' *.prop *.mk &>/dev/null || true;
|
|
|
|
sed -i 's/radio.calls.on.ims=true/radio.calls.on.ims=false/' *.prop *.mk &>/dev/null || true;
|
|
|
|
sed -i 's/radio.calls.on.ims=1/radio.calls.on.ims=0/' *.prop *.mk &>/dev/null || true;
|
|
|
|
sed -i 's/radio.hw_mbn_update=./radio.hw_mbn_update=0/' *.prop *.mk &>/dev/null || true;
|
|
|
|
sed -i 's/radio.jbims=./radio.jbims=0/' *.prop *.mk &>/dev/null || true;
|
|
|
|
sed -i 's/radio.sw_mbn_update=./radio.sw_mbn_update=0/' *.prop *.mk &>/dev/null || true;
|
|
|
|
sed -i 's/radio.sw_mbn_volte=./radio.sw_mbn_volte=0/' *.prop *.mk &>/dev/null || true;
|
|
|
|
sed -i 's/radio.VT_ENABLE=./radio.VT_ENABLE=0/' *.prop *.mk &>/dev/null || true;
|
|
|
|
sed -i 's/radio.VT_HYBRID_ENABLE=./radio.VT_HYBRID_ENABLE=0/' *.prop *.mk &>/dev/null || true;
|
|
|
|
sed -i 's/volte_enabled_by_hw=./volte_enabled_by_hw=0/' *.prop *.mk &>/dev/null || true;
|
|
|
|
sed -i 's/dbg.ims_volte_enable=./dbg.ims_volte_enable=0/' *.prop *.mk &>/dev/null || true;
|
|
|
|
sed -i 's/dbg.volte_avail_ovr=1/dbg.volte_avail_ovr=0/' *.prop *.mk &>/dev/null || true;
|
|
|
|
sed -i 's/dbg.vt_avail_ovr=1/dbg.vt_avail_ovr=0/' *.prop *.mk &>/dev/null || true;
|
Many fixes to get bluejay booting & working proper
- Enable APEX for Pixel 6/7, necessary for camera and pKVM
- Also drop hack removing pKVM for Pixel 6/7
- patch from GrapheneOS
- Extend hmalloc workaround to /apex
- Deblobber:
- actually handle wildcard f/w/b overlays
- move some stuff around
- remove some more Pixel blobs
- flag and disable removal of camera extensions, being able to use the second camera is nice
- Adjust what hardenDefconfig disables, caused boot issues
minimal impact as most of these are already default-disabled
can be narrowed down in future
- Disable some of the bionic hardening patches, causing more boot issues
annoying to lose, but having a phone that boots is more important
- Add LTE only mode to 17.1, 18.1, 19.1, and 20.0, credit GrapheneOS
- Remove Pixel 2 ramdisk compression reverts, fixed upstream
And yes, I know I should've split up this commit...
Signed-off-by: Tad <tad@spotco.us>
2022-12-23 22:00:31 -05:00
|
|
|
sed -i 's|<bool name="config_carrier_volte_available">true</bool>|<bool name="config_carrier_volte_available">false</bool>|' overlay*/frameworks/base/core/res/res/values/config.xml &>/dev/null || true;
|
|
|
|
sed -i 's|<bool name="config_carrier_vt_available">true</bool>|<bool name="config_carrier_vt_available">false</bool>|' overlay*/frameworks/base/core/res/res/values/config.xml &>/dev/null || true;
|
|
|
|
sed -i 's|<bool name="config_device_volte_available">true</bool>|<bool name="config_device_volte_available">false</bool>|' overlay*/frameworks/base/core/res/res/values/config.xml &>/dev/null || true;
|
|
|
|
sed -i 's|<bool name="config_device_vt_available">true</bool>|<bool name="config_device_vt_available">false</bool>|' overlay*/frameworks/base/core/res/res/values/config.xml &>/dev/null || true;
|
|
|
|
sed -i 's|<bool name="config_dynamic_bind_ims">true</bool>|<bool name="config_dynamic_bind_ims">false</bool>|' overlay*/frameworks/base/core/res/res/values/config.xml &>/dev/null || true;
|
|
|
|
awk -i inplace '!/config_ims_package/' overlay*/frameworks/base/core/res/res/values/config.xml &>/dev/null || true;
|
2021-01-18 07:11:54 -05:00
|
|
|
fi;
|
|
|
|
if [ "$DOS_DEBLOBBER_REMOVE_IMS" = true ] || [ "$DOS_DEBLOBBER_REMOVE_CNE" = true ]; then
|
|
|
|
sed -i 's/data.iwlan.enable=true/data.iwlan.enable=false/' *.prop *.mk &>/dev/null || true;
|
|
|
|
sed -i 's/dbg.wfc_avail_ovr=1/dbg.wfc_avail_ovr=0/' *.prop *.mk &>/dev/null || true;
|
Many fixes to get bluejay booting & working proper
- Enable APEX for Pixel 6/7, necessary for camera and pKVM
- Also drop hack removing pKVM for Pixel 6/7
- patch from GrapheneOS
- Extend hmalloc workaround to /apex
- Deblobber:
- actually handle wildcard f/w/b overlays
- move some stuff around
- remove some more Pixel blobs
- flag and disable removal of camera extensions, being able to use the second camera is nice
- Adjust what hardenDefconfig disables, caused boot issues
minimal impact as most of these are already default-disabled
can be narrowed down in future
- Disable some of the bionic hardening patches, causing more boot issues
annoying to lose, but having a phone that boots is more important
- Add LTE only mode to 17.1, 18.1, 19.1, and 20.0, credit GrapheneOS
- Remove Pixel 2 ramdisk compression reverts, fixed upstream
And yes, I know I should've split up this commit...
Signed-off-by: Tad <tad@spotco.us>
2022-12-23 22:00:31 -05:00
|
|
|
sed -i 's|<bool name="config_device_wfc_ims_available">true</bool>|<bool name="config_device_wfc_ims_available">false</bool>|' overlay*/frameworks/base/core/res/res/values/config.xml &>/dev/null || true;
|
|
|
|
sed -i 's|<bool name="config_carrier_wfc_ims_available">true</bool>|<bool name="config_carrier_wfc_ims_available">false</bool>|' overlay*/frameworks/base/core/res/res/values/config.xml &>/dev/null || true;
|
2018-02-11 23:50:18 -05:00
|
|
|
fi;
|
2020-10-21 17:02:24 -04:00
|
|
|
if [ "$DOS_DEBLOBBER_REMOVE_IMS" = true ] || [ "$DOS_DEBLOBBER_REMOVE_RCS" = true ]; then
|
2021-01-18 07:11:54 -05:00
|
|
|
sed -i 's/rcs.supported=./rcs.supported=0/' *.prop *.mk &>/dev/null || true; #Disable RCS
|
2020-10-21 17:02:24 -04:00
|
|
|
fi;
|
2018-02-11 23:50:18 -05:00
|
|
|
if [ -f configs/qmi_config.xml ]; then
|
2021-10-23 15:19:51 -04:00
|
|
|
if [ "$DOS_DEBLOBBER_REMOVE_DPM" = true ]; then
|
|
|
|
sed -i 's|name="dpm_enabled" type="int"> 1 <|name="dpm_enabled" type="int"> 0 <|' configs/qmi_config.xml; #Disable DPM
|
|
|
|
fi;
|
2018-02-11 23:50:18 -05:00
|
|
|
fi;
|
2024-05-29 12:04:44 -04:00
|
|
|
# shellcheck disable=SC2144
|
2018-02-11 23:50:18 -05:00
|
|
|
if [ -f init/init_*.cpp ]; then
|
|
|
|
#Disable IMS
|
2018-06-29 00:55:21 -04:00
|
|
|
if [ "$DOS_DEBLOBBER_REMOVE_IMS" = true ]; then
|
2020-02-19 22:07:57 -05:00
|
|
|
sed -i 's/property_set("persist.ims.volte", "true");/property_set("persist.ims.volte", "false");/' init/init_*.cpp;
|
|
|
|
sed -i 's/property_set("persist.ims.vt", "true");/property_set("persist.ims.vt", "false");/' init/init_*.cpp;
|
|
|
|
sed -i 's/property_set("persist.radio.calls.on.ims", "true");/property_set("persist.radio.calls.on.ims", "false");/' init/init_*.cpp;
|
|
|
|
sed -i 's/property_set("persist.radio.jbims", ".");/property_set("persist.radio.jbims", "0");/' init/init_*.cpp;
|
|
|
|
sed -i 's/property_set("persist.radio.VT_ENABLE", ".");/property_set("persist.radio.VT_ENABLE", "0");/' init/init_*.cpp;
|
|
|
|
sed -i 's/property_set("persist.radio.VT_HYBRID_ENABLE", ".");/property_set("persist.radio.VT_HYBRID_ENABLE", "0");/' init/init_*.cpp;
|
2018-06-13 07:07:47 -04:00
|
|
|
fi;
|
2020-10-21 17:02:24 -04:00
|
|
|
if [ "$DOS_DEBLOBBER_REMOVE_IMS" = true ] || [ "$DOS_DEBLOBBER_REMOVE_RCS" = true ]; then
|
|
|
|
sed -i 's/property_set("persist.rcs.supported", ".");/property_set("persist.rcs.supported", "0");/' init/init_*.cpp; #Disable RCS
|
|
|
|
fi;
|
2018-02-11 23:50:18 -05:00
|
|
|
fi;
|
Many fixes to get bluejay booting & working proper
- Enable APEX for Pixel 6/7, necessary for camera and pKVM
- Also drop hack removing pKVM for Pixel 6/7
- patch from GrapheneOS
- Extend hmalloc workaround to /apex
- Deblobber:
- actually handle wildcard f/w/b overlays
- move some stuff around
- remove some more Pixel blobs
- flag and disable removal of camera extensions, being able to use the second camera is nice
- Adjust what hardenDefconfig disables, caused boot issues
minimal impact as most of these are already default-disabled
can be narrowed down in future
- Disable some of the bionic hardening patches, causing more boot issues
annoying to lose, but having a phone that boots is more important
- Add LTE only mode to 17.1, 18.1, 19.1, and 20.0, credit GrapheneOS
- Remove Pixel 2 ramdisk compression reverts, fixed upstream
And yes, I know I should've split up this commit...
Signed-off-by: Tad <tad@spotco.us>
2022-12-23 22:00:31 -05:00
|
|
|
awk -i inplace '!/'$overlay'/' overlay*/frameworks/base/core/res/res/values/config.xml &>/dev/null || true;
|
|
|
|
sed -i 's|<bool name="config_enableWifiDisplay">true</bool>|<bool name="config_enableWifiDisplay">false</bool>|' overlay*/frameworks/base/core/res/res/values/config.xml &>/dev/null || true;
|
|
|
|
sed -i 's|<bool name="config_uiBlurEnabled">true</bool>|<bool name="config_uiBlurEnabled">false</bool>|' overlay*/frameworks/base/core/res/res/values/config.xml &>/dev/null || true; #Disable UIBlur
|
|
|
|
awk -i inplace '!/platform_carrier_config_package/' overlay*/packages/services/Telephony/res/values/config.xml &>/dev/null || true;
|
|
|
|
awk -i inplace '!/config_show_adaptive_connectivity/' overlay*/packages/apps/Settings/res/values/config.xml &>/dev/null || true;
|
2020-11-02 19:13:32 -05:00
|
|
|
if [ "$DOS_DEBLOBBER_REMOVE_CNE" = true ]; then rm -f board/qcom-cne.mk product/qcom-cne.mk; fi; #Remove CNE
|
|
|
|
if [ "$DOS_DEBLOBBER_REMOVE_IMS" = true ]; then
|
|
|
|
rm -f rootdir/etc/init.qti.ims.sh rootdir/init.qti.ims.sh init.qti.ims.sh; #Remove IMS startup script
|
|
|
|
rm -rf IMSEnabler; #Remove IMS compatibility module
|
|
|
|
fi;
|
2020-02-17 18:06:39 -05:00
|
|
|
rm -rf ifaa org.ifaa.android.manager; #Remove AliPay
|
2018-08-24 18:35:53 -04:00
|
|
|
if [ "$DOS_DEBLOBBER_REMOVE_IPA" = true ]; then rm -rf data-ipa-cfg-mgr; fi; #Remove IPA
|
2021-09-06 04:18:27 -04:00
|
|
|
rm -rf libshim_wvm libshimwvm libshims/wvm_shim.cpp; #Remove Google Widevine compatibility module
|
2018-02-11 23:50:18 -05:00
|
|
|
rm -rf board/qcom-wipower.mk product/qcom-wipower.mk; #Remove WiPower makefiles
|
2020-02-19 22:07:57 -05:00
|
|
|
#awk -i inplace '!/'$ipcSec'/' configs/sec_config &>/dev/null || true; #Remove all IPC security exceptions from sec_config
|
2018-09-21 16:32:02 -04:00
|
|
|
awk -i inplace '!/'$blobs'/' ./*proprietary*.txt &>/dev/null || true; #Remove all blob references from blob manifest
|
2019-03-21 17:13:26 -04:00
|
|
|
awk -i inplace '!/'$blobs'/' ./*/*proprietary*.txt &>/dev/null || true; #Remove all blob references from blob manifest location in subdirectory
|
2018-02-11 23:50:18 -05:00
|
|
|
if [ -f setup-makefiles.sh ]; then
|
2023-03-08 00:22:01 -05:00
|
|
|
bash -c "cd $DOS_BUILD_BASE/$devicePath && ./setup-makefiles.sh" || true; #Update the makefiles
|
2018-02-11 23:50:18 -05:00
|
|
|
fi;
|
2018-06-29 00:55:21 -04:00
|
|
|
cd "$DOS_BUILD_BASE";
|
2018-02-11 23:50:18 -05:00
|
|
|
}
|
|
|
|
export -f deblobDevice;
|
|
|
|
|
|
|
|
deblobKernel() {
|
2019-09-17 00:55:50 -04:00
|
|
|
local kernelPath="$1";
|
2023-03-08 00:22:01 -05:00
|
|
|
cd "$DOS_BUILD_BASE/$kernelPath";
|
2018-06-23 01:08:42 -04:00
|
|
|
rm -rf $kernels;
|
2018-06-29 00:55:21 -04:00
|
|
|
cd "$DOS_BUILD_BASE";
|
2018-02-11 23:50:18 -05:00
|
|
|
}
|
|
|
|
export -f deblobKernel;
|
|
|
|
|
|
|
|
deblobVendors() {
|
2018-06-29 00:55:21 -04:00
|
|
|
cd "$DOS_BUILD_BASE";
|
2018-06-23 01:08:42 -04:00
|
|
|
find vendor -regextype posix-extended -regex '.*('$blobs')' -type f -delete; #Delete all blobs
|
2018-02-11 23:50:18 -05:00
|
|
|
}
|
|
|
|
export -f deblobVendors;
|
|
|
|
|
2021-04-04 17:06:47 -04:00
|
|
|
deblobVendorMk() {
|
2019-09-17 00:55:50 -04:00
|
|
|
local makefile="$1";
|
2018-06-29 00:55:21 -04:00
|
|
|
cd "$DOS_BUILD_BASE";
|
2018-06-23 01:08:42 -04:00
|
|
|
awk -i inplace '!/'$blobs'/' "$makefile"; #Remove all blob references from makefile
|
2018-02-11 23:50:18 -05:00
|
|
|
}
|
2021-04-04 17:06:47 -04:00
|
|
|
export -f deblobVendorMk;
|
|
|
|
|
|
|
|
deblobVendorBp() {
|
|
|
|
local bpfile="$1";
|
|
|
|
cd "$DOS_BUILD_BASE";
|
|
|
|
#TODO: remove these lines instead
|
|
|
|
sed -i -E "s/apk.*("$blobs").*/apk: \"proprietary\/priv-app\/qcrilmsgtunnel\/qcrilmsgtunnel.apk\", enabled: false,/g" "$bpfile";
|
|
|
|
sed -i -E "s/jars.*("$blobs").*/jars: \[\"proprietary\/system\/framework\/qcrilhook.jar\"\], enabled: false,/g" "$bpfile";
|
|
|
|
sed -i -E "s/srcs.*("$blobs").*/srcs: \[\"proprietary\/vendor\/lib\/libtime_genoff.so\"\], enabled: false,/g" "$bpfile";
|
|
|
|
#TODO make this work for more then these two blobs
|
|
|
|
#Credit: https://stackoverflow.com/a/26053127
|
2022-04-28 08:00:49 -04:00
|
|
|
sed -i ':a;N;s/\n/&/3;Ta;/manifest_android.hardware.drm@1.*-service.widevine.xml/!{P;D};:b;N;s/\n/&/8;Tb;d' "$bpfile";
|
2022-10-15 14:51:30 -04:00
|
|
|
sed -i ':a;N;s/\n/&/3;Ta;/manifest_android.hardware.drm-service.widevine.xml/!{P;D};:b;N;s/\n/&/8;Tb;d' "$bpfile";
|
2022-05-10 15:28:42 -04:00
|
|
|
sed -i ':a;N;s/\n/&/3;Ta;/manifest_vendor.xiaomi.hardware.mlipay.xml/!{P;D};:b;N;s/\n/&/8;Tb;d' "$bpfile";
|
2021-04-04 17:06:47 -04:00
|
|
|
sed -i ':a;N;s/\n/&/3;Ta;/vendor.qti.hardware.radio.atcmdfwd@1.0.xml/!{P;D};:b;N;s/\n/&/8;Tb;d' "$bpfile";
|
2024-05-20 18:26:50 -04:00
|
|
|
sed -i ':a;N;s/\n/&/3;Ta;/com.google.android.widevine-.*.apex/!{P;D};:b;N;s/\n/&/6;Tb;d' "$bpfile";
|
2023-09-02 10:28:52 -04:00
|
|
|
if [ "$DOS_DEBLOBBER_REMOVE_FACE" = true ]; then
|
|
|
|
sed -i ':a;N;s/\n/&/3;Ta;/android.hardware.biometrics.face-service.22.pixel.xml/!{P;D};:b;N;s/\n/&/8;Tb;d' "$bpfile";
|
|
|
|
sed -i ':a;N;s/\n/&/3;Ta;/manifest_face.xml/!{P;D};:b;N;s/\n/&/8;Tb;d' "$bpfile";
|
|
|
|
fi;
|
2021-04-04 17:06:47 -04:00
|
|
|
}
|
|
|
|
export -f deblobVendorBp;
|
2018-02-11 23:50:18 -05:00
|
|
|
#
|
|
|
|
#END OF FUNCTIONS
|
|
|
|
#
|
|
|
|
|
|
|
|
|
|
|
|
#
|
|
|
|
#START OF DEBLOBBING
|
|
|
|
#
|
2023-03-08 16:21:47 -05:00
|
|
|
cd "$DOS_BUILD_BASE";
|
2019-08-05 20:53:50 -04:00
|
|
|
find build -name "*.mk" -type f -print0 | xargs -0 -n 1 -P 8 -I {} bash -c 'awk -i inplace "!/$makes/" "{}"'; #Deblob all makefiles
|
2019-08-05 23:56:52 -04:00
|
|
|
find device -maxdepth 2 -mindepth 2 -type d -exec bash -c 'deblobDevice "$0"' {} \;; #Deblob all device directories
|
2021-08-09 18:02:39 -04:00
|
|
|
find device -name "*.mk" -type f -print0 | xargs -0 -n 1 -P 8 -I {} bash -c 'awk -i inplace "!/$makes/" "{}"'; #Deblob all makefiles
|
2020-10-20 07:20:40 -04:00
|
|
|
#find kernel -maxdepth 2 -mindepth 2 -type d -print0 | xargs -0 -n 1 -P 8 -I {} bash -c 'deblobKernel "{}"'; #Deblob all kernel directories
|
2021-04-04 17:06:47 -04:00
|
|
|
find vendor -name "*endor*.mk" -type f -print0 | xargs -0 -n 1 -P 8 -I {} bash -c 'deblobVendorMk "{}"'; #Deblob all makefiles
|
|
|
|
find vendor -name "Android.bp" -type f -print0 | xargs -0 -n 1 -P 8 -I {} bash -c 'deblobVendorBp "{}"'; #Deblob all makefiles
|
2022-05-07 20:22:49 -04:00
|
|
|
if [ "$DOS_VERSION" != "LineageOS-14.1" ]; then
|
2022-04-28 22:43:09 -04:00
|
|
|
perl -0777 -pe 's,(<hal.*?>.*?</hal>),$1 =~ /'$manifests'/?"":$1,gse' -i $(grep 'format="hidl"' "$DOS_BUILD_BASE/device" -ril); #Deblob all matrixes #Credit: https://unix.stackexchange.com/a/72160
|
|
|
|
perl -0777 -pe 's,(<hal.*?>.*?</hal>),$1 =~ /'$manifests'/?"":$1,gse' -i $(grep 'format="hidl"' "$DOS_BUILD_BASE/hardware/interfaces" -ril);
|
2022-05-07 20:22:49 -04:00
|
|
|
else
|
|
|
|
echo "Skipping manifest deblobbing";
|
|
|
|
fi;
|
2018-02-11 23:50:18 -05:00
|
|
|
deblobVendors; #Deblob entire vendor directory
|
2022-04-29 15:26:15 -04:00
|
|
|
rm -rf frameworks/av/drm/mediadrm/plugins/clearkey; #Remove ClearKey
|
|
|
|
#rm -rf frameworks/av/drm/mediacas/plugins/clearkey; #XXX: breaks protobuf inclusion
|
2023-03-08 00:22:01 -05:00
|
|
|
[[ -d vendor/samsung/nodevice ]] && rm -rf vendor/samsung/nodevice;
|
2023-08-20 15:52:12 -04:00
|
|
|
|
|
|
|
#Remove proprietary libraries
|
|
|
|
rm -rf external/firebase-messaging/* || true;
|
|
|
|
rm -rf prebuilts/tools/common/m2/repository/com/apple/AppleJavaExtensions || true;
|
|
|
|
rm -rf prebuilts/tools/common/m2/repository/com/cenqua/clover/clover || true;
|
|
|
|
rm -rf prebuilts/tools/common/m2/repository/com/crittercism || true;
|
|
|
|
rm -rf prebuilts/tools/common/m2/repository/com/facebook/android/facebook-android-sdk || true;
|
|
|
|
rm -rf prebuilts/tools/common/m2/repository/com/firebase/firebase-client-android || true;
|
|
|
|
rm -rf prebuilts/tools/common/m2/repository/com/firebase/firebase-client-jvm || true;
|
|
|
|
rm -rf prebuilts/tools/common/m2/repository/com/google/android/gms || true;
|
|
|
|
rm -rf prebuilts/tools/common/m2/repository/com/google/android/play || true;
|
|
|
|
rm -rf prebuilts/tools/common/m2/repository/com/helpshift || true;
|
|
|
|
#rm -rf prebuilts/tools/common/m2/repository/org/python/jython || true;
|
|
|
|
#Remove apps depending on proprietary libraries
|
|
|
|
rm -rf packages/apps/Car/DebuggingRestrictionController/* || true;
|
|
|
|
rm -rf packages/apps/ImsServiceEntitlement/* || true;
|
2018-02-11 23:50:18 -05:00
|
|
|
#
|
|
|
|
#END OF DEBLOBBING
|
|
|
|
#
|
|
|
|
|
2018-06-29 00:55:21 -04:00
|
|
|
cd "$DOS_BUILD_BASE";
|
2018-02-11 23:50:18 -05:00
|
|
|
|
2021-10-16 15:28:15 -04:00
|
|
|
echo -e "\e[0;32m[SCRIPT COMPLETE] Deblobbing complete\e[0m";
|