2 TARGET_CPU_ABI
:= armeabi
3 TARGET_ARCH_VARIANT
:= armv7-a-neon
4 TARGET_CPU_VARIANT
:= cortex-a9
6 BOARD_RECOVERYIMAGE_PARTITION_SIZE
:= 0x105c0000
7 BOARD_FLASH_BLOCK_SIZE
:= 131072
9 TARGET_PREBUILT_KERNEL
:= device
/Mattel
/NabiSE
/kernel
11 BOARD_MKBOOTIMG_ARGS
:= --base
80000000 --pagesize
2048 --kernel_offset
00008000 --ramdisk_offset
04000000 --tags_offset
06900000 --board
3.0.10
12 #Dem magic numbers tho.
14 #MTK common twrp flags
16 TWHAVE_SELINUX
:= true
17 #TW_USE_TOOLBOX := true
18 TW_NO_EXFAT_FUSE
:= true
19 TW_THEME
:= portrait_mdpi
20 #RECOVERY_SDCARD_ON_DATA := true
21 # Max brightness to prevent display damage
22 TW_MAX_BRIGHTNESS
:= 160
23 # Default brightness for TWRP
24 TW_DEFAULT_BRIGHTNESS
:= 120
25 TW_INCLUDE_FB2PNG
:= true
26 TWRP_INCLUDE_LOGCAT
:= true
27 DEVICE_RESOLUTION
:= 1024x600
29 #Workaround for flipped touch input. May need to clean out folder for it to take effect on compile time
30 RECOVERY_TOUCHSCREEN_SWAP_XY
:= true
31 RECOVERY_TOUCHSCREEN_FLIP_Y
:= true
33 #The SE comes with encryption permanently enabled by default.
34 #Perhaps patching the kernel to defeat forced encryption would do the trick
35 #Problem is whilst Magisk has that ability, it is seemingly unable to edit boot.img for whatever reason
36 #Magisk Manager churns out an apparently corrupted image; may have to report it for a definite fix
37 TW_INCLUDE_CRYPTO
:= true
38 TW_USE_MODEL_HARDWARE_ID_FOR_DEVICE_ID
:= true
39 TARGET_USE_CUSTOM_LUN_FILE_PATH
:= "/sys/devices/platform/mt_usb/gadget/lun%d/file"
40 BOARD_CUSTOM_BOOTIMG_MK
:= device
/Mattel
/NabiSE
/boot.mk