Hi Manish,
2010/10/14 manish shakya msha...@oakland.edu
I am connected to one of the AP and I could ping.
What was the problem with the loop on scanning ? I am noticing the same
behaviour.
Says obtaining IP address and doesnt go ahead.
2010/10/14 manish shakya manishshakya...@gmail.com
On Sat, Jun 26, 2010 at 5:58 PM, Ranganath s rangana...@gmail.com wrote:
HI group,
I am porting android 1.5 to mini 2440 board. I am getting the kernel
panic and its not able to mount the root file system. So any help in this
regard would be highly appreciable. I suspect about setenv
On Fri, Jun 11, 2010 at 7:35 PM, guru guru.nav...@gmail.com wrote:
HI all
in many of the wpa_supplicant code they are using ENTER and LEAVE
macros to display the logs(Below). At last it will call
android_printf.
I want to make sure that only message with MSG_WARNING should be
displayed.
On Wed, Jul 15, 2009 at 3:15 PM, Avtar Singhs.av...@gmail.com wrote:
Hello folks,
I have been working on a set of scripts that would isolate Dalvik
Virtual Machine's artifacts from the Android source code tree. This
means:
Great Job Avtar ! Canonical had recently shown android apps
On Mon, Mar 23, 2009 at 8:36 PM, Claw praveengudisa...@googlemail.com wrote:
I have followed the steps in the link provided. I get the events from
the touchscreen. But only that they are not not pointing to the right
objects.
There is a patch lying about by sean mcneal which does some hacks
On Thu, 2008-12-11 at 01:27 -0800, Pivotian wrote:
good.What did you do for Touchscreen? Did you used tlib?
tslib : patches from sean
On Dec 11, 9:59 am, Manav Gautama [EMAIL PROTECTED] wrote:
On Wed, 2008-12-10 at 20:34 -0800, Pivotian wrote:
yeah, looks great even I tried the same
On Thu, 2008-12-11 at 02:23 -0800, FrancoisM wrote:
Oh did I miss something?
[EMAIL PROTECTED]:/filesys# chroot /filesys /sbin/init
chroot /filesys /sbin/init
[2] 993
-bash: /filesys: is a directory
[1] Exit 1 chroot
chroot: too few arguments
Try `chroot
Dear droids,
I could get a 2.6.27 kernel ported to omap2430 based
board along with android changes. Also compiled android using armv6
toolchain and could tazer it up successfully on the machine.
I faced issues on the touch side of the device. Hacked ads7864.c
according to