Keresés

Új hozzászólás Aktív témák

  • Orionhilles

    senior tag

    válasz Aryes #229 üzenetére

    A build.prop tartalma teljesen más, nem véletlenül, különböző szinte minden. A platform.xml szvsz. ua., nem néztem meg soronként, tippelem :B

    WayteQ: platform.xml:
    <?xml version="1.0" encoding="utf-8"?>
    <!-- Copyright (C) 2008 The Android Open Source Project

    Licensed under the Apache License, Version 2.0 (the "License");
    you may not use this file except in compliance with the License.
    You may obtain a copy of the License at

    http://www.apache.org/licenses/LICENSE-2.0

    Unless required by applicable law or agreed to in writing, software
    distributed under the License is distributed on an "AS IS" BASIS,
    WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
    See the License for the specific language governing permissions and
    limitations under the License.
    -->

    <!-- This file is used to define the mappings between lower-level system
    user and group IDs and the higher-level permission names managed
    by the platform.

    Be VERY careful when editing this file! Mistakes made here can open
    big security holes.
    -->
    <permissions>

    <!-- ================================================================== -->
    <!-- ================================================================== -->
    <!-- ================================================================== -->

    <!-- The following tags are associating low-level group IDs with
    permission names. By specifying such a mapping, you are saying
    that any application process granted the given permission will
    also be running with the given group ID attached to its process,
    so it can perform any filesystem (read, write, execute) operations
    allowed for that group. -->

    <permission name="android.permission.BLUETOOTH_ADMIN" >
    <group gid="net_bt_admin" />
    </permission>

    <permission name="android.permission.BLUETOOTH" >
    <group gid="net_bt" />
    </permission>

    <permission name="android.permission.BLUETOOTH_STACK" >
    <group gid="net_bt_stack" />
    </permission>

    <permission name="android.permission.NET_TUNNELING" >
    <group gid="vpn" />
    </permission>

    <permission name="android.permission.INTERNET" >
    <group gid="inet" />
    </permission>

    <permission name="android.permission.ACCESS_MTK_MMHW" >
    <group gid="system" />
    <group gid="media" />
    <group gid="camera" />
    </permission>

    <permission name="android.permission.READ_LOGS" >
    <group gid="log" />
    </permission>

    <permission name="android.permission.READ_EXTERNAL_STORAGE" >
    <group gid="sdcard_r" />
    <group gid="media_r" />
    </permission>

    <permission name="android.permission.WRITE_EXTERNAL_STORAGE" >
    <group gid="sdcard_r" />
    <group gid="sdcard_rw" />
    <group gid="media_r" />
    <group gid="media_rw" />
    </permission>

    <permission name="android.permission.ACCESS_ALL_EXTERNAL_STORAGE" >
    <group gid="sdcard_r" />
    <group gid="sdcard_rw" />
    <group gid="sdcard_all" />
    </permission>

    <permission name="android.permission.WRITE_MEDIA_STORAGE" >
    <group gid="media_rw" />
    </permission>

    <permission name="android.permission.ACCESS_MTP" >
    <group gid="mtp" />
    </permission>

    <permission name="android.permission.NET_ADMIN" >
    <group gid="net_admin" />
    </permission>

    <!-- The group that /cache belongs to, linked to the permission
    set on the applications that can access /cache -->
    <permission name="android.permission.ACCESS_CACHE_FILESYSTEM" >
    <group gid="cache" />
    </permission>

    <!-- RW permissions to any system resources owned by group 'diag'.
    This is for carrier and manufacture diagnostics tools that must be
    installable from the framework. Be careful. -->
    <permission name="android.permission.DIAGNOSTIC" >
    <group gid="input" />
    <group gid="diag" />
    </permission>

    <!-- Group that can read detailed network usage statistics -->
    <permission name="android.permission.READ_NETWORK_USAGE_HISTORY">
    <group gid="net_bw_stats" />
    </permission>

    <!-- Group that can modify how network statistics are accounted -->
    <permission name="android.permission.MODIFY_NETWORK_ACCOUNTING">
    <group gid="net_bw_acct" />
    </permission>

    <permission name="android.permission.LOOP_RADIO" >
    <group gid="loop_radio" />
    </permission>

    <!-- ================================================================== -->
    <!-- ================================================================== -->
    <!-- ================================================================== -->

    <!-- The following tags are assigning high-level permissions to specific
    user IDs. These are used to allow specific core system users to
    perform the given operations with the higher-level framework. For
    example, we give a wide variety of permissions to the shell user
    since that is the user the adb shell runs under and developers and
    others should have a fairly open environment in which to
    interact with the system. -->

    <assign-permission name="android.permission.MODIFY_AUDIO_SETTINGS" uid="media" />
    <assign-permission name="android.permission.ACCESS_SURFACE_FLINGER" uid="media" />
    <assign-permission name="android.permission.WAKE_LOCK" uid="media" />
    <assign-permission name="android.permission.UPDATE_DEVICE_STATS" uid="media" />
    <assign-permission name="android.permission.UPDATE_APP_OPS_STATS" uid="media" />
    <assign-permission name="android.permission.CAMERA" uid="media" />
    <assign-permission name="android.permission.RECORD_AUDIO" uid="media" />

    <assign-permission name="android.permission.ACCESS_SURFACE_FLINGER" uid="graphics" />

    <!-- This is a list of all the libraries available for application
    code to link against. -->

    <library name="android.test.runner"
    file="/system/framework/android.test.runner.jar" />
    <library name="javax.obex"
    file="/system/framework/javax.obex.jar"/>

    </permissions>

    build.prop:
    # begin build properties
    # autogenerated by buildinfo.sh
    ro.build.id=KOT49H
    ro.build.display.id=xTAB7Q-GPS_V1.01
    ro.build.version.incremental=eng.zmchivin3.1409626546
    ro.custom.build.version=1409626546
    ro.build.version.sdk=19
    ro.build.version.codename=REL
    ro.build.version.release=4.4.2
    ro.build.date=Tue Sep 2 11:02:50 CST 2014
    ro.build.date.utc=1409626970
    ro.build.type=user
    ro.build.user=zmchivin3
    ro.build.host=chivin-All-Series
    ro.build.tags=test-keys
    ro.product.model=xTAB 7Q GPS
    ro.product.brand=WayteQ
    ro.product.name=xTAB 7Q GPS
    ro.product.device=xTAB 7Q GPS
    ro.product.chivinproduct=xTAB 7Q GPS
    ro.product.chivinversion=xTAB7Q-GPS_V1.01
    ro.product.customversion=05050025_20140902
    ro.product.board=xTAB 7Q GPS
    ro.product.cpu.abi=armeabi-v7a
    ro.product.cpu.abi2=armeabi
    ro.product.manufacturer=WayteQ
    ro.product.locale.language=hu
    ro.product.locale.region=HU
    ro.wifi.channels=
    ro.board.platform=
    # ro.build.product is obsolete; use ro.product.device
    ro.build.product=xTAB 7Q GPS
    # Do not try to parse ro.build.description or .fingerprint
    ro.build.description=htt27_tb_kk-user 4.4.2 KOT49H eng.zmchivin3.1409626546 test-keys
    ro.build.fingerprint=HTT:4.4.2/KOT49H/1409626546:user/test-keys
    ro.build.flavor=
    ro.build.characteristics=tablet
    # end build properties

    # begin mediatek build properties
    ro.mediatek.version.release=ALPS.KK1.MP10.V1.1
    ro.mediatek.platform=MT8127
    ro.mediatek.chip_ver=S01
    ro.mediatek.version.branch=KK1.MP10
    ro.mediatek.version.sdk=2
    # end mediatek build properties
    #
    # from out/target/product/htt27_tb_kk/obj/CUSTGEN/config/system.prop
    #
    #
    # system.prop for generic sdk
    #

    rild.libpath=/system/lib/mtk-ril.so
    rild.libargs=-d /dev/ttyC0

    # MTK, Infinity, 20090720 {
    wifi.interface=wlan0
    # MTK, Infinity, 20090720 }

    # MTK, mtk03034, 20101210 {
    ro.mediatek.wlan.wsc=1
    # MTK, mtk03034 20101210}
    # MTK, mtk03034, 20110318 {
    ro.mediatek.wlan.p2p=1
    # MTK, mtk03034 20110318}

    # MTK, mtk03034, 20101213 {
    mediatek.wlan.ctia=0
    # MTK, mtk03034 20101213}

    ro.sf.lcd_density=160

    #
    wifi.tethering.interface=ap0
    #

    ro.opengles.version=131072

    wifi.direct.interface=p2p0
    dalvik.vm.heapgrowthlimit=128m
    dalvik.vm.heapsize=256m

    # USB MTP WHQL
    ro.sys.usb.mtp.whql.enable=0

    # Power off opt in IPO
    sys.ipo.pwrdncap=2

    # Switching Menu of Mass storage and MTP
    ro.sys.usb.storage.type=mtp,mass_storage

    # USB BICR function
    ro.sys.usb.bicr=yes

    # USB Charge only function
    ro.sys.usb.charging.only=yes

    # audio
    ro.camera.sound.forced=0
    ro.audio.silent=0

    ro.zygote.preload.enable=0

    ro.config.pppoe_enable=1
    #HTT liujihui {
    ro.setupwizard.mode=DISABLED
    ro.com.google.locationfeatures=1
    ro.com.google.networklocation=1
    persist.sys.timezone=Europe/Budapest
    ro.chivin.secure=9527
    ro.product.facebook.dash=true
    #HTT liujihui }

    #
    # ADDITIONAL_BUILD_PROPERTIES
    #
    persist.gemini.sim_num=1
    ro.gemini.smart_sim_switch=false
    ro.gemini.smart_3g_switch=0
    ril.specific.sm_cause=0
    bgw.current3gband=0
    ril.external.md=0
    ro.btstack=blueangel
    ro.sf.hwrotation=270
    ril.current.share_modem=1
    curlockscreen=1
    ro.mediatek.gemini_support=false
    drm.service.enabled=true
    fmradio.driver.enable=1
    ril.first.md=1
    ril.flightmode.poweroffMD=1
    ril.telephony.mode=0
    dalvik.vm.mtk-stack-trace-file=/data/anr/mtk_traces.txt
    persist.mtk.anr.mechanism=1
    mediatek.wlan.chip=mediatek.wlan.module.postfix=_
    ril.radiooff.poweroffMD=0
    ro.config.notification_sound=Proxima.ogg
    ro.config.alarm_alert=Alarm_Classic.ogg
    ro.config.ringtone=Backroad.ogg
    persist.mtk.wcn.combo.chipid=-1
    ro.fota.oem=MTK_KK
    ro.fota.platform=MTK_KK
    ro.fota.type=phone
    ter.service.enable=0
    mediatek.extmd.usbport=0
    ro.lte.dc.support=0
    ril.active.md=0
    fw.max_users=4
    persist.sys.dalvik.vm.lib=libdvm.so
    net.bt.name=Android
    dalvik.vm.stack-trace-file=/data/anr/traces.txt

    MIÉNK: platform.xml:
    <?xml version="1.0" encoding="utf-8"?>
    <!-- Copyright (C) 2008 The Android Open Source Project

    Licensed under the Apache License, Version 2.0 (the "License");
    you may not use this file except in compliance with the License.
    You may obtain a copy of the License at

    http://www.apache.org/licenses/LICENSE-2.0

    Unless required by applicable law or agreed to in writing, software
    distributed under the License is distributed on an "AS IS" BASIS,
    WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
    See the License for the specific language governing permissions and
    limitations under the License.
    -->

    <!-- This file is used to define the mappings between lower-level system
    user and group IDs and the higher-level permission names managed
    by the platform.

    Be VERY careful when editing this file! Mistakes made here can open
    big security holes.
    -->
    <permissions>

    <!-- ================================================================== -->
    <!-- ================================================================== -->
    <!-- ================================================================== -->

    <!-- The following tags are associating low-level group IDs with
    permission names. By specifying such a mapping, you are saying
    that any application process granted the given permission will
    also be running with the given group ID attached to its process,
    so it can perform any filesystem (read, write, execute) operations
    allowed for that group. -->

    <permission name="android.permission.BLUETOOTH_ADMIN" >
    <group gid="net_bt_admin" />
    </permission>

    <permission name="android.permission.BLUETOOTH" >
    <group gid="net_bt" />
    </permission>

    <permission name="android.permission.BLUETOOTH_STACK" >
    <group gid="net_bt_stack" />
    </permission>

    <permission name="android.permission.NET_TUNNELING" >
    <group gid="vpn" />
    </permission>

    <permission name="android.permission.INTERNET" >
    <group gid="inet" />
    </permission>

    <permission name="android.permission.READ_LOGS" >
    <group gid="log" />
    </permission>

    <permission name="android.permission.READ_EXTERNAL_STORAGE" >
    <group gid="sdcard_r" />
    </permission>

    <permission name="android.permission.WRITE_EXTERNAL_STORAGE" >
    <group gid="sdcard_r" />
    <group gid="sdcard_rw" />
    <group gid="media_rw" />
    </permission>

    <permission name="android.permission.ACCESS_ALL_EXTERNAL_STORAGE" >
    <group gid="sdcard_r" />
    <group gid="sdcard_rw" />
    <group gid="sdcard_all" />
    </permission>

    <permission name="android.permission.WRITE_MEDIA_STORAGE" >
    <group gid="media_rw" />
    </permission>

    <permission name="android.permission.ACCESS_MTP" >
    <group gid="mtp" />
    </permission>

    <permission name="android.permission.NET_ADMIN" >
    <group gid="net_admin" />
    </permission>

    <!-- The group that /cache belongs to, linked to the permission
    set on the applications that can access /cache -->
    <permission name="android.permission.ACCESS_CACHE_FILESYSTEM" >
    <group gid="cache" />
    </permission>

    <!-- RW permissions to any system resources owned by group 'diag'.
    This is for carrier and manufacture diagnostics tools that must be
    installable from the framework. Be careful. -->
    <permission name="android.permission.DIAGNOSTIC" >
    <group gid="input" />
    <group gid="diag" />
    </permission>

    <!-- Group that can read detailed network usage statistics -->
    <permission name="android.permission.READ_NETWORK_USAGE_HISTORY">
    <group gid="net_bw_stats" />
    </permission>

    <!-- Group that can modify how network statistics are accounted -->
    <permission name="android.permission.MODIFY_NETWORK_ACCOUNTING">
    <group gid="net_bw_acct" />
    </permission>

    <permission name="android.permission.LOOP_RADIO" >
    <group gid="loop_radio" />
    </permission>

    <!-- ================================================================== -->
    <!-- ================================================================== -->
    <!-- ================================================================== -->

    <!-- The following tags are assigning high-level permissions to specific
    user IDs. These are used to allow specific core system users to
    perform the given operations with the higher-level framework. For
    example, we give a wide variety of permissions to the shell user
    since that is the user the adb shell runs under and developers and
    others should have a fairly open environment in which to
    interact with the system. -->

    <assign-permission name="android.permission.MODIFY_AUDIO_SETTINGS" uid="media" />
    <assign-permission name="android.permission.ACCESS_SURFACE_FLINGER" uid="media" />
    <assign-permission name="android.permission.WAKE_LOCK" uid="media" />
    <assign-permission name="android.permission.UPDATE_DEVICE_STATS" uid="media" />
    <assign-permission name="android.permission.UPDATE_APP_OPS_STATS" uid="media" />

    <assign-permission name="android.permission.ACCESS_SURFACE_FLINGER" uid="graphics" />

    <!-- This is a list of all the libraries available for application
    code to link against. -->

    <library name="android.test.runner"
    file="/system/framework/android.test.runner.jar" />
    <library name="javax.obex"
    file="/system/framework/javax.obex.jar"/>

    </permissions>

    build.prop:

    # begin build properties
    # autogenerated by buildinfo.sh
    ro.build.id=KOT49H
    ro.build.display.id=KOT49H.eng.inuadmin.20141104.130945 test-keys
    ro.build.version.incremental=eng.inuadmin.20141104.130945
    ro.build.version.sdk=19
    ro.build.version.codename=REL
    ro.build.version.release=4.4.2
    ro.build.date=Tue Nov 4 13:10:18 CET 2014
    ro.build.date.utc=1415103018
    ro.build.type=user
    ro.build.user=inuadmin
    ro.build.host=inu-pc-012
    ro.build.tags=test-keys
    ro.product.model=W032i-C3
    ro.product.brand=intel
    ro.product.name=redhookbay
    ro.product.device=w032i_c3
    ro.product.board=clovertrail
    ro.product.cpu.abi=x86
    ro.product.manufacturer=intel
    ro.product.locale.language=en
    ro.product.locale.region=US
    ro.wifi.channels=
    ro.board.platform=clovertrail
    # ro.build.product is obsolete; use ro.product.device
    ro.build.product=redhookbay
    # Do not try to parse ro.build.description or .fingerprint
    ro.build.description=redhookbay-user 4.4.2 KOT49H eng.inuadmin.20141104.130945 test-keys
    ro.build.fingerprint=intel/redhookbay/w032i_c3:4.4.2/KOT49H/eng.inuadmin.20141104.130945:user/test-keys
    ro.build.characteristics=tablet
    # end build properties

    #
    # ADDITIONAL_BUILD_PROPERTIES
    #
    ro.streaming.video.drs=true
    keyguard.no_require_sim=true
    ro.com.android.dataroaming=true
    ro.com.android.dateformat=MM-dd-yyyy
    ro.config.ringtone=Ring_Synth_04.ogg
    ro.config.notification_sound=pixiedust.ogg
    ro.carrier=unknown
    ro.config.alarm_alert=Alarm_Classic.ogg
    dalvik.vm.heapstartsize=8m
    dalvik.vm.heapgrowthlimit=64m
    dalvik.vm.heapsize=256m
    dalvik.vm.heaptargetutilization=0.75
    dalvik.vm.heapminfree=2m
    dalvik.vm.heapmaxfree=2m
    dalvik.jit.code_cache_size=1048576
    ro.hwui.texture_cache_size=24.0f
    ro.hwui.text_large_cache_width=2048
    ro.hwui.text_large_cache_height=512
    persist.tel.hot_swap.support=true
    drm.service.enabled=true
    ro.blankphone_id=1
    ro.setupwizard.mode=OPTIONAL
    ro.com.google.gmsversion=4.4_r2
    persist.sys.dalvik.vm.lib=libdvm.so
    ro.ril.status.polling.enable=0
    ro.product.cpu.abi2=armeabi-v7a
    ro.config.personality=compat_layout
    rs.gpu.renderscript=0
    rs.gpu.filterscript=0
    rs.gpu.rsIntrinsic=0
    ro.sf.lcd_density=160
    net.bt.name=Android
    dalvik.vm.stack-trace-file=/data/anr/traces.txt
    ro.product.firmware=1.02

    [ Szerkesztve ]

    – Yet, thou serves with thine eyes clouded in chaos. Thou, bound in the cage of madness. I am he who commands those chains – Fate/Zero Berserker Mad Enchantment

Új hozzászólás Aktív témák