DISCLAIMER: This researched information has been gathered to be of use. and is provided as-is These modifications most like will maybe break a warranty or two and if not carefull, your mileage may vary. If your doorbell rings and its the cool-aid guy, I dont know what happened.. Hi all, I picked up one of these to replace my old droid - and got started playing around with this thing. I was looking for any possinble CWM/ROMs for this device and found none. So, I figured how to make CWM for it as well as dump things off it and (hopefully) see what makes this thing tick. CPU: Qualcomm MSM7x27 (MSM7227) @ 600MHz GPU: Adreno 200 RAM: 512MB ROM: 512MB (180-Ish available to user, sd card + sd-ext partition work with app2sd) It can be rooted, clockworkmod recovery v6 works (aside from usb mount, lun file error), the boot.img can be loaded as insecure (root, with adb on, etc..), roms can be flashed to the device, backups work, as do restorations. Chainfire 3d works. Here's the information I got on this so far, might be usefull to someone else looking to develop for this device. I'm trying to learn to port CyanogenMod 7 to this device, but figure I'd post what I learned and maybe it can help someone else. -Sharp drivers (from their website) -Rooting this thing is simple (used SuperOneClick 2.3.3) UPDATE: updated to the newer recovery links (cwm6 and ext3 recovery) CLOCKWORKMOD RECOVERY(UN-official Test made from stock) -Made a CWM ClockWorkMod Recovery from the stock image (made a small writeup on it on here) -CWM files can be grabbed here use 7-zip to open them. -The CWM recovery is functional except for the USB mass storage mount. -To install, copy the CWM/recovery.img to your SDCARD as well as the flash_image binary -Using either an ADB shell or Terminal on the device enter these commands to flash your recovery Code (Text): su mount -o remount,exec /dev/block/vold/179:1 /sdcard cd /sdcard ./flash_image recovery ./recovery.img NOTE: If you're having problems with running the flash_image make sure its executable with Code (Text): chmod 775 /sdcard/flash_image INSECURE BOOT IMAGE (ro.secure=0 root, adb debugging on, etc..) -Also finally figured how to make a insecure boot.img from the original Sharp ADS1 boot.img (info on that here) -Files for the insecure boot.img (also contains stock boot.img as well as tools and all extracted files to look at) can be grabbed from here. -Copy the flash_image to the SDCARD (if its not already there) and the insecure.boot.img file also to your SDCARD and run the following in a terminal or ADB Shell: Code (Text): su mount -o remount,exec /dev/block/vold/179:1 /sdcard cd /sdcard flash_image boot insecure.boot.img reboot -I'm trying to see what can be done with this phone, gathered some information on the device (kernel config, system dump and notes on the factory recovery screen) -Hardware seems similar to some ZTE devices (ZTE Blade I think), Commtiva Z71 and probably more - the Z71 CM6 rom would actually make it to the CyanogenMod bootanimation.. Output of cat /proc/mtd Code (Text): # cat /proc/mtd dev: size erasesize name mtd0: 00500000 00040000 "boot" mtd1: 0a500000 00040000 "system" mtd2: 00100000 00040000 "splash" mtd3: 02800000 00040000 "cache" mtd4: 00080000 00040000 "fota_state" mtd5: 02100000 00040000 "fota_up" mtd6: 00080000 00040000 "misc" mtd7: 00280000 00040000 "persist" mtd8: 00500000 00040000 "recovery" mtd9: 0bcc0000 00040000 "userdata" Output of mount Code (Text): rootfs / rootfs ro,relatime 0 0 tmpfs /dev tmpfs rw,relatime,mode=755 0 0 devpts /dev/pts devpts rw,relatime,mode=600 0 0 proc /proc proc rw,relatime 0 0 sysfs /sys sysfs rw,relatime 0 0 /dev/block/mtdblock1 /system yaffs2 ro,relatime 0 0 /dev/block/mtdblock9 /data yaffs2 rw,nosuid,nodev,relatime 0 0 /dev/block/mtdblock7 /persist yaffs2 rw,nosuid,nodev,relatime 0 0 tmpfs /mnt/asec tmpfs rw,relatime,mode=755,gid=1000 0 0 tmpfs /tmp tmpfs rw,relatime 0 0 /dev/block/mtdblock3 /cache yaffs2 rw,nosuid,nodev,relatime 0 0 /dev/block/mtdblock5 /fotaup yaffs2 rw,relatime 0 0 /dev/block/vold/179:1 /mnt/sdcard vfat rw,dirsync,nosuid,nodev,noexec,relatime,uid=1000,gid=1015,fmask=0712,dmask=0700,allow_utime=0022,codepage=cp437,iocharset=iso8859-1,shortname=mixed,utf8,errors=remount-ro 0 0 /dev/block/vold/179:1 /mnt/secure/asec vfat rw,dirsync,nosuid,nodev,noexec,relatime,uid=1000,gid=1015,fmask=0712,dmask=0700,allow_utime=0022,codepage=cp437,iocharset=iso8859-1,shortname=mixed,utf8,errors=remount-ro 0 0 tmpfs /mnt/sdcard/.android_secure tmpfs ro,relatime,size=0k,mode=000 0 0 I've also attatched the stock kernel config.gz, and a system.info.gz incase anyone wants to see whats inside. Hope this helps anyone looking for information on this device. Link to the stock-ish Froyo 2.2.2 romdump is here - made this off my own ADS1 with a factory reset, some (not all) bloatware removed, rooted, stock sharp boot.img. Insecure boot.img can be flashed seperately (above). This thing isnt bad for what it is, would be nice to have something newer than Froyo on here lol.