- 積分
- 943
- 3C值
-
- 艾摩幣
-
- 註冊時間
- 2014-12-24
- 在線時間
- 小時
|
立刻註冊,加入討論最熱摩比話題!!
您需要 登入 才可以下載或查看,沒有帳號?立即註冊
x
本帖最後由 飛行雨 於 2015-1-28 15:29 編輯
這個刷包可解除KK與L SD卡讀寫的限制
作用是將以下路徑內
內存 \SYSTES\ETC\Permissions\platform.xml 掛上SD讀寫權限
下面附上改好的RECOVERY刷包
刷完即可解除即可封印
使用愉快!

修改的XML 內容如下:
- <permission name="android.permission.BLUETOOTH_ADMIN" >
- <group gid="net_bt_admin" />
- </permission>
- <permission name="android.permission.BLUETOOTH" >
- <group gid="net_bt" />
- </permission>
- <permission name="android.permission.BLUETOOTH_STACK" >
- <group gid="net_bt_stack" />
- </permission>
- <permission name="android.permission.NET_TUNNELING" >
- <group gid="vpn" />
- </permission>
- <permission name="android.permission.INTERNET" >
- <group gid="inet" />
- <group gid="clockd" />
- </permission>
- <permission name="android.permission.READ_LOGS" >
- <group gid="log" />
- </permission>
- <permission name="android.permission.READ_EXTERNAL_STORAGE" >
- <group gid="sdcard_r" />
- </permission>
- <permission name="android.permission.WRITE_EXTERNAL_STORAGE" >
- <group gid="sdcard_r" />
- <group gid="sdcard_rw" />
- <group gid="media_rw" />
- </permission>
- <permission name="android.permission.ACCESS_ALL_EXTERNAL_STORAGE" >
- <group gid="sdcard_r" />
- <group gid="sdcard_rw" />
- <group gid="sdcard_all" />
- </permission>
- <permission name="android.permission.WRITE_MEDIA_STORAGE" >
- <group gid="media_rw" />
- </permission>
- <permission name="android.permission.ACCESS_MTP" >
- <group gid="mtp" />
- </permission>
- <permission name="android.permission.NET_ADMIN" >
- <group gid="net_admin" />
- </permission>
- <!-- [U11] Begin, add permission for Cisco AnyConnect, freya.hj_lin, 20130730 -->
- <permission name="com.htc.framework.permission.VPN">
- <group gid="vpn" />
- </permission>
- <permission name="com.htc.framework.permission.NET_ADMIN" >
- <group gid="net_admin" />
- </permission>
- <permission name="com.htc.framework.permission.NET_RAW">
- <group gid="net_raw" />
- </permission>
- <!-- [U11] End, freya.hj_lin, 20130730 -->
- <!-- The group that /cache belongs to, linked to the permission
- set on the applications that can access /cache -->
- <permission name="android.permission.ACCESS_CACHE_FILESYSTEM" >
- <group gid="cache" />
- </permission>
- <!-- RW permissions to any system resources owned by group 'diag'.
- This is for carrier and manufacture diagnostics tools that must be
- installable from the framework. Be careful. -->
- <permission name="android.permission.DIAGNOSTIC" >
- <group gid="input" />
- <group gid="diag" />
- </permission>
- <!-- Group that can read detailed network usage statistics -->
- <permission name="android.permission.READ_NETWORK_USAGE_HISTORY">
- <group gid="net_bw_stats" />
- </permission>
- <!-- Group that can modify how network statistics are accounted -->
- <permission name="android.permission.MODIFY_NETWORK_ACCOUNTING">
- <group gid="net_bw_acct" />
- </permission>
- <!-- Group that can read write customization wizard folder /data/data/cw and /data/data/cwtemp -->
- <permission name="com.htc.framework.permission.ACCESS_CW_FOLDER">
- <group gid="cw_access" />
- </permission>
- <!-- Group that can read write recovery folder /data/data/recovery -->
- <permission name="com.htc.framework.permission.ACCESS_RECOVERY_FOLDER">
- <group gid="recvy_access" />
- </permission>
- <!-- Group that can read write file node with drmrpc group -->
- <permission name="com.htc.permission.android.ACCESS_DRMRPC">
- <group gid="drmrpc" />
- </permission>
- <!-- Group that can read write customization wizard folder usb file node for autobot -->
- <permission name="com.htc.framework.permission.ACCESS_AUTOBOT_FILENODE">
- <group gid="autobot_access" />
- </permission>
- <!-- Group that can read write serial port for sync job -->
- <permission name="com.htc.permission.USB_SERIAL">
- <group gid="usb" />
- </permission>
- <!-- Group that can read write carrier partition folder for do customization -->
- <permission name="com.htc.permission.framework.ACCESS_CARRIER_PARTITION">
- <group gid="carrier" />
- </permission>
- <!-- Group that can access clockd for offmode alarm setting -->
- <permission name="com.android.alarm.permission.SET_ALARM">
- <group gid="clockd" />
- </permission>
- <permission name="android.permission.LOOP_RADIO" >
- <group gid="loop_radio" />
- </permission>
- <!-- [U11] Being, add permission for Fingerprint, Jason Chang, 20130805 -->
- <permission name="com.htc.permission.FINGERPRINT">
- <group gid="val_fp" />
- </permission>
- <!-- [U11] End, add permission for Fingerprint, Jason Chang, 20130805 -->
-
- <!-- ================================================================== --
- <!-- The following tags are assigning high-level permissions to specific
- user IDs. These are used to allow specific core system users to
- perform the given operations with the higher-level framework. For
- example, we give a wide variety of permissions to the shell user
- since that is the user the adb shell runs under and developers and
- others should have a fairly open environment in which to
- interact with the system. -->
- <assign-permission name="android.permission.MODIFY_AUDIO_SETTINGS" uid="media" />
- <assign-permission name="android.permission.ACCESS_SURFACE_FLINGER" uid="media" />
- <assign-permission name="android.permission.WAKE_LOCK" uid="media" />
- <assign-permission name="android.permission.UPDATE_DEVICE_STATS" uid="media" />
- <assign-permission name="android.permission.UPDATE_APP_OPS_STATS" uid="media" />
- <!-- [U58] add permission for Watch DxDrm Playready DRM //-->
- <assign-permission name="com.discretix.playready.ACCESS_DRM" uid="media" />
- <!-- [U58] add permission for Watch DxDrm Playready DRM //-->
- <assign-permission name="android.permission.ACCESS_SURFACE_FLINGER" uid="graphics" />
- <!-- This is a list of all the libraries available for application
- code to link against. -->
- <library name="android.test.runner"
- file="/system/framework/android.test.runner.jar" />
- <library name="javax.obex"
- file="/system/framework/javax.obex.jar"/>
- </permissions>
解除SD卡讀寫
載點:
|
評分紀錄 : 共8筆 【 共計 : 3C值+16 艾摩幣+3 】
【 所有評分 】
|