diff --git a/AndroidBoard.mk b/AndroidBoard.mk index 184912f..e1e9c28 100644 --- a/AndroidBoard.mk +++ b/AndroidBoard.mk @@ -2,7 +2,7 @@ LOCAL_PATH := $(call my-dir) include $(CLEAR_VARS) -ALL_PREBUILT += $(INSTALLED_KERNEL_TARGET) +#ALL_PREBUILT += $(INSTALLED_KERNEL_TARGET) # include the non-open-source counterpart to this file -include vendor/lge/thunderc/AndroidBoardVendor.mk diff --git a/BoardConfig.mk b/BoardConfig.mk index d497e80..b4e6861 100644 --- a/BoardConfig.mk +++ b/BoardConfig.mk @@ -1,13 +1,35 @@ -include vendor/lge/thunderc/BoardConfigVendor.mk -include device/lge/msm7x27-common/BoardConfigCommon.mk -#TARGET_KERNEL_CONFIG := cyanogenmod_p500_p509_defconfig +#TARGET_KERNEL_CONFIG := aaathunderc-test1_defconfig +TARGET_KERNEL_CONFIG := thunderc-test_defconfig BOARD_KERNEL_CMDLINE := mem=471M console=ttyMSM2,115200n8 androidboot.hardware=thunderc -BOARD_USE_USB_MASS_STORAGE_SWITCH := true +COMMON_GLOBAL_CFLAGS += -DBOARD_CHARGING_CMDLINE_NAME='"lge.reboot"' -DBOARD_CHARGING_CMDLINE_VALUE='"pwroff"' +TARGET_BOOTLOADER_BOARD_NAME := thunderc +TARGET_OTA_ASSERT_DEVICE := thunderc,LS670,VM670,thunderc_LS670,thunderc_VM670 +#TARGET_RECOVERY_FSTAB := device/lge/thunderc/fstab.thunderc +TARGET_RECOVERY_FSTAB := device/lge/thunderc/recovery.fstab + +#TARGET_RECOVERY_PIXEL_FORMAT := RGBX_8888 +#BOARD_HAS_NO_SELECT_BUTTON := true +#TARGET_NO_BOOTLOADER := true +#BOARD_USES_RECOVERY_CHARGEMODE := false +TARGET_RECOVERY_INITRC := device/lge/thunderc/init.recovery.rc +#twrp +DEVICE_RESOLUTION := 320x480 +RECOVERY_GRAPHICS_USE_LINELENGTH := true +HAVE_SELINUX := true +#TW_NO_REBOOT_BOOTLOADER := true +#LOCAL_CFLAGS += -DTW_NO_REBOOT_BOOTLOADER +#TW_CUSTOM_POWER_BUTTON := 107 + +#TARGET_RECOVERY_PIXEL_FORMAT := RGB_565 +TARGET_RECOVERY_PIXEL_FORMAT := "RGB_565" SMALLER_FONT_FOOTPRINT := true -TARGET_BOOTLOADER_BOARD_NAME := thunderc -TARGET_OTA_ASSERT_DEVICE := thunderc,LS670,VM670 -BOARD_BLUETOOTH_BDROID_BUILDCFG_INCLUDE_DIR := device/lge/p500/bluetooth + +#BOARD_BLUETOOTH_BDROID_BUILDCFG_INCLUDE_DIR := device/lge/thunderc/bluetooth + +P500_SPEAKER_IN_CALL_FIX := true diff --git a/chargemode/chargerimages/battery_ani_01.rle b/chargemode/chargerimages/battery_ani_01.rle new file mode 100644 index 0000000..a016452 Binary files /dev/null and b/chargemode/chargerimages/battery_ani_01.rle differ diff --git a/chargemode/chargerimages/battery_ani_02.rle b/chargemode/chargerimages/battery_ani_02.rle new file mode 100644 index 0000000..16e52ed Binary files /dev/null and b/chargemode/chargerimages/battery_ani_02.rle differ diff --git a/chargemode/chargerimages/battery_ani_03.rle b/chargemode/chargerimages/battery_ani_03.rle new file mode 100644 index 0000000..88989ee Binary files /dev/null and b/chargemode/chargerimages/battery_ani_03.rle differ diff --git a/chargemode/chargerimages/battery_ani_04.rle b/chargemode/chargerimages/battery_ani_04.rle new file mode 100644 index 0000000..97f531e Binary files /dev/null and b/chargemode/chargerimages/battery_ani_04.rle differ diff --git a/chargemode/chargerimages/battery_ani_05.rle b/chargemode/chargerimages/battery_ani_05.rle new file mode 100644 index 0000000..cfb81d2 Binary files /dev/null and b/chargemode/chargerimages/battery_ani_05.rle differ diff --git a/chargemode/chargerimages/battery_bg.rle b/chargemode/chargerimages/battery_bg.rle new file mode 100644 index 0000000..015dbb1 Binary files /dev/null and b/chargemode/chargerimages/battery_bg.rle differ diff --git a/chargemode/chargerimages/battery_charging_01.rle b/chargemode/chargerimages/battery_charging_01.rle new file mode 100644 index 0000000..e3d2a02 Binary files /dev/null and b/chargemode/chargerimages/battery_charging_01.rle differ diff --git a/chargemode/chargerimages/battery_charging_02.rle b/chargemode/chargerimages/battery_charging_02.rle new file mode 100644 index 0000000..001594f Binary files /dev/null and b/chargemode/chargerimages/battery_charging_02.rle differ diff --git a/chargemode/chargerimages/battery_charging_03.rle b/chargemode/chargerimages/battery_charging_03.rle new file mode 100644 index 0000000..deaf900 Binary files /dev/null and b/chargemode/chargerimages/battery_charging_03.rle differ diff --git a/chargemode/chargerimages/battery_charging_04.rle b/chargemode/chargerimages/battery_charging_04.rle new file mode 100644 index 0000000..55c2363 Binary files /dev/null and b/chargemode/chargerimages/battery_charging_04.rle differ diff --git a/chargemode/chargerimages/battery_charging_05.rle b/chargemode/chargerimages/battery_charging_05.rle new file mode 100644 index 0000000..bb1b0e8 Binary files /dev/null and b/chargemode/chargerimages/battery_charging_05.rle differ diff --git a/chargemode/chargerimages/battery_charging_06.rle b/chargemode/chargerimages/battery_charging_06.rle new file mode 100644 index 0000000..9df5f5f Binary files /dev/null and b/chargemode/chargerimages/battery_charging_06.rle differ diff --git a/chargemode/chargerimages/battery_wait_ani_01.rle b/chargemode/chargerimages/battery_wait_ani_01.rle new file mode 100644 index 0000000..6945d9d Binary files /dev/null and b/chargemode/chargerimages/battery_wait_ani_01.rle differ diff --git a/chargemode/chargerimages/battery_wait_ani_02.rle b/chargemode/chargerimages/battery_wait_ani_02.rle new file mode 100644 index 0000000..7b7c9d2 Binary files /dev/null and b/chargemode/chargerimages/battery_wait_ani_02.rle differ diff --git a/chargemode/chargerimages/black_bg.rle b/chargemode/chargerimages/black_bg.rle new file mode 100644 index 0000000..dccb29f Binary files /dev/null and b/chargemode/chargerimages/black_bg.rle differ diff --git a/chargemode/chargerlogo b/chargemode/chargerlogo new file mode 100644 index 0000000..da353f2 Binary files /dev/null and b/chargemode/chargerlogo differ diff --git a/checkbootreason b/checkbootreason new file mode 100644 index 0000000..a6b879f --- /dev/null +++ b/checkbootreason @@ -0,0 +1,11 @@ +#!/system/bin/sh + +sleep 3 +# See: Documentation/arm/msm/boot.txt +boot_reason=`cat /proc/sys/kernel/boot_reason` +# "reboot charge_reset" if boot_reason&1==1 (power button long press) +((($boot_reason&1)==1)) && reboot charge_reset + +# Start CHARGER after boot_reason to prevent charging anims +exec /sbin/chargerlogo + diff --git a/cm.dependencies b/cm.dependencies~ similarity index 92% rename from cm.dependencies rename to cm.dependencies~ index ee13019..4b4282e 100644 --- a/cm.dependencies +++ b/cm.dependencies~ @@ -8,7 +8,7 @@ "target_path": "device/lge/msm7x27-common", "branch": "cm-10.1" }, { - "repository": "android_vendor_lge_thunderc", + "repository": "android_vendor_lge", "target_path": "vendor/lge/thunderc", "branch": "cm-10.1" }, { diff --git a/cm.mk b/cm.mk index 1b2cb26..25640c1 100644 --- a/cm.mk +++ b/cm.mk @@ -5,11 +5,8 @@ $(call inherit-product, device/lge/thunderc/thunderc.mk) # Boot Animation TARGET_SCREEN_HEIGHT := 480 TARGET_SCREEN_WIDTH := 320 -# Inherit some common cyanogenmod stuff. -$(call inherit-product, vendor/cm/config/tiny.mk) -# Include FM-Radio stuff -#$(call inherit-product, vendor/cyanogen/products/bcm_fm_radio.mk) +$(call inherit-product, vendor/cm/config/mini.mk) PRODUCT_NAME := cm_thunderc PRODUCT_BRAND := lge @@ -18,12 +15,10 @@ PRODUCT_MODEL := LG-LS670 PRODUCT_MANUFACTURER := LGE PRODUCT_CHARACTERISTICS := phone +# Release name and versioning +PRODUCT_RELEASE_NAME := LS670 +PRODUCT_VERSION_DEVICE_SPECIFIC := PRODUCT_BUILD_PROP_OVERRIDES += \ PRODUCT_NAME=lge_LS670 \ BUILD_FINGERPRINT="lge/LS670/LS670:2.3.3/GRI40/LG-LS670-V20g.19C11F164C:user/release-keys" \ PRIVATE_BUILD_DESC="thunderc-user 2.3.3 GRI40 LG-LS670-V20g.19C11F164C release-keys" - -# Release name and versioning -PRODUCT_RELEASE_NAME := LS670 -PRODUCT_VERSION_DEVICE_SPECIFIC := --include vendor/cyanogen/products/common_versions.mk diff --git a/configs/audio_policy.conf b/configs/audio_policy.conf new file mode 100644 index 0000000..b9a943e --- /dev/null +++ b/configs/audio_policy.conf @@ -0,0 +1,52 @@ +# Global configuration section: lists input and output devices always present on the device +# as well as the output device selected by default. +# Devices are designated by a string that corresponds to the enum in audio.h + +global_configuration { + attached_output_devices AUDIO_DEVICE_OUT_EARPIECE|AUDIO_DEVICE_OUT_SPEAKER + default_output_device AUDIO_DEVICE_OUT_SPEAKER + attached_input_devices AUDIO_DEVICE_IN_BUILTIN_MIC +} + +# audio hardware module section: contains descriptors for all audio hw modules present on the +# device. Each hw module node is named after the corresponding hw module library base name. +# For instance, "primary" corresponds to audio.primary..so. +# The "primary" module is mandatory and must include at least one output with +# AUDIO_OUTPUT_FLAG_PRIMARY flag. +# Each module descriptor contains one or more output profile descriptors and zero or more +# input profile descriptors. Each profile lists all the parameters supported by a given output +# or input stream category. +# The "channel_masks", "formats", "devices" and "flags" are specified using strings corresponding +# to enums in audio.h and audio_policy.h. They are concatenated by use of "|" without space or "\n". + +audio_hw_modules { + primary { + outputs { + primary { + sampling_rates 44100 + channel_masks AUDIO_CHANNEL_OUT_STEREO + formats AUDIO_FORMAT_PCM_16_BIT + devices AUDIO_DEVICE_OUT_EARPIECE|AUDIO_DEVICE_OUT_SPEAKER|AUDIO_DEVICE_OUT_WIRED_HEADSET|AUDIO_DEVICE_OUT_WIRED_HEADPHONE|AUDIO_DEVICE_OUT_ALL_SCO|AUDIO_DEVICE_OUT_FM|AUDIO_DEVICE_OUT_PROXY + flags AUDIO_OUTPUT_FLAG_PRIMARY + } + } + inputs { + primary { + sampling_rates 8000|11025|16000|22050|32000|44100 + channel_masks AUDIO_CHANNEL_IN_MONO|AUDIO_CHANNEL_IN_STEREO + formats AUDIO_FORMAT_PCM_16_BIT + devices AUDIO_DEVICE_IN_BUILTIN_MIC|AUDIO_DEVICE_IN_BLUETOOTH_SCO_HEADSET|AUDIO_DEVICE_IN_WIRED_HEADSET + } + } + } + a2dp { + outputs { + a2dp { + sampling_rates 44100 + channel_masks AUDIO_CHANNEL_OUT_STEREO + formats AUDIO_FORMAT_PCM_16_BIT + devices AUDIO_DEVICE_OUT_ALL_A2DP + } + } + } +} diff --git a/configs/librasdioif.ko b/configs/librasdioif23.ko similarity index 100% rename from configs/librasdioif.ko rename to configs/librasdioif23.ko diff --git a/configs/wireless.ko b/configs/wireless23.ko similarity index 100% rename from configs/wireless.ko rename to configs/wireless23.ko diff --git a/configs/wpa_supplicant.conf b/configs/wpa_supplicant.conf index b33add2..7039af0 100644 --- a/configs/wpa_supplicant.conf +++ b/configs/wpa_supplicant.conf @@ -1 +1 @@ -update_config=1 ctrl_interface=wlan0 eapol_version=1 ap_scan=1 fast_reauth=1 \ No newline at end of file +##### Example wpa_supplicant configuration file ############################### # # This file describes configuration file format and lists all available option. # Please also take a look at simpler configuration examples in 'examples' # subdirectory. # # Empty lines and lines starting with # are ignored # NOTE! This file may contain password information and should probably be made # readable only by root user on multiuser systems. # Note: All file paths in this configuration file should use full (absolute, # not relative to working directory) path in order to allow working directory # to be changed. This can happen if wpa_supplicant is run in the background. # Whether to allow wpa_supplicant to update (overwrite) configuration # # This option can be used to allow wpa_supplicant to overwrite configuration # file whenever configuration is changed (e.g., new network block is added with # wpa_cli or wpa_gui, or a password is changed). This is required for # wpa_cli/wpa_gui to be able to store the configuration changes permanently. # Please note that overwriting configuration file will remove the comments from # it. update_config=1 # global configuration (shared by all network blocks) # # Parameters for the control interface. If this is specified, wpa_supplicant # will open a control interface that is available for external programs to # manage wpa_supplicant. The meaning of this string depends on which control # interface mechanism is used. For all cases, the existance of this parameter # in configuration is used to determine whether the control interface is # enabled. # # For UNIX domain sockets (default on Linux and BSD): This is a directory that # will be created for UNIX domain sockets for listening to requests from # external programs (CLI/GUI, etc.) for status information and configuration. # The socket file will be named based on the interface name, so multiple # wpa_supplicant processes can be run at the same time if more than one # interface is used. # /var/run/wpa_supplicant is the recommended directory for sockets and by # default, wpa_cli will use it when trying to connect with wpa_supplicant. # # Access control for the control interface can be configured by setting the # directory to allow only members of a group to use sockets. This way, it is # possible to run wpa_supplicant as root (since it needs to change network # configuration and open raw sockets) and still allow GUI/CLI components to be # run as non-root users. However, since the control interface can be used to # change the network configuration, this access needs to be protected in many # cases. By default, wpa_supplicant is configured to use gid 0 (root). If you # want to allow non-root users to use the control interface, add a new group # and change this value to match with that group. Add users that should have # control interface access to this group. If this variable is commented out or # not included in the configuration file, group will not be changed from the # value it got by default when the directory or socket was created. # # When configuring both the directory and group, use following format: # DIR=/var/run/wpa_supplicant GROUP=wheel # DIR=/var/run/wpa_supplicant GROUP=0 # (group can be either group name or gid) # # For UDP connections (default on Windows): The value will be ignored. This # variable is just used to select that the control interface is to be created. # The value can be set to, e.g., udp (ctrl_interface=udp) # # For Windows Named Pipe: This value can be used to set the security descriptor # for controlling access to the control interface. Security descriptor can be # set using Security Descriptor String Format (see http://msdn.microsoft.com/ # library/default.asp?url=/library/en-us/secauthz/security/ # security_descriptor_string_format.asp). The descriptor string needs to be # prefixed with SDDL=. For example, ctrl_interface=SDDL=D: would set an empty # DACL (which will reject all connections). See README-Windows.txt for more # information about SDDL string format. # ctrl_interface=wlan0 # IEEE 802.1X/EAPOL version # wpa_supplicant is implemented based on IEEE Std 802.1X-2004 which defines # EAPOL version 2. However, there are many APs that do not handle the new # version number correctly (they seem to drop the frames completely). In order # to make wpa_supplicant interoperate with these APs, the version number is set # to 1 by default. This configuration value can be used to set it to the new # version (2). eapol_version=1 # AP scanning/selection # By default, wpa_supplicant requests driver to perform AP scanning and then # uses the scan results to select a suitable AP. Another alternative is to # allow the driver to take care of AP scanning and selection and use # wpa_supplicant just to process EAPOL frames based on IEEE 802.11 association # information from the driver. # 1: wpa_supplicant initiates scanning and AP selection # 0: driver takes care of scanning, AP selection, and IEEE 802.11 association # parameters (e.g., WPA IE generation); this mode can also be used with # non-WPA drivers when using IEEE 802.1X mode; do not try to associate with # APs (i.e., external program needs to control association). This mode must # also be used when using wired Ethernet drivers. # 2: like 0, but associate with APs using security policy and SSID (but not # BSSID); this can be used, e.g., with ndiswrapper and NDIS drivers to # enable operation with hidden SSIDs and optimized roaming; in this mode, # the network blocks in the configuration file are tried one by one until # the driver reports successful association; each network block should have # explicit security policy (i.e., only one option in the lists) for # key_mgmt, pairwise, group, proto variables ap_scan=1 # EAP fast re-authentication # By default, fast re-authentication is enabled for all EAP methods that # support it. This variable can be used to disable fast re-authentication. # Normally, there is no need to disable this. fast_reauth=1 # OpenSSL Engine support # These options can be used to load OpenSSL engines. # The two engines that are supported currently are shown below: # They are both from the opensc project (http://www.opensc.org/) # By default no engines are loaded. # make the opensc engine available #opensc_engine_path=/usr/lib/opensc/engine_opensc.so # make the pkcs11 engine available #pkcs11_engine_path=/usr/lib/opensc/engine_pkcs11.so # configure the path to the pkcs11 module required by the pkcs11 engine #pkcs11_module_path=/usr/lib/pkcs11/opensc-pkcs11.so # Dynamic EAP methods # If EAP methods were built dynamically as shared object files, they need to be # loaded here before being used in the network blocks. By default, EAP methods # are included statically in the build, so these lines are not needed #load_dynamic_eap=/usr/lib/wpa_supplicant/eap_tls.so #load_dynamic_eap=/usr/lib/wpa_supplicant/eap_md5.so # Driver interface parameters # This field can be used to configure arbitrary driver interace parameters. The # format is specific to the selected driver interface. This field is not used # in most cases. #driver_param="field=value" # Maximum lifetime for PMKSA in seconds; default 43200 #dot11RSNAConfigPMKLifetime=43200 # Threshold for reauthentication (percentage of PMK lifetime); default 70 #dot11RSNAConfigPMKReauthThreshold=70 # Timeout for security association negotiation in seconds; default 60 #dot11RSNAConfigSATimeout=60 # network block # # Each network (usually AP's sharing the same SSID) is configured as a separate # block in this configuration file. The network blocks are in preference order # (the first match is used). # # network block fields: # # disabled: # 0 = this network can be used (default) # 1 = this network block is disabled (can be enabled through ctrl_iface, # e.g., with wpa_cli or wpa_gui) # # id_str: Network identifier string for external scripts. This value is passed # to external action script through wpa_cli as WPA_ID_STR environment # variable to make it easier to do network specific configuration. # # ssid: SSID (mandatory); either as an ASCII string with double quotation or # as hex string; network name # # scan_ssid: # 0 = do not scan this SSID with specific Probe Request frames (default) # 1 = scan with SSID-specific Probe Request frames (this can be used to # find APs that do not accept broadcast SSID or use multiple SSIDs; # this will add latency to scanning, so enable this only when needed) # # bssid: BSSID (optional); if set, this network block is used only when # associating with the AP using the configured BSSID # # priority: priority group (integer) # By default, all networks will get same priority group (0). If some of the # networks are more desirable, this field can be used to change the order in # which wpa_supplicant goes through the networks when selecting a BSS. The # priority groups will be iterated in decreasing priority (i.e., the larger the # priority value, the sooner the network is matched against the scan results). # Within each priority group, networks will be selected based on security # policy, signal strength, etc. # Please note that AP scanning with scan_ssid=1 and ap_scan=2 mode are not # using this priority to select the order for scanning. Instead, they try the # networks in the order that used in the configuration file. # # mode: IEEE 802.11 operation mode # 0 = infrastructure (Managed) mode, i.e., associate with an AP (default) # 1 = IBSS (ad-hoc, peer-to-peer) # Note: IBSS can only be used with key_mgmt NONE (plaintext and static WEP) # and key_mgmt=WPA-NONE (fixed group key TKIP/CCMP). In addition, ap_scan has # to be set to 2 for IBSS. WPA-None requires following network block options: # proto=WPA, key_mgmt=WPA-NONE, pairwise=NONE, group=TKIP (or CCMP, but not # both), and psk must also be set. # # frequency: Channel frequency in megahertz (MHz) for IBSS, e.g., # 2412 = IEEE 802.11b/g channel 1. This value is used to configure the initial # channel for IBSS (adhoc) networks. It is ignored in the infrastructure mode. # In addition, this value is only used by the station that creates the IBSS. If # an IBSS network with the configured SSID is already present, the frequency of # the network will be used instead of this configured value. # # proto: list of accepted protocols # WPA = WPA/IEEE 802.11i/D3.0 # RSN = WPA2/IEEE 802.11i (also WPA2 can be used as an alias for RSN) # If not set, this defaults to: WPA RSN # # key_mgmt: list of accepted authenticated key management protocols # WPA-PSK = WPA pre-shared key (this requires 'psk' field) # WPA-EAP = WPA using EAP authentication (this can use an external # program, e.g., Xsupplicant, for IEEE 802.1X EAP Authentication # IEEE8021X = IEEE 802.1X using EAP authentication and (optionally) dynamically # generated WEP keys # NONE = WPA is not used; plaintext or static WEP could be used # If not set, this defaults to: WPA-PSK WPA-EAP # # auth_alg: list of allowed IEEE 802.11 authentication algorithms # OPEN = Open System authentication (required for WPA/WPA2) # SHARED = Shared Key authentication (requires static WEP keys) # LEAP = LEAP/Network EAP (only used with LEAP) # If not set, automatic selection is used (Open System with LEAP enabled if # LEAP is allowed as one of the EAP methods). # # pairwise: list of accepted pairwise (unicast) ciphers for WPA # CCMP = AES in Counter mode with CBC-MAC [RFC 3610, IEEE 802.11i/D7.0] # TKIP = Temporal Key Integrity Protocol [IEEE 802.11i/D7.0] # NONE = Use only Group Keys (deprecated, should not be included if APs support # pairwise keys) # If not set, this defaults to: CCMP TKIP # # group: list of accepted group (broadcast/multicast) ciphers for WPA # CCMP = AES in Counter mode with CBC-MAC [RFC 3610, IEEE 802.11i/D7.0] # TKIP = Temporal Key Integrity Protocol [IEEE 802.11i/D7.0] # WEP104 = WEP (Wired Equivalent Privacy) with 104-bit key # WEP40 = WEP (Wired Equivalent Privacy) with 40-bit key [IEEE 802.11] # If not set, this defaults to: CCMP TKIP WEP104 WEP40 # # psk: WPA preshared key; 256-bit pre-shared key # The key used in WPA-PSK mode can be entered either as 64 hex-digits, i.e., # 32 bytes or as an ASCII passphrase (in which case, the real PSK will be # generated using the passphrase and SSID). ASCII passphrase must be between # 8 and 63 characters (inclusive). # This field is not needed, if WPA-EAP is used. # Note: Separate tool, wpa_passphrase, can be used to generate 256-bit keys # from ASCII passphrase. This process uses lot of CPU and wpa_supplicant # startup and reconfiguration time can be optimized by generating the PSK only # only when the passphrase or SSID has actually changed. # # eapol_flags: IEEE 802.1X/EAPOL options (bit field) # Dynamic WEP key required for non-WPA mode # bit0 (1): require dynamically generated unicast WEP key # bit1 (2): require dynamically generated broadcast WEP key # (3 = require both keys; default) # Note: When using wired authentication, eapol_flags must be set to 0 for the # authentication to be completed successfully. # # mixed_cell: This option can be used to configure whether so called mixed # cells, i.e., networks that use both plaintext and encryption in the same # SSID, are allowed when selecting a BSS form scan results. # 0 = disabled (default) # 1 = enabled # # proactive_key_caching: # Enable/disable opportunistic PMKSA caching for WPA2. # 0 = disabled (default) # 1 = enabled # # wep_key0..3: Static WEP key (ASCII in double quotation, e.g. "abcde" or # hex without quotation, e.g., 0102030405) # wep_tx_keyidx: Default WEP key index (TX) (0..3) # # peerkey: Whether PeerKey negotiation for direct links (IEEE 802.11e DLS) is # allowed. This is only used with RSN/WPA2. # 0 = disabled (default) # 1 = enabled #peerkey=1 # # Following fields are only used with internal EAP implementation. # eap: space-separated list of accepted EAP methods # MD5 = EAP-MD5 (unsecure and does not generate keying material -> # cannot be used with WPA; to be used as a Phase 2 method # with EAP-PEAP or EAP-TTLS) # MSCHAPV2 = EAP-MSCHAPv2 (cannot be used separately with WPA; to be used # as a Phase 2 method with EAP-PEAP or EAP-TTLS) # OTP = EAP-OTP (cannot be used separately with WPA; to be used # as a Phase 2 method with EAP-PEAP or EAP-TTLS) # GTC = EAP-GTC (cannot be used separately with WPA; to be used # as a Phase 2 method with EAP-PEAP or EAP-TTLS) # TLS = EAP-TLS (client and server certificate) # PEAP = EAP-PEAP (with tunnelled EAP authentication) # TTLS = EAP-TTLS (with tunnelled EAP or PAP/CHAP/MSCHAP/MSCHAPV2 # authentication) # If not set, all compiled in methods are allowed. # # identity: Identity string for EAP # anonymous_identity: Anonymous identity string for EAP (to be used as the # unencrypted identity with EAP types that support different tunnelled # identity, e.g., EAP-TTLS) # password: Password string for EAP # ca_cert: File path to CA certificate file (PEM/DER). This file can have one # or more trusted CA certificates. If ca_cert and ca_path are not # included, server certificate will not be verified. This is insecure and # a trusted CA certificate should always be configured when using # EAP-TLS/TTLS/PEAP. Full path should be used since working directory may # change when wpa_supplicant is run in the background. # On Windows, trusted CA certificates can be loaded from the system # certificate store by setting this to cert_store://, e.g., # ca_cert="cert_store://CA" or ca_cert="cert_store://ROOT". # Note that when running wpa_supplicant as an application, the user # certificate store (My user account) is used, whereas computer store # (Computer account) is used when running wpasvc as a service. # ca_path: Directory path for CA certificate files (PEM). This path may # contain multiple CA certificates in OpenSSL format. Common use for this # is to point to system trusted CA list which is often installed into # directory like /etc/ssl/certs. If configured, these certificates are # added to the list of trusted CAs. ca_cert may also be included in that # case, but it is not required. # client_cert: File path to client certificate file (PEM/DER) # Full path should be used since working directory may change when # wpa_supplicant is run in the background. # Alternatively, a named configuration blob can be used by setting this # to blob://. # private_key: File path to client private key file (PEM/DER/PFX) # When PKCS#12/PFX file (.p12/.pfx) is used, client_cert should be # commented out. Both the private key and certificate will be read from # the PKCS#12 file in this case. Full path should be used since working # directory may change when wpa_supplicant is run in the background. # Windows certificate store can be used by leaving client_cert out and # configuring private_key in one of the following formats: # cert://substring_to_match # hash://certificate_thumbprint_in_hex # for example: private_key="hash://63093aa9c47f56ae88334c7b65a4" # Note that when running wpa_supplicant as an application, the user # certificate store (My user account) is used, whereas computer store # (Computer account) is used when running wpasvc as a service. # Alternatively, a named configuration blob can be used by setting this # to blob://. # private_key_passwd: Password for private key file (if left out, this will be # asked through control interface) # dh_file: File path to DH/DSA parameters file (in PEM format) # This is an optional configuration file for setting parameters for an # ephemeral DH key exchange. In most cases, the default RSA # authentication does not use this configuration. However, it is possible # setup RSA to use ephemeral DH key exchange. In addition, ciphers with # DSA keys always use ephemeral DH keys. This can be used to achieve # forward secrecy. If the file is in DSA parameters format, it will be # automatically converted into DH params. # subject_match: Substring to be matched against the subject of the # authentication server certificate. If this string is set, the server # sertificate is only accepted if it contains this string in the subject. # The subject string is in following format: # /C=US/ST=CA/L=San Francisco/CN=Test AS/emailAddress=as@example.com # altsubject_match: Semicolon separated string of entries to be matched against # the alternative subject name of the authentication server certificate. # If this string is set, the server sertificate is only accepted if it # contains one of the entries in an alternative subject name extension. # altSubjectName string is in following format: TYPE:VALUE # Example: EMAIL:server@example.com # Example: DNS:server.example.com;DNS:server2.example.com # Following types are supported: EMAIL, DNS, URI # phase1: Phase1 (outer authentication, i.e., TLS tunnel) parameters # (string with field-value pairs, e.g., "peapver=0" or # "peapver=1 peaplabel=1") # 'peapver' can be used to force which PEAP version (0 or 1) is used. # 'peaplabel=1' can be used to force new label, "client PEAP encryption", # to be used during key derivation when PEAPv1 or newer. Most existing # PEAPv1 implementation seem to be using the old label, "client EAP # encryption", and wpa_supplicant is now using that as the default value. # Some servers, e.g., Radiator, may require peaplabel=1 configuration to # interoperate with PEAPv1; see eap_testing.txt for more details. # 'peap_outer_success=0' can be used to terminate PEAP authentication on # tunneled EAP-Success. This is required with some RADIUS servers that # implement draft-josefsson-pppext-eap-tls-eap-05.txt (e.g., # Lucent NavisRadius v4.4.0 with PEAP in "IETF Draft 5" mode) # include_tls_length=1 can be used to force wpa_supplicant to include # TLS Message Length field in all TLS messages even if they are not # fragmented. # sim_min_num_chal=3 can be used to configure EAP-SIM to require three # challenges (by default, it accepts 2 or 3) # phase2: Phase2 (inner authentication with TLS tunnel) parameters # (string with field-value pairs, e.g., "auth=MSCHAPV2" for EAP-PEAP or # "autheap=MSCHAPV2 autheap=MD5" for EAP-TTLS) # Following certificate/private key fields are used in inner Phase2 # authentication when using EAP-TTLS or EAP-PEAP. # ca_cert2: File path to CA certificate file. This file can have one or more # trusted CA certificates. If ca_cert2 and ca_path2 are not included, # server certificate will not be verified. This is insecure and a trusted # CA certificate should always be configured. # ca_path2: Directory path for CA certificate files (PEM) # client_cert2: File path to client certificate file # private_key2: File path to client private key file # private_key2_passwd: Password for private key file # dh_file2: File path to DH/DSA parameters file (in PEM format) # subject_match2: Substring to be matched against the subject of the # authentication server certificate. # altsubject_match2: Substring to be matched against the alternative subject # name of the authentication server certificate. # # fragment_size: Maximum EAP fragment size in bytes (default 1398). # This value limits the fragment size for EAP methods that support # fragmentation (e.g., EAP-TLS and EAP-PEAP). This value should be set # small enough to make the EAP messages fit in MTU of the network # interface used for EAPOL. The default value is suitable for most # cases. # # EAP-PSK variables: # eappsk: 16-byte (128-bit, 32 hex digits) pre-shared key in hex format # nai: user NAI # # EAP-PAX variables: # eappsk: 16-byte (128-bit, 32 hex digits) pre-shared key in hex format # # EAP-SAKE variables: # eappsk: 32-byte (256-bit, 64 hex digits) pre-shared key in hex format # (this is concatenation of Root-Secret-A and Root-Secret-B) # nai: user NAI (PEERID) # # EAP-GPSK variables: # eappsk: Pre-shared key in hex format (at least 128 bits, i.e., 32 hex digits) # nai: user NAI (ID_Client) # # EAP-FAST variables: # pac_file: File path for the PAC entries. wpa_supplicant will need to be able # to create this file and write updates to it when PAC is being # provisioned or refreshed. Full path to the file should be used since # working directory may change when wpa_supplicant is run in the # background. Alternatively, a named configuration blob can be used by # setting this to blob:// # phase1: fast_provisioning=1 option enables in-line provisioning of EAP-FAST # credentials (PAC) # # wpa_supplicant supports number of "EAP workarounds" to work around # interoperability issues with incorrectly behaving authentication servers. # These are enabled by default because some of the issues are present in large # number of authentication servers. Strict EAP conformance mode can be # configured by disabling workarounds with eap_workaround=0. # Example blocks: # Simple case: WPA-PSK, PSK as an ASCII passphrase, allow all valid ciphers #network={ # ssid="simple" # psk="very secret passphrase" # priority=5 #} # Same as previous, but request SSID-specific scanning (for APs that reject # broadcast SSID) #network={ # ssid="second ssid" # scan_ssid=1 # psk="very secret passphrase" # priority=2 #} # Only WPA-PSK is used. Any valid cipher combination is accepted. #network={ # ssid="example" # proto=WPA # key_mgmt=WPA-PSK # pairwise=CCMP TKIP # group=CCMP TKIP WEP104 WEP40 # psk=06b4be19da289f475aa46a33cb793029d4ab3db7a23ee92382eb0106c72ac7bb # priority=2 #} # Only WPA-EAP is used. Both CCMP and TKIP is accepted. An AP that used WEP104 # or WEP40 as the group cipher will not be accepted. #network={ # ssid="example" # proto=RSN # key_mgmt=WPA-EAP # pairwise=CCMP TKIP # group=CCMP TKIP # eap=TLS # identity="user@example.com" # ca_cert="/etc/cert/ca.pem" # client_cert="/etc/cert/user.pem" # private_key="/etc/cert/user.prv" # private_key_passwd="password" # priority=1 #} # EAP-PEAP/MSCHAPv2 configuration for RADIUS servers that use the new peaplabel # (e.g., Radiator) #network={ # ssid="example" # key_mgmt=WPA-EAP # eap=PEAP # identity="user@example.com" # password="foobar" # ca_cert="/etc/cert/ca.pem" # phase1="peaplabel=1" # phase2="auth=MSCHAPV2" # priority=10 #} # EAP-TTLS/EAP-MD5-Challenge configuration with anonymous identity for the # unencrypted use. Real identity is sent only within an encrypted TLS tunnel. #network={ # ssid="example" # key_mgmt=WPA-EAP # eap=TTLS # identity="user@example.com" # anonymous_identity="anonymous@example.com" # password="foobar" # ca_cert="/etc/cert/ca.pem" # priority=2 #} # EAP-TTLS/MSCHAPv2 configuration with anonymous identity for the unencrypted # use. Real identity is sent only within an encrypted TLS tunnel. #network={ # ssid="example" # key_mgmt=WPA-EAP # eap=TTLS # identity="user@example.com" # anonymous_identity="anonymous@example.com" # password="foobar" # ca_cert="/etc/cert/ca.pem" # phase2="auth=MSCHAPV2" #} # WPA-EAP, EAP-TTLS with different CA certificate used for outer and inner # authentication. #network={ # ssid="example" # key_mgmt=WPA-EAP # eap=TTLS # # Phase1 / outer authentication # anonymous_identity="anonymous@example.com" # ca_cert="/etc/cert/ca.pem" # # Phase 2 / inner authentication # phase2="autheap=TLS" # ca_cert2="/etc/cert/ca2.pem" # client_cert2="/etc/cer/user.pem" # private_key2="/etc/cer/user.prv" # private_key2_passwd="password" # priority=2 #} # Both WPA-PSK and WPA-EAP is accepted. Only CCMP is accepted as pairwise and # group cipher. #network={ # ssid="example" # bssid=00:11:22:33:44:55 # proto=WPA RSN # key_mgmt=WPA-PSK WPA-EAP # pairwise=CCMP # group=CCMP # psk=06b4be19da289f475aa46a33cb793029d4ab3db7a23ee92382eb0106c72ac7bb #} # Special characters in SSID, so use hex string. Default to WPA-PSK, WPA-EAP # and all valid ciphers. #network={ # ssid=00010203 # psk=000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f #} # EAP-SIM with a GSM SIM or USIM #network={ # ssid="eap-sim-test" # key_mgmt=WPA-EAP # eap=SIM # pin="1234" # pcsc="" #} # EAP-PSK #network={ # ssid="eap-psk-test" # key_mgmt=WPA-EAP # eap=PSK # identity="eap_psk_user" # eappsk=06b4be19da289f475aa46a33cb793029 # nai="eap_psk_user@example.com" #} # IEEE 802.1X/EAPOL with dynamically generated WEP keys (i.e., no WPA) using # EAP-TLS for authentication and key generation; require both unicast and # broadcast WEP keys. #network={ # ssid="1x-test" # key_mgmt=IEEE8021X # eap=TLS # identity="user@example.com" # ca_cert="/etc/cert/ca.pem" # client_cert="/etc/cert/user.pem" # private_key="/etc/cert/user.prv" # private_key_passwd="password" # eapol_flags=3 #} # LEAP with dynamic WEP keys #network={ # ssid="leap-example" # key_mgmt=IEEE8021X # eap=LEAP # identity="user" # password="foobar" #} # EAP-FAST with WPA (WPA or WPA2) #network={ # ssid="eap-fast-test" # key_mgmt=WPA-EAP # eap=FAST # anonymous_identity="FAST-000102030405" # identity="username" # password="password" # phase1="fast_provisioning=1" # pac_file="/etc/wpa_supplicant.eap-fast-pac" #} #network={ # ssid="eap-fast-test" # key_mgmt=WPA-EAP # eap=FAST # anonymous_identity="FAST-000102030405" # identity="username" # password="password" # phase1="fast_provisioning=1" # pac_file="blob://eap-fast-pac" #} # Plaintext connection (no WPA, no IEEE 802.1X) #network={ # ssid="plaintext-test" # key_mgmt=NONE #} # Shared WEP key connection (no WPA, no IEEE 802.1X) #network={ # ssid="static-wep-test" # key_mgmt=NONE # wep_key0="abcde" # wep_key1=0102030405 # wep_key2="1234567890123" # wep_tx_keyidx=0 # priority=5 #} # Shared WEP key connection (no WPA, no IEEE 802.1X) using Shared Key # IEEE 802.11 authentication #network={ # ssid="static-wep-test2" # key_mgmt=NONE # wep_key0="abcde" # wep_key1=0102030405 # wep_key2="1234567890123" # wep_tx_keyidx=0 # priority=5 # auth_alg=SHARED #} # IBSS/ad-hoc network with WPA-None/TKIP. #network={ # ssid="test adhoc" # mode=1 # frequency=2412 # proto=WPA # key_mgmt=WPA-NONE # pairwise=NONE # group=TKIP # psk="secret passphrase" #} # Catch all example that allows more or less all configuration modes #network={ # ssid="example" # scan_ssid=1 # key_mgmt=WPA-EAP WPA-PSK IEEE8021X NONE # pairwise=CCMP TKIP # group=CCMP TKIP WEP104 WEP40 # psk="very secret passphrase" # eap=TTLS PEAP TLS # identity="user@example.com" # password="foobar" # ca_cert="/etc/cert/ca.pem" # client_cert="/etc/cert/user.pem" # private_key="/etc/cert/user.prv" # private_key_passwd="password" # phase1="peaplabel=0" #} # Example of EAP-TLS with smartcard (openssl engine) #network={ # ssid="example" # key_mgmt=WPA-EAP # eap=TLS # proto=RSN # pairwise=CCMP TKIP # group=CCMP TKIP # identity="user@example.com" # ca_cert="/etc/cert/ca.pem" # client_cert="/etc/cert/user.pem" # # engine=1 # # The engine configured here must be available. Look at # OpenSSL engine support in the global section. # The key available through the engine must be the private key # matching the client certificate configured above. # use the opensc engine #engine_id="opensc" #key_id="45" # use the pkcs11 engine # engine_id="pkcs11" # key_id="id_45" # Optional PIN configuration; this can be left out and PIN will be # asked through the control interface # pin="1234" #} # Example configuration showing how to use an inlined blob as a CA certificate # data instead of using external file #network={ # ssid="example" # key_mgmt=WPA-EAP # eap=TTLS # identity="user@example.com" # anonymous_identity="anonymous@example.com" # password="foobar" # ca_cert="blob://exampleblob" # priority=20 #} #blob-base64-exampleblob={ #SGVsbG8gV29ybGQhCg== #} # Wildcard match for SSID (plaintext APs only). This example selects any # open AP regardless of its SSID. #network={ # key_mgmt=NONE #} \ No newline at end of file diff --git a/fstab.thunderc b/fstab.thunderc new file mode 100644 index 0000000..cb399f2 --- /dev/null +++ b/fstab.thunderc @@ -0,0 +1,13 @@ +# http://source.android.com/devices/tech/storage/index.html +# + +system /system yaffs2 ro,remount length=166199296,wait +boot /boot mtd defaults length=7340032 +cache /cache yaffs2 nosuid,nodev length=130154496,wait +userdata /data yaffs2 nosuid,nodev length=172883968,wait +misc /misc mtd defaults length=524288 +recovery /recovery mtd defaults length=7340032 +/dev/block/mmcblk0p1 /sdcard auto defaults recoveryonly +/dev/block/mmcblk0p2 /sd-ext auto defaults recoveryonly + +/devices/platform/msm_sdcc.1/mmc_host/mmc0 /storage/sdcard0 auto defaults voldmanaged=sdcard:auto diff --git a/init.recovery.rc b/init.recovery.rc new file mode 100644 index 0000000..83250fa --- /dev/null +++ b/init.recovery.rc @@ -0,0 +1,63 @@ +on early-init + start ueventd + +on init + export PATH /sbin + export LD_LIBRARY_PATH .:/sbin + export ANDROID_ROOT /system + export ANDROID_DATA /data + export EXTERNAL_STORAGE /sdcard + + symlink /system/etc /etc + + mkdir /boot + mkdir /sdcard + mkdir /sd-ext + mkdir /datadata + mkdir /emmc + mkdir /system + mkdir /data + mkdir /cache + mount /tmp /tmp tmpfs + +on boot + + ifup lo + hostname localhost + domainname localdomain + + class_start default + +service ueventd /sbin/ueventd + critical + +service recovery /sbin/recovery + +service adbd /sbin/adbd recovery + disabled + +# Always start adbd on userdebug and eng builds +# In recovery, always run adbd as root. +on property:ro.debuggable=1 + write /sys/class/android_usb/android0/enable 0 + write /sys/class/android_usb/android0/idVendor 1004 + write /sys/class/android_usb/android0/idProduct 61A6 + write /sys/class/android_usb/android0/functions mtp,adb + #write /sys/class/android_usb/android0/enable 1 + write /sys/class/android_usb/android0/iManufacturer LGE + write /sys/class/android_usb/android0/iProduct thunderc + write /sys/class/android_usb/android0/iSerial $ro.serialno + #start adbd + setprop service.adb.root 1 + +# Restart adbd so it can run as root +on property:service.adb.root=1 + write /sys/class/android_usb/android0/enable 0 + restart adbd + write /sys/class/android_usb/android0/enable 1 + +on property:persist.service.adb.enable=1 + start adbd + +on property:persist.service.adb.enable=0 + stop adbd diff --git a/init.thunderc.rc b/init.thunderc.rc index b008f71..7512b6d 100644 --- a/init.thunderc.rc +++ b/init.thunderc.rc @@ -1,19 +1,37 @@ # inherit qcom init import init.qcom.rc -on early-boot - exec /sbin/chargerlogo +#on early-boot +# exec /sbin/chargerlogo -on init - # Add permissions for camera access - chmod 0666 /dev/msm_camera/config0 - chmod 0666 /dev/msm_camera/control0 - chmod 0666 /dev/msm_camera/frame0 - chmod 0666 /dev/msm_camera/pic0 +on early-init + mkdir /storage 0755 system sdcard_r + mkdir /storage/sdcard0 0000 system system + symlink /storage/sdcard0 /mnt/sdcard + symlink /storage/sdcard0 /sdcard + export EXTERNAL_STORAGE /storage/sdcard0 + +service dhcp-service /system/bin/netcfg wlan0 dhcp + class main + oneshot + +on property:dev.bootcomplete=1 + stop dhcp-service + start dhcp-service + +on fs +# mount_all /fstab.thunderc + +# mount mtd partitions + # Mount /system rw first to give the filesystem a chance to save a checkpoint + mount yaffs2 mtd@system /system + mount yaffs2 mtd@system /system ro remount + mount yaffs2 mtd@userdata /data nosuid nodev + mount yaffs2 mtd@cache /cache nosuid nodev + + on boot - mkdir /data/radio 0770 radio radio - chmod 2770 /data/radio ## VIBRATOR chmod 0660 /sys/class/timed_output/vibrator/amp @@ -31,56 +49,35 @@ on boot chmod 0664 /sys/class/leds/lcd-backlight/alc chown system system /sys/devices/platform/mddi_hitachi_hvga.10/lcd_onoff chmod 0664 /sys/devices/platform/mddi_hitachi_hvga.10/lcd_onoff + - # allow interfaces to get IPv6 address when tethering is enabled - write /proc/sys/net/ipv6/conf/rmnet0/accept_ra 2 - write /proc/sys/net/ipv6/conf/rmnet1/accept_ra 2 - write /proc/sys/net/ipv6/conf/rmnet2/accept_ra 2 - -on fs - # framebuffer permission for copybit - chmod 0666 /dev/graphics/fb0 -on post-fs +#on post-fs +# chmod 0771 /cache - # nv - mkdir /data/nv - chown system system /data/nv - chmod 0711 /data/nv - chmod 0771 /cache +#service chargerlogo /charger +# class charger +# user root - # wifi - chmod 0777 /data/misc/wifi/config_mac - mkdir /data/audioprop 0777 system system - mkdir /data/misc/wifi/sockets 0770 wifi wifi - setprop wifi.supplicant_scan_interval 20 - setprop wifi.interface wlan0 - mkdir /data/misc/dhcp 0777 system system - -service chargerlogo /charger - class charger - user root - -on property:init.svc.chargerlogo=running - setprop sys.usb.config adb - write /sys/devices/system/cpu/cpu0/cpufreq/scaling_governor powersave +#on property:init.svc.chargerlogo=running +# setprop sys.usb.config adb +# write /sys/devices/system/cpu/cpu0/cpufreq/scaling_governor powersave service ami304d /system/bin/ami304d class main user compass group system -service qcom-sh /system/bin/sh /init.qcom.sh - class core +## CHARGER ## +service charger /sbin/checkbootreason + class charger user root + group root oneshot -service qcom-post-boot /system/bin/sh /system/etc/init.qcom.post_boot.sh - class main - user root - disabled - oneshot +on property:init.svc.charger=running + setprop sys.usb.config adb + + -on property:init.svc.bootanim=stopped - start qcom-post-boot diff --git a/kernels/test10/librasdioif.ko b/kernels/test10/librasdioif.ko deleted file mode 100644 index 6bdd507..0000000 Binary files a/kernels/test10/librasdioif.ko and /dev/null differ diff --git a/kernels/test10/tun.ko b/kernels/test10/tun.ko deleted file mode 100644 index c300f1e..0000000 Binary files a/kernels/test10/tun.ko and /dev/null differ diff --git a/kernels/test10/wireless.ko b/kernels/test10/wireless.ko deleted file mode 100644 index e7f10e7..0000000 Binary files a/kernels/test10/wireless.ko and /dev/null differ diff --git a/kernels/test10/zImage b/kernels/test10/zImage deleted file mode 100644 index 943d054..0000000 Binary files a/kernels/test10/zImage and /dev/null differ diff --git a/kernels/test12/librasdioif.ko b/kernels/test12/librasdioif.ko deleted file mode 100644 index 7c1fec9..0000000 Binary files a/kernels/test12/librasdioif.ko and /dev/null differ diff --git a/kernels/test12/tun.ko b/kernels/test12/tun.ko deleted file mode 100644 index c61c328..0000000 Binary files a/kernels/test12/tun.ko and /dev/null differ diff --git a/kernels/test12/wireless.ko b/kernels/test12/wireless.ko deleted file mode 100644 index e6b0cab..0000000 Binary files a/kernels/test12/wireless.ko and /dev/null differ diff --git a/kernels/test12/zImage b/kernels/test12/zImage deleted file mode 100644 index 7a8ea4b..0000000 Binary files a/kernels/test12/zImage and /dev/null differ diff --git a/kernels/test13/librasdioif.ko b/kernels/test13/librasdioif.ko deleted file mode 100644 index 9a0ea3f..0000000 Binary files a/kernels/test13/librasdioif.ko and /dev/null differ diff --git a/kernels/test13/tun.ko b/kernels/test13/tun.ko deleted file mode 100644 index 0d1e6a4..0000000 Binary files a/kernels/test13/tun.ko and /dev/null differ diff --git a/kernels/test13/wireless.ko b/kernels/test13/wireless.ko deleted file mode 100644 index 3c95451..0000000 Binary files a/kernels/test13/wireless.ko and /dev/null differ diff --git a/kernels/test13/zImage b/kernels/test13/zImage deleted file mode 100644 index 6201731..0000000 Binary files a/kernels/test13/zImage and /dev/null differ diff --git a/kernels/test13usb/librasdioif.ko b/kernels/test13usb/librasdioif.ko deleted file mode 100644 index 220f90c..0000000 Binary files a/kernels/test13usb/librasdioif.ko and /dev/null differ diff --git a/kernels/test13usb/tun.ko b/kernels/test13usb/tun.ko deleted file mode 100644 index bed0d3c..0000000 Binary files a/kernels/test13usb/tun.ko and /dev/null differ diff --git a/kernels/test13usb/wireless.ko b/kernels/test13usb/wireless.ko deleted file mode 100644 index fa45c5a..0000000 Binary files a/kernels/test13usb/wireless.ko and /dev/null differ diff --git a/kernels/test13usb/zImage b/kernels/test13usb/zImage deleted file mode 100644 index 1f2e56e..0000000 Binary files a/kernels/test13usb/zImage and /dev/null differ diff --git a/kernels/test15/librasdioif.ko b/kernels/test15/librasdioif.ko deleted file mode 100644 index 13cf286..0000000 Binary files a/kernels/test15/librasdioif.ko and /dev/null differ diff --git a/kernels/test15/tun.ko b/kernels/test15/tun.ko deleted file mode 100644 index 22cabc7..0000000 Binary files a/kernels/test15/tun.ko and /dev/null differ diff --git a/kernels/test15/wireless.ko b/kernels/test15/wireless.ko deleted file mode 100644 index d6ff641..0000000 Binary files a/kernels/test15/wireless.ko and /dev/null differ diff --git a/kernels/test15/zImage b/kernels/test15/zImage deleted file mode 100644 index 981bfad..0000000 Binary files a/kernels/test15/zImage and /dev/null differ diff --git a/kernels/test16/wireless.ko b/kernels/test16/wireless.ko deleted file mode 100644 index 26aeb68..0000000 Binary files a/kernels/test16/wireless.ko and /dev/null differ diff --git a/kernels/test16/zImage b/kernels/test16/zImage deleted file mode 100644 index bb67cb5..0000000 Binary files a/kernels/test16/zImage and /dev/null differ diff --git a/kernels/test17/librasdioif.ko b/kernels/test17/librasdioif.ko deleted file mode 100644 index cc119a3..0000000 Binary files a/kernels/test17/librasdioif.ko and /dev/null differ diff --git a/kernels/test17/tun.ko b/kernels/test17/tun.ko deleted file mode 100644 index 723fa03..0000000 Binary files a/kernels/test17/tun.ko and /dev/null differ diff --git a/kernels/test17/zImage b/kernels/test17/zImage deleted file mode 100644 index 03bc416..0000000 Binary files a/kernels/test17/zImage and /dev/null differ diff --git a/kernels/test18/librasdioif.ko b/kernels/test18/librasdioif.ko deleted file mode 100644 index ab3a81e..0000000 Binary files a/kernels/test18/librasdioif.ko and /dev/null differ diff --git a/kernels/test18/tun.ko b/kernels/test18/tun.ko deleted file mode 100644 index 745c9e4..0000000 Binary files a/kernels/test18/tun.ko and /dev/null differ diff --git a/kernels/test18/wireless.ko b/kernels/test18/wireless.ko deleted file mode 100644 index 35cb2e1..0000000 Binary files a/kernels/test18/wireless.ko and /dev/null differ diff --git a/kernels/test18/zImage b/kernels/test18/zImage deleted file mode 100644 index 6baadf4..0000000 Binary files a/kernels/test18/zImage and /dev/null differ diff --git a/kernels/test19/librasdioif.ko b/kernels/test19/librasdioif.ko deleted file mode 100644 index 9fb14af..0000000 Binary files a/kernels/test19/librasdioif.ko and /dev/null differ diff --git a/kernels/test19/tun.ko b/kernels/test19/tun.ko deleted file mode 100644 index 9fd5dfd..0000000 Binary files a/kernels/test19/tun.ko and /dev/null differ diff --git a/kernels/test19/wireless.ko b/kernels/test19/wireless.ko deleted file mode 100644 index f570f63..0000000 Binary files a/kernels/test19/wireless.ko and /dev/null differ diff --git a/kernels/test19/zImage b/kernels/test19/zImage deleted file mode 100644 index d50f20e..0000000 Binary files a/kernels/test19/zImage and /dev/null differ diff --git a/kernels/test19old/librasdioif.ko b/kernels/test19old/librasdioif.ko deleted file mode 100644 index 9fb14af..0000000 Binary files a/kernels/test19old/librasdioif.ko and /dev/null differ diff --git a/kernels/test19old/tun.ko b/kernels/test19old/tun.ko deleted file mode 100644 index 9fd5dfd..0000000 Binary files a/kernels/test19old/tun.ko and /dev/null differ diff --git a/kernels/test19old/wireless.ko b/kernels/test19old/wireless.ko deleted file mode 100644 index f570f63..0000000 Binary files a/kernels/test19old/wireless.ko and /dev/null differ diff --git a/kernels/test19old/zImage b/kernels/test19old/zImage deleted file mode 100644 index 11604a3..0000000 Binary files a/kernels/test19old/zImage and /dev/null differ diff --git a/kernels/test21/librasdioif.ko b/kernels/test21/librasdioif.ko new file mode 100644 index 0000000..e211ce9 Binary files /dev/null and b/kernels/test21/librasdioif.ko differ diff --git a/kernels/test16/librasdioif.ko b/kernels/test21/librasdioif23.ko similarity index 98% rename from kernels/test16/librasdioif.ko rename to kernels/test21/librasdioif23.ko index a26d43c..d6c6b72 100644 Binary files a/kernels/test16/librasdioif.ko and b/kernels/test21/librasdioif23.ko differ diff --git a/kernels/test16/tun.ko b/kernels/test21/tun23.ko similarity index 50% rename from kernels/test16/tun.ko rename to kernels/test21/tun23.ko index bcac00b..7efedf1 100644 Binary files a/kernels/test16/tun.ko and b/kernels/test21/tun23.ko differ diff --git a/kernels/test21/wireless.ko b/kernels/test21/wireless.ko new file mode 100644 index 0000000..c23333c Binary files /dev/null and b/kernels/test21/wireless.ko differ diff --git a/kernels/test17/wireless.ko b/kernels/test21/wireless23.ko similarity index 96% rename from kernels/test17/wireless.ko rename to kernels/test21/wireless23.ko index 0183246..93fb480 100644 Binary files a/kernels/test17/wireless.ko and b/kernels/test21/wireless23.ko differ diff --git a/kernels/test21/zImage b/kernels/test21/zImage index d34bf96..cf5ef13 100644 Binary files a/kernels/test21/zImage and b/kernels/test21/zImage differ diff --git a/kernels/test21/zImage23 b/kernels/test21/zImage23 new file mode 100644 index 0000000..d34bf96 Binary files /dev/null and b/kernels/test21/zImage23 differ diff --git a/kernels/test21/zImage23b b/kernels/test21/zImage23b new file mode 100644 index 0000000..d34bf96 Binary files /dev/null and b/kernels/test21/zImage23b differ diff --git a/overlay/frameworks/base/core/res/res/values/config.xml b/overlay/frameworks/base/core/res/res/values/config.xml index d9f6aaf..71d189c 100644 --- a/overlay/frameworks/base/core/res/res/values/config.xml +++ b/overlay/frameworks/base/core/res/res/values/config.xml @@ -9,10 +9,10 @@ 8 - Search 16 - App switch For example, a device with Home, Back and Menu keys would set this - config to 7. - 15 --> - + config to 7. --> + 15 + + + diff --git a/prebuilt/recovery_ui.c b/prebuilt/recovery_ui.c new file mode 100644 index 0000000..7c4249a --- /dev/null +++ b/prebuilt/recovery_ui.c @@ -0,0 +1,109 @@ +/* + * Copyright (C) 2009 The Android Open Source Project + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +#include + +#include "recovery_ui.h" +#include "common.h" +#include "extendedcommands.h" + +char* MENU_HEADERS[] = { NULL }; + +char* MENU_ITEMS[] = { "reboot system now", + "apply update from sdcard", + "wipe data/factory reset", + "wipe cache partition", + "install zip from sdcard", + "backup and restore", + "mounts and storage", + "advanced", + "power off", + NULL }; + +int device_recovery_start() { + return 0; +} + +int device_toggle_display(volatile char* key_pressed, int key_code) { + int alt = key_pressed[KEY_LEFTALT] || key_pressed[KEY_RIGHTALT]; + if (alt && key_code == KEY_L) + return 1; + // allow toggling of the display if the correct key is pressed, and the display toggle is allowed or the display is currently off + if (ui_get_showing_back_button()) { + return 0; + //return get_allow_toggle_display() && (key_code == KEY_HOME || key_code == KEY_MENU || key_code == KEY_END); + } + return get_allow_toggle_display() && (key_code == KEY_HOME || key_code == KEY_POWER || key_code == KEY_END); +} + +int device_reboot_now(volatile char* key_pressed, int key_code) { + return 0; +} + +int device_handle_key(int key_code, int visible) { + if (visible) { + switch (key_code) { + case KEY_CAPSLOCK: + case KEY_DOWN: + case KEY_VOLUMEDOWN: + return HIGHLIGHT_DOWN; + + case KEY_LEFTSHIFT: + case KEY_UP: + case KEY_VOLUMEUP: + case KEY_HOME: + return HIGHLIGHT_UP; + + case KEY_POWER: + if (ui_get_showing_back_button()) { + return SELECT_ITEM; + } + if (!get_allow_toggle_display()) + return GO_BACK; + break; + case KEY_LEFTBRACE: + case KEY_ENTER: + case BTN_MOUSE: + //case KEY_CENTER: + case KEY_CAMERA: + case KEY_F21: + case KEY_SEND: + case KEY_MENU: + return SELECT_ITEM; + + case KEY_END: + case KEY_BACKSPACE: + case KEY_SEARCH: + if (ui_get_showing_back_button()) { + return SELECT_ITEM; + } + if (!get_allow_toggle_display()) + return GO_BACK; + case KEY_BACK: + return GO_BACK; + } + } + + return NO_ACTION; +} + +int device_perform_action(int which) { + return which; +} + +int device_wipe_data() { + return 0; +} diff --git a/prebuilt/recovery_ui.h b/prebuilt/recovery_ui.h new file mode 100644 index 0000000..ec5f4fa --- /dev/null +++ b/prebuilt/recovery_ui.h @@ -0,0 +1,99 @@ +/* + * Copyright (C) 2009 The Android Open Source Project + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +#ifndef _RECOVERY_UI_H +#define _RECOVERY_UI_H + +#include "common.h" + +// Called before UI library is initialized. Can change things like +// how many frames are included in various animations, etc. +extern void device_ui_init(UIParameters* ui_parameters); + +// Called when recovery starts up. Returns 0. +extern int device_recovery_start(); + +// Called in the input thread when a new key (key_code) is pressed. +// *key_pressed is an array of KEY_MAX+1 bytes indicating which other +// keys are already pressed. Return true if the text display should +// be toggled. +extern int device_toggle_display(volatile char* key_pressed, int key_code); + +// Called in the input thread when a new key (key_code) is pressed. +// *key_pressed is an array of KEY_MAX+1 bytes indicating which other +// keys are already pressed. Return true if the device should reboot +// immediately. +extern int device_reboot_now(volatile char* key_pressed, int key_code); + +// Called from the main thread when recovery is waiting for input and +// a key is pressed. key is the code of the key pressed; visible is +// true if the recovery menu is being shown. Implementations can call +// ui_key_pressed() to discover if other keys are being held down. +// Return one of the defined constants below in order to: +// +// - move the menu highlight (HIGHLIGHT_*) +// - invoke the highlighted item (SELECT_ITEM) +// - do nothing (NO_ACTION) +// - invoke a specific action (a menu position: any non-negative number) +extern int device_handle_key(int key, int visible); + +// Perform a recovery action selected from the menu. 'which' will be +// the item number of the selected menu item, or a non-negative number +// returned from device_handle_key(). The menu will be hidden when +// this is called; implementations can call ui_print() to print +// information to the screen. +extern int device_perform_action(int which); + +// Called when we do a wipe data/factory reset operation (either via a +// reboot from the main system with the --wipe_data flag, or when the +// user boots into recovery manually and selects the option from the +// menu.) Can perform whatever device-specific wiping actions are +// needed. Return 0 on success. The userdata and cache partitions +// are erased after this returns (whether it returns success or not). +int device_wipe_data(); + +#define NO_ACTION -1 + +#define HIGHLIGHT_UP -2 +#define HIGHLIGHT_DOWN -3 +#define SELECT_ITEM -4 +#define GO_BACK -5 + +#define ITEM_REBOOT 0 +#define ITEM_APPLY_EXT 1 +#define ITEM_APPLY_SDCARD 1 // historical synonym for ITEM_APPLY_EXT +#define ITEM_WIPE_DATA 2 +#define ITEM_WIPE_CACHE 3 +// unused in cwr +#define ITEM_APPLY_CACHE 4 +#define ITEM_NANDROID 4 +#define ITEM_PARTITION 5 +#define ITEM_ADVANCED 6 +#define ITEM_POWEROFF 7 + +// Header text to display above the main menu. +extern char* MENU_HEADERS[]; + +// Text of menu items. +extern char* MENU_ITEMS[]; + +int +get_menu_selection(char** headers, char** items, int menu_only, int initial_selection); + +void +set_sdcard_update_bootloader_message(); + +#endif diff --git a/proprietary-files.txt b/proprietary-files.txt index 575a2ff..e71aa81 100644 --- a/proprietary-files.txt +++ b/proprietary-files.txt @@ -18,7 +18,6 @@ lib/liboncrpc.so lib/libril-qc-qmi-1.so lib/libnv.so lib/libauth.so -lib/libril.so lib/libdiag.so lib/liboem_rapi.so lib/libgsdi_exp.so diff --git a/recovery.fstab b/recovery.fstab index eadf56a..7cb1e1d 100644 --- a/recovery.fstab +++ b/recovery.fstab @@ -1,11 +1,14 @@ -# mount point fstype device [device2] +# http://source.android.com/devices/tech/storage/index.html +# + +system /system yaffs2 ro,remount length=166199296,wait +boot /boot mtd defaults length=7340032 +cache /cache yaffs2 nosuid,nodev length=130154496,wait +userdata /data yaffs2 nosuid,nodev length=172883968,wait +misc /misc mtd defaults length=524288 +recovery /recovery mtd defaults length=7340032 +/dev/block/mmcblk0p1 /sdcard auto defaults recoveryonly +/dev/block/mmcblk0p2 /sd-ext auto defaults recoveryonly + +/devices/platform/msm_sdcc.1/mmc_host/mmc0 /storage/sdcard0 auto defaults voldmanaged=sdcard:auto -/boot mtd boot -/cache yaffs2 cache -/data yaffs2 userdata -/misc mtd misc -/recovery mtd recovery -/sdcard vfat /dev/block/mmcblk0p1 /dev/block/mmcblk0 -/system yaffs2 system -#/sd-ext ext4 /dev/block/mmcblk0p2 -/sd-ext auto /dev/block/mmcblk0p2 diff --git a/recovery.fstab.bak b/recovery.fstab.bak new file mode 100644 index 0000000..23fe00b --- /dev/null +++ b/recovery.fstab.bak @@ -0,0 +1,10 @@ +# mount point fstype device [device2] + +/boot mtd boot +/cache yaffs2 cache +/data yaffs2 userdata +/misc mtd misc +/recovery mtd recovery +/sdcard vfat /dev/block/mmcblk0p1 /dev/block/mmcblk0 +/system yaffs2 system +/sd-ext ext4 /dev/block/mmcblk0p2 diff --git a/setup-makefiles.sh b/setup-makefiles.sh index b4059e6..66fd942 100755 --- a/setup-makefiles.sh +++ b/setup-makefiles.sh @@ -28,7 +28,6 @@ OUTDIR=vendor/$VENDOR/$DEVICE #!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! ###################### DEPENDENCY SECTION ####################### PRODUCT_COPY_FILES += \\ - $OUTDIR/proprietary/lib/libril.so:obj/lib/libril.so \\ $OUTDIR/proprietary/lib/libmmipl.so:obj/lib/libmmipl.so \\ $OUTDIR/proprietary/lib/libmmjpeg.so:obj/lib/libmmjpeg.so \\ $OUTDIR/proprietary/lib/libcamera.so:obj/lib/libcamera.so \\ diff --git a/system.prop b/system.prop index 86b2af4..31b983c 100644 --- a/system.prop +++ b/system.prop @@ -1,5 +1,5 @@ -persist.mvpdm.ProxyServerAddr=68.28.31.1 -persist.mvpdm.ProxyServerIp=80 +#persist.mvpdm.ProxyServerAddr=68.28.31.1 +#persist.mvpdm.ProxyServerIp=80 ro.lge.proximity.delay=100 ro.ril.def.preferred.network=4 ro.telephony.default_network=4 @@ -29,14 +29,19 @@ mobiledata.interfaces=rmnet0,rmnet1,rmnet2 ro.bt.bdaddr_path=/data/misc/bd_addr # Wifi -interfacewifi.interface=wlan0 -wifi.supplicant_scan_interval=180 +#wifi.interface=wlan0 +#wifi.supplicant_scan_interval=180 #wifi.ap.interface=athap0 # See also: init.qcom.usb.rc and init.qcom.post_boot.sh persist.sys.usb.config=mass_storage,adb -# Enable dithering (always) -persist.sys.use_dithering=2 +# System and Misc. +ro.tether.denied=false +sys.checkfs.fat=false + +# A-GPS +ro.ril.def.agps.mode=2 +ro.ril.def.agps.feature=1 # Force use of GPU on 2D rendering # persist.sys.force_hw_ui=true @@ -45,31 +50,74 @@ ro.opengles.version=131072 ro.sf.lcd_density=160 -# Qualcomm -debug.qctwa.statusbar=1 -debug.qctwa.preservebuf=1 -com.qc.hardware=true -debug.enabletr=false # dalvik options -dalvik.vm.checkjni=0 +dalvik.vm.checkjni=false dalvik.vm.dexopt-data-only=1 -dalvik.vm.dexopt-flags=m=y -dalvik.vm.execution-mode=int:jit +dalvik.vm.dexopt-flags=v=a,o=v,m=y,u=y dalvik.vm.heapstartsize=5m dalvik.vm.heapgrowthlimit=36m dalvik.vm.heapsize=64m -dalvik.vm.heaptargetutilization=0.75 +dalvik.vm.heaptargetutilization=0.25 dalvik.vm.heapminfree=512k dalvik.vm.heapmaxfree=2m -dalvik.vm.lockprof.threshold=500 -dalvik.vm.verify-bytecode=false -ro.com.google.networklocation=1 -ro.com.google.locationfeatures=1 + + ro.cdma.voicemail.number=mine ro.setupwizard.enable_bypass=1 gsm.sim.operator.iso-country=us gsm.operator.iso-country=us -qemu.sf.lcd_density=160 -ro.sf.hwrotation=0 -ro.sf.lcd_density=160 + +# V6 SuperCharger settings +ro.ril.hsxpa=3 +ro.ril.gprsclass=12 +ro.ril.hep=1 +ro.ril.enable.dtm=1 +ro.ril.hsdpa.category=28 +ro.ril.enable.a53=1 +ro.ril.enable.3g.prefix=1 +ro.ril.htcmaskw1.bitmask=4294967295 +ro.ril.htcmaskw1=14449 +ro.ril.hsupa.category=9 + + #From CAI +debug.performance.tuning=1 +video.accelerate.hw=1 +# Increase battery and longer standby time with deeper sleep +pm.sleep_mode=1 +ro.ril.disable.power.collapse=0 +# More accurate touch +movfilter=40 +move hyst=0 +# Faster transfer rate for net connections +net.tcp.buffersize.default=4096,87380,256960,4096, 16384,256960 +net.tcp.buffersize.wifi=4096,87380,256960,4096,163 84,256960 +# store launcher in memory - so that when you switch back to home it loads faster +ro.HOME_APP_ADJ=1 +#Improve Scrolling Build.prop Tweak +ro.max.fling_velocity=4000 +# Disable strict mode flash on display +persist.sys.strictmode.visual=false +#Disable_ADB_Notification_Icon +persist.adb.notify=0 +dalvik.vm.execution-mode=int:jit +windowsmgr.max_events_per_sec=150 +ro.config.vc_call_vol_steps=15 +# improve image and video quality (when taking pics and vids from cam and showing them in gallery) +ro.media.enc.jpeg.quality=100 +ro.media.dec.jpeg.memcap=8000000 +ro.media.enc.hprof.vid.bps=8000000 +ro.media.enc.file.format = 3gp,mp4 +ro.media.enc.vid.codec = m4v,h263 +ro.media.enc.vid.h263.width = 176,640 +ro.media.enc.vid.h263.height = 144,480 +ro.media.enc.vid.h263.bps = 64000,1600000 +ro.media.enc.vid.h263.fps = 1,30 +ro.media.enc.vid.m4v.width = 176,640 +ro.media.enc.vid.m4v.height = 144,480 +ro.media.enc.vid.m4v.bps = 64000,1600000 +ro.media.enc.vid.m4v.fps = 1,30 +ro.media.dec.aud.wma.enabled=1 +ro.media.dec.vid.wmv.enabled=1 + + diff --git a/thunderc.mk b/thunderc.mk index 9965505..26863cc 100644 --- a/thunderc.mk +++ b/thunderc.mk @@ -1,21 +1,31 @@ # Most specific first. $(call inherit-product, $(SRC_TARGET_DIR)/product/full_base_telephony.mk) +#LOCAL_KERNEL_DIR := device/lge/thunderc/kernels/test21 +#LOCAL_KERNEL_MODULES := librasdioif.ko wireless.ko +#LOCAL_KERNEL_MODULES := librasdioif.ko tun.ko wireless.ko + +#PRODUCT_COPY_FILES += \ +# $(LOCAL_KERNEL_DIR)/zImage:kernel + +#PRODUCT_COPY_FILES += \ +# $(foreach f,$(LOCAL_KERNEL_MODULES),$(LOCAL_KERNEL_DIR)/$(f):system/lib/modules/$(f)) \ + # thunderc configs PRODUCT_COPY_FILES += \ $(LOCAL_PATH)/configs/thunder_keypad.kl:system/usr/keylayout/thunder_keypad.kl \ $(LOCAL_PATH)/configs/thunder_keypad.kcm.bin:system/usr/keychars/thunder_keypad.kcm.bin \ - $(LOCAL_PATH)/configs/wireless.ko:system/lib/modules/wireless.ko \ - $(LOCAL_PATH)/configs/librasdioif.ko:system/lib/modules/librasdioif.ko \ $(LOCAL_PATH)/configs/touch_mcs6000.idc:system/usr/idc/touch_mcs6000.idc \ - $(LOCAL_PATH)/configs/wpa_supplicant.conf:system/etc/wifi/wpa_supplicant.conf \ - $(LOCAL_PATH)/configs/40a2sd:system/etc/init.d/40a2sd \ - $(LOCAL_PATH)/configs/12Seeder:system/etc/init.d/12Seeder \ - $(LOCAL_PATH)/configs/rngd:system/xbin/rngd \ - $(LOCAL_PATH)/configs/05mountsd:system/etc/init.d/05mountsd \ $(LOCAL_PATH)/configs/999youtube:system/etc/init.d/999youtube \ $(LOCAL_PATH)/configs/synaptics-rmi-touchscreen.idc:system/usr/idc/synaptics-rmi-touchscreen.idc - +# $(LOCAL_PATH)/configs/40a2sd:system/etc/init.d/40a2sd \ +# $(LOCAL_PATH)/configs/05mountsd:system/etc/init.d/05mountsd \ +# $(LOCAL_PATH)/configs/12Seeder:system/etc/init.d/12Seeder \ +# $(LOCAL_PATH)/configs/rngd:system/xbin/rngd \ +# $(LOCAL_PATH)/configs/wireless.ko:system/lib/modules/wireless.ko \ +# $(LOCAL_PATH)/configs/tun.ko:system/lib/modules/tun.ko \ + # $(LOCAL_PATH)/configs/librasdioif.ko:system/lib/modules/librasdioif.ko \ + PRODUCT_COPY_FILES += device/lge/thunderc/configs/default.prop:root/default.prop PRODUCT_COPY_FILES += device/lge/thunderc/configs/thunderc_keypad.kl:system/usr/keylayout/thunderc_keypad.kl PRODUCT_COPY_FILES += device/lge/thunderc/configs/thunderc_keypad.kcm.bin:system/usr/keychars/thunderc_keypad.kcm.bin @@ -25,41 +35,61 @@ PRODUCT_COPY_FILES += device/lge/thunderc/configs/Generic.kl:system/usr/keylayou # thunderc init PRODUCT_COPY_FILES += \ $(LOCAL_PATH)/init.thunderc.rc:root/init.thunderc.rc \ - $(LOCAL_PATH)/ueventd.thunderc.rc:root/ueventd.thunderc.rc + $(LOCAL_PATH)/ueventd.thunderc.rc:root/ueventd.thunderc.rc \ + $(LOCAL_PATH)/fstab.thunderc:root/fstab.thunderc + +PRODUCT_COPY_FILES += $(LOCAL_PATH)/checkbootreason:root/sbin/checkbootreason +PRODUCT_COPY_FILES += \ + $(LOCAL_PATH)/chargemode/chargerimages/battery_ani_01.rle:root/chargerimages/battery_ani_01.rle \ + $(LOCAL_PATH)/chargemode/chargerimages/battery_ani_02.rle:root/chargerimages/battery_ani_02.rle \ + $(LOCAL_PATH)/chargemode/chargerimages/battery_ani_03.rle:root/chargerimages/battery_ani_03.rle \ + $(LOCAL_PATH)/chargemode/chargerimages/battery_ani_04.rle:root/chargerimages/battery_ani_04.rle \ + $(LOCAL_PATH)/chargemode/chargerimages/battery_ani_05.rle:root/chargerimages/battery_ani_05.rle \ + $(LOCAL_PATH)/chargemode/chargerimages/battery_bg.rle:root/chargerimages/battery_bg.rle \ + $(LOCAL_PATH)/chargemode/chargerimages/battery_charging_01.rle:root/chargerimages/battery_charging_01.rle \ + $(LOCAL_PATH)/chargemode/chargerimages/battery_charging_02.rle:root/chargerimages/battery_charging_02.rle \ + $(LOCAL_PATH)/chargemode/chargerimages/battery_charging_03.rle:root/chargerimages/battery_charging_03.rle \ + $(LOCAL_PATH)/chargemode/chargerimages/battery_charging_04.rle:root/chargerimages/battery_charging_04.rle \ + $(LOCAL_PATH)/chargemode/chargerimages/battery_charging_05.rle:root/chargerimages/battery_charging_05.rle \ + $(LOCAL_PATH)/chargemode/chargerimages/battery_charging_06.rle:root/chargerimages/battery_charging_06.rle \ + $(LOCAL_PATH)/chargemode/chargerimages/battery_wait_ani_01.rle:root/chargerimages/battery_wait_ani_01.rle \ + $(LOCAL_PATH)/chargemode/chargerimages/battery_wait_ani_02.rle:root/chargerimages/battery_wait_ani_02.rle \ + $(LOCAL_PATH)/chargemode/chargerimages/black_bg.rle:root/chargerimages/black_bg.rle \ + $(LOCAL_PATH)/chargemode/chargerlogo:root/sbin/chargerlogo # P500 bluetooth vendor configuration -PRODUCT_COPY_FILES += \ - $(LOCAL_PATH)/bluetooth/bt_vendor.conf:system/etc/bluetooth/bt_vendor.conf +PRODUCT_COPY_FILES += \ + $(LOCAL_PATH)/bluetooth/bt_vendor.conf:system/etc/bluetooth/bt_vendor.conf # thunderc Audio #PRODUCT_PACKAGES += \ - audio_policy.thunderc \ - audio.primary.thunderc +# audio_policy.thunderc \ +# audio.primary.thunderc + +#P500_SPEAKER_IN_CALL_FIX +PRODUCT_COPY_FILES += $(LOCAL_PATH)/configs/audio_policy.conf:system/etc/audio_policy.conf # Live wallpapers -PRODUCT_COPY_FILES += packages/wallpapers/LivePicker/android.software.live_wallpaper.xml:/system/etc/permissions/android.software.live_wallpaper.xml -PRODUCT_PACKAGES += \ - LiveWallpapers \ - Phone \ - Trebuchet \ - LiveWallpapersPicker \ - VisualizationWallpapers \ - librs_jni +#PRODUCT_COPY_FILES += packages/wallpapers/LivePicker/android.software.live_wallpaper.xml:/system/etc/permissions/android.software.live_wallpaper.xml +#PRODUCT_PACKAGES += \ +# LiveWallpapers \ +# LiveWallpapersPicker \ +# VisualizationWallpapers \ +# librs_jni # Full-featured build of the Open-Source #$(call inherit-product, build/target/product/full.mk) $(call inherit-product, vendor/lge/thunderc/thunderc-vendor.mk) $(call inherit-product, device/lge/msm7x27-common/device.mk) -$(call inherit-product, vendor/lge/msm7x27-common/msm7x27-common-vendor-blobs.mk) +$(call inherit-product, vendor/lge/msm7x27-common/msm7x27-common-vendor-blobs.mk) # Inherit languages -$(call inherit-product, $(SRC_TARGET_DIR)/product/languages_small.mk) +$(call inherit-product, $(SRC_TARGET_DIR)/product/languages_small.mk) PRODUCT_NAME := thunderc PRODUCT_DEVICE := thunderc PRODUCT_MODEL := LG-LS670 PRODUCT_MANUFACTURER := LGE -PRODUCT_AAPT_CONFIG := normal mdpi PRODUCT_AAPT_PREF_CONFIG := mdpi $(call inherit-product, device/mdpi-common/mdpi.mk) @@ -71,9 +101,8 @@ CDMA_CARRIER_NUMERIC := 310120 PRODUCT_PROPERTY_OVERRIDES += \ - ro.com.google.clientidbase=android-sprint-us \ - ro.com.google.locationfeatures=1 \ ro.cdma.home.operator.numeric=310120 \ + ro.com.google.clientidbase=android-sprint-us \ ro.cdma.home.operator.alpha=Sprint \ gsm.sim.operator.alpha = sprint \ gsm.sim.operator.numeric = 310120 \ diff --git a/ueventd.thunderc.rc b/ueventd.thunderc.rc index f003859..8b0dd6f 100644 --- a/ueventd.thunderc.rc +++ b/ueventd.thunderc.rc @@ -1,5 +1,5 @@ # the DIAG device node is world writable/readable. -/dev/diag 0666 root root +/dev/diag 0660 system qcom_diag # allow wpa_supplicant access to rfkill dev /dev/rfkill 0660 wifi wifi @@ -95,7 +95,7 @@ /dev/msm_preproc_ctl 0660 system audio /dev/msm_a2dp_in 0640 system audio /dev/msm_amrnb_in 0640 system audio -/sys/devices/virtual/usb_composite/* enable 0664 root system +#/sys/devices/virtual/usb_composite/* enable 0664 root system # Non-root permission qmuxd (QCT solution 00481665) /dev/smd7 0640 radio radio