Commit graph

9 commits

Author SHA1 Message Date
Vilas Bhat
45d085874d Revert "Revert "16KB: zuma: Move copy_efs_file_to_data script to..."
Revert submission 31345232-revert-31155502-move_copy_efs_script-IXYVMGOHBR

Reason for revert: Re-submitting with fix for breaking target

Reverted changes: /q/submissionid:31345232-revert-31155502-move_copy_efs_script-IXYVMGOHBR

Bug: 383151792
Flag: EXEMPT bugfix
Change-Id: I71d98015c530fe51f9bae2ef2907baa1d3fd657e
2025-01-16 17:09:03 -08:00
Priyanka Advani (xWF)
6c5315280f Revert "16KB: zuma: Move copy_efs_file_to_data script to gs-common"
Revert submission 31155502-move_copy_efs_script

Reason for revert: Droidmonitor created revert due to b/390502519. Will be verifying through ABTD before submission.

Reverted changes: /q/submissionid:31155502-move_copy_efs_script

Change-Id: I6f7b4074a82069cc9e0b230e2ccb9379bb35c837
2025-01-16 16:50:35 -08:00
Vilas Bhat
126ea8b775 16KB: zuma: Move copy_efs_file_to_data script to gs-common
Bug: 383151792
Flag: EXEMPT bugfix
Test: Enable16kbTest on Pixel 8 target
      Fingerprint and Phone Calls work in 16 KB mode
Change-Id: I3c4fa84887cbb46c9f171a0f0a31f4d47d5c4c6e
2025-01-16 13:46:53 -08:00
Kelvin Zhang
b08f8dbf23 Reland: Copy files on EFS partition to /data on boot
During boot, this CL adds the following sequence of actions:

1. mount original efs partitions(most likely f2fs) on /mnt/vendor/efs
2. copy files in /mnt/vendor/efs to /data/vendor/copied/efs.img
3. fsync all the files in /data/vendor/copied/efs.img
4. rename /data/vendor/copied/efs.img to /data/vendor/copied/efs
5. bind-mount /data/vendor/copied/efs to /mnt/vendor/efs
6. repeat 1-5 for efs_backup and modem_userdata

The original EFS partitions are mounted and only used for file
copying, no destructive action done on original efs partitions.

Test: reformat /data as ext4, boot the device
Bug: 319335586
Change-Id: Ide78be316778acfc5c582c4a7b78853796cf4c1e
2024-05-07 21:31:13 -07:00
Pechetty Sravani
4053a85fe7 Revert "Copy files on EFS partition to /data on boot"
Revert submission 26822004

Reason for revert: Potential culprit for b/339099720- verifying through ABTD before revert submission. This is part of the standard investigation process, and does not mean your CL will be reverted.

Reverted changes: /q/submissionid:26822004

Change-Id: Ie9598a3b3b56c8ce26f475079798c44314696f44
2024-05-07 07:19:37 +00:00
Kelvin Zhang
7251274bee Copy files on EFS partition to /data on boot
During boot, this CL adds the following sequence of actions:

1. mount original efs partitions(most likely f2fs) on /mnt/vendor/efs
2. copy files in /mnt/vendor/efs to /data/vendor/copied/efs.img
3. fsync all the files in /data/vendor/copied/efs.img
4. rename /data/vendor/copied/efs.img to /data/vendor/copied/efs
5. bind-mount /data/vendor/copied/efs to /mnt/vendor/efs
6. repeat 1-5 for efs_backup and modem_userdata

The original EFS partitions are mounted and only used for file
copying, no destructive action done on original efs partitions.

Test: reformat /data as ext4, boot the device
Bug: 319335586
Change-Id: I4c4024b4cad18199226f5644f98254b2230574d6
2024-05-06 15:27:46 -07:00
Jimmy Hu
3d72a5b29f Disable USB contaminant detection when the disable flag is true
(ported from 6b1106498e1164f46b9a895ed2258a20a0c7a7b5)

Bug: 263916675
Bug: 264231895
Test: setprop vendor.usb.contaminantdisable true
Change-Id: I57ea8280e4af3720dce9d9174b1cc24066c5324e
Signed-off-by: Jimmy Hu <hhhuuu@google.com>
2023-05-23 07:01:33 +00:00
Aaron Ding
66befd88e3 Create device Ripcurrent on Zuma platform
s/cloudripper/ripcurrent
s/gs201/zuma
s/pantah/ripcurrent

Bug: 229340586
Change-Id: Ic5dffbbfadbb1eb8479587b95222801426bba35e
Signed-off-by: Aaron Ding <aaronding@google.com>
2022-04-19 12:55:56 +08:00
Aaron Ding
d88f9a90bd Branch zuma from gs201
Branch zuma from gs201 sha1 9009acf5c217f553b45ea82aa0702607229f0347

cp/pantah/ripcurrent
cp/gs201/zuma

Bug: 229340586
Change-Id: Ia312c20dae892ead9bf06728b4ef5c0c260ad045
Signed-off-by: Aaron Ding <aaronding@google.com>
2022-04-19 12:45:55 +08:00