2 TARGET_CPU_ABI
:= armeabi
3 TARGET_ARCH_VARIANT
:= armv7-a-neon
4 TARGET_CPU_VARIANT
:= cortex-a9
6 BOARD_RECOVERYIMAGE_PARTITION_SIZE
:= 0x105c0000
7 BOARD_FLASH_BLOCK_SIZE
:= 131072
9 TARGET_PREBUILT_KERNEL
:= device
/Mattel
/NabiSE
/kernel
11 BOARD_MKBOOTIMG_ARGS
:= --base
80000000 --pagesize
2048 --kernel_offset
00008000 --ramdisk_offset
04000000 --tags_offset
06900000 --board
3.0.10
12 #Dem magic numbers tho.
14 #MTK common twrp flags
16 TWHAVE_SELINUX
:= true
17 #TW_USE_TOOLBOX := true
18 TW_NO_EXFAT_FUSE
:= true
19 TW_THEME
:= portrait_mdpi
20 #RECOVERY_SDCARD_ON_DATA := true
21 # Max brightness to prevent display damage
22 TW_MAX_BRIGHTNESS
:= 160
23 # Default brightness for TWRP
24 TW_DEFAULT_BRIGHTNESS
:= 120
25 TW_INCLUDE_FB2PNG
:= true
26 TWRP_INCLUDE_LOGCAT
:= true
27 DEVICE_RESOLUTION
:= 600x1024
28 #RECOVERY_TOUCHSCREEN_SWAP_XY := true
29 #RECOVERY_TOUCHSCREEN_FLIP_X := true
30 #RECOVERY_TOUCHSCREEN_FLIP_Y := true
31 TWRP_EVENT_LOGGING
:= true
32 #The SE comes with encryption permanently enabled by default.
33 #Perhaps patching the kernel to defeat forced decrypt would do the trick
34 #Problem is whilst Magisk has that ability, it is seemingly unable to edit boot.img for whatever reason
35 #Magisk Manager churns out an apparently corrupted image
36 TW_INCLUDE_CRYPTO
:= true
37 TW_USE_MODEL_HARDWARE_ID_FOR_DEVICE_ID
:= true
38 TARGET_USE_CUSTOM_LUN_FILE_PATH
:= "/sys/devices/platform/mt_usb/gadget/lun%d/file"
39 BOARD_CUSTOM_BOOTIMG_MK
:= device
/Mattel
/NabiSE
/boot.mk