Snap for 12177962 from d20d618ee6
to 24Q4-release
Change-Id: I18b5197e5d0ec99c2562e03dfc4b9630dfa6afb5
This commit is contained in:
commit
02429afd42
11 changed files with 366 additions and 116 deletions
110
conf/Android.bp
110
conf/Android.bp
|
@ -14,16 +14,6 @@
|
|||
* limitations under the License.
|
||||
*/
|
||||
|
||||
// By default this device uses hardware-wrapped keys for storage encryption,
|
||||
// which is intended to offer increased security over the traditional method
|
||||
// (software keys). However, hardware-wrapped keys aren't compatible with
|
||||
// FIPS-140 certification of the encryption hardware, and hence we have to
|
||||
// disable the use of them in FIPS mode. This requires having two fstab files:
|
||||
// one for the default mode, and one for FIPS mode selectable via
|
||||
// androidboot.fstab_suffix on the kernel command line. These fstabs should be
|
||||
// identical with the exception of the encryption settings, so to keep them in
|
||||
// sync the rules below generate them from a template file.
|
||||
|
||||
package {
|
||||
// See: http://go/android-license-faq
|
||||
// A large-scale-change added 'default_applicable_licenses' to import
|
||||
|
@ -33,102 +23,8 @@ package {
|
|||
default_applicable_licenses: ["device_google_zumapro_license"],
|
||||
}
|
||||
|
||||
genrule {
|
||||
name: "gen_fstab.zuma-hw-encrypt",
|
||||
srcs: ["fstab.zumapro.in"],
|
||||
out: ["fstab.zuma"],
|
||||
cmd: "sed -e s/@fileencryption@/fileencryption=:aes-256-hctr2:inlinecrypt_optimized+wrappedkey_v0/" +
|
||||
" -e s/@inlinecrypt@/inlinecrypt/ " +
|
||||
" -e s/@metadata_encryption@/metadata_encryption=:wrappedkey_v0/ $(in) > $(out)",
|
||||
filegroup {
|
||||
name: "fstab.zumapro.common",
|
||||
srcs: ["fstab.zumapro.common"],
|
||||
}
|
||||
|
||||
genrule {
|
||||
name: "gen_fstab.zumapro-hw-encrypt",
|
||||
srcs: ["fstab.zumapro.in"],
|
||||
out: ["fstab.zumapro"],
|
||||
cmd: "sed -e s/@fileencryption@/fileencryption=:aes-256-hctr2:inlinecrypt_optimized+wrappedkey_v0/" +
|
||||
" -e s/@inlinecrypt@/inlinecrypt/ " +
|
||||
" -e s/@metadata_encryption@/metadata_encryption=:wrappedkey_v0/ $(in) > $(out)",
|
||||
}
|
||||
|
||||
genrule {
|
||||
name: "gen_fstab.zuma-sw-encrypt",
|
||||
srcs: ["fstab.zumapro.in"],
|
||||
out: ["fstab.zuma"],
|
||||
cmd: "sed -e s/@fileencryption@/fileencryption=aes-256-xts:aes-256-hctr2/" +
|
||||
" -e s/@inlinecrypt@// " +
|
||||
" -e s/@metadata_encryption@/metadata_encryption=/ $(in) > $(out)",
|
||||
}
|
||||
|
||||
genrule {
|
||||
name: "gen_fstab.zumapro-sw-encrypt",
|
||||
srcs: ["fstab.zumapro.in"],
|
||||
out: ["fstab.zumapro"],
|
||||
cmd: "sed -e s/@fileencryption@/fileencryption=aes-256-xts:aes-256-hctr2/" +
|
||||
" -e s/@inlinecrypt@// " +
|
||||
" -e s/@metadata_encryption@/metadata_encryption=/ $(in) > $(out)",
|
||||
}
|
||||
|
||||
genrule {
|
||||
name: "gen_fstab.zuma-no-encrypt",
|
||||
srcs: ["fstab.zumapro.in"],
|
||||
out: ["fstab.zuma"],
|
||||
cmd: "sed -e s/@fileencryption@//" +
|
||||
" -e s/@inlinecrypt@// " +
|
||||
" -e s/@metadata_encryption@// $(in) > $(out)",
|
||||
}
|
||||
|
||||
genrule {
|
||||
name: "gen_fstab.zumapro-no-encrypt",
|
||||
srcs: ["fstab.zumapro.in"],
|
||||
out: ["fstab.zumapro"],
|
||||
cmd: "sed -e s/@fileencryption@//" +
|
||||
" -e s/@inlinecrypt@// " +
|
||||
" -e s/@metadata_encryption@// $(in) > $(out)",
|
||||
}
|
||||
|
||||
genrule {
|
||||
name: "gen_fstab.zuma-fips",
|
||||
srcs: ["fstab.zumapro.in"],
|
||||
out: ["fstab.zuma-fips"],
|
||||
cmd: "sed -e s/@fileencryption@/fileencryption=aes-256-xts/" +
|
||||
" -e s/@inlinecrypt@/inlinecrypt/ " +
|
||||
" -e s/@metadata_encryption@/metadata_encryption=aes-256-xts/ $(in) > $(out)",
|
||||
}
|
||||
|
||||
genrule {
|
||||
name: "gen_fstab.zumapro-fips",
|
||||
srcs: ["fstab.zumapro.in"],
|
||||
out: ["fstab.zumapro-fips"],
|
||||
cmd: "sed -e s/@fileencryption@/fileencryption=aes-256-xts/" +
|
||||
" -e s/@inlinecrypt@/inlinecrypt/ " +
|
||||
" -e s/@metadata_encryption@/metadata_encryption=aes-256-xts/ $(in) > $(out)",
|
||||
}
|
||||
|
||||
prebuilt_etc {
|
||||
name: "fstab.zuma",
|
||||
src: ":gen_fstab.zuma-hw-encrypt",
|
||||
vendor: true,
|
||||
vendor_ramdisk_available: true,
|
||||
}
|
||||
|
||||
prebuilt_etc {
|
||||
name: "fstab.zumapro",
|
||||
src: ":gen_fstab.zumapro-hw-encrypt",
|
||||
vendor: true,
|
||||
vendor_ramdisk_available: true,
|
||||
}
|
||||
|
||||
prebuilt_etc {
|
||||
name: "fstab.zuma-fips",
|
||||
src: ":gen_fstab.zuma-fips",
|
||||
vendor: true,
|
||||
vendor_ramdisk_available: true,
|
||||
}
|
||||
|
||||
prebuilt_etc {
|
||||
name: "fstab.zumapro-fips",
|
||||
src: ":gen_fstab.zumapro-fips",
|
||||
vendor: true,
|
||||
vendor_ramdisk_available: true,
|
||||
}
|
||||
|
|
164
conf/ext4/Android.bp
Normal file
164
conf/ext4/Android.bp
Normal file
|
@ -0,0 +1,164 @@
|
|||
/*
|
||||
* Copyright (C) 2024 The Android Open Source Project
|
||||
*
|
||||
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||
* you may not use this file except in compliance with the License.
|
||||
* You may obtain a copy of the License at
|
||||
*
|
||||
* http://www.apache.org/licenses/LICENSE-2.0
|
||||
*
|
||||
* Unless required by applicable law or agreed to in writing, software
|
||||
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
* See the License for the specific language governing permissions and
|
||||
* limitations under the License.
|
||||
*/
|
||||
|
||||
// By default this device uses hardware-wrapped keys for storage encryption,
|
||||
// which is intended to offer increased security over the traditional method
|
||||
// (software keys). However, hardware-wrapped keys aren't compatible with
|
||||
// FIPS-140 certification of the encryption hardware, and hence we have to
|
||||
// disable the use of them in FIPS mode. This requires having two fstab files:
|
||||
// one for the default mode, and one for FIPS mode selectable via
|
||||
// androidboot.fstab_suffix on the kernel command line. These fstabs should be
|
||||
// identical with the exception of the encryption settings, so to keep them in
|
||||
// sync the rules below generate them from a template file.
|
||||
|
||||
soong_namespace {
|
||||
imports: [
|
||||
"device/google/zumapro",
|
||||
],
|
||||
}
|
||||
|
||||
package {
|
||||
// See: http://go/android-license-faq
|
||||
// A large-scale-change added 'default_applicable_licenses' to import
|
||||
// all of the 'license_kinds' from "device_google_zumapro_license"
|
||||
// to get the below license kinds:
|
||||
// SPDX-license-identifier-Apache-2.0
|
||||
default_applicable_licenses: ["device_google_zumapro_license"],
|
||||
}
|
||||
|
||||
genrule {
|
||||
name: "gen_fstab.zuma-hw-encrypt",
|
||||
srcs: [
|
||||
":fstab.zumapro.common",
|
||||
"fstab.rw.zumapro.ext4",
|
||||
],
|
||||
out: ["fstab.zuma"],
|
||||
cmd: "sed -e s/@fileencryption@/fileencryption=:aes-256-hctr2:inlinecrypt_optimized+wrappedkey_v0/" +
|
||||
" -e s/@inlinecrypt@/inlinecrypt/ " +
|
||||
" -e s/@metadata_encryption@/metadata_encryption=:wrappedkey_v0/ $(in) > $(out)",
|
||||
}
|
||||
|
||||
genrule {
|
||||
name: "gen_fstab.zumapro-hw-encrypt",
|
||||
srcs: [
|
||||
":fstab.zumapro.common",
|
||||
"fstab.rw.zumapro.ext4",
|
||||
],
|
||||
out: ["fstab.zumapro"],
|
||||
cmd: "sed -e s/@fileencryption@/fileencryption=:aes-256-hctr2:inlinecrypt_optimized+wrappedkey_v0/" +
|
||||
" -e s/@inlinecrypt@/inlinecrypt/ " +
|
||||
" -e s/@metadata_encryption@/metadata_encryption=:wrappedkey_v0/ $(in) > $(out)",
|
||||
}
|
||||
|
||||
genrule {
|
||||
name: "gen_fstab.zuma-sw-encrypt",
|
||||
srcs: [
|
||||
":fstab.zumapro.common",
|
||||
"fstab.rw.zumapro.ext4",
|
||||
],
|
||||
out: ["fstab.zuma"],
|
||||
cmd: "sed -e s/@fileencryption@/fileencryption=aes-256-xts:aes-256-hctr2/" +
|
||||
" -e s/@inlinecrypt@// " +
|
||||
" -e s/@metadata_encryption@/metadata_encryption=/ $(in) > $(out)",
|
||||
}
|
||||
|
||||
genrule {
|
||||
name: "gen_fstab.zumapro-sw-encrypt",
|
||||
srcs: [
|
||||
":fstab.zumapro.common",
|
||||
"fstab.rw.zumapro.ext4",
|
||||
],
|
||||
out: ["fstab.zumapro"],
|
||||
cmd: "sed -e s/@fileencryption@/fileencryption=aes-256-xts:aes-256-hctr2/" +
|
||||
" -e s/@inlinecrypt@// " +
|
||||
" -e s/@metadata_encryption@/metadata_encryption=/ $(in) > $(out)",
|
||||
}
|
||||
|
||||
genrule {
|
||||
name: "gen_fstab.zuma-no-encrypt",
|
||||
srcs: [
|
||||
":fstab.zumapro.common",
|
||||
"fstab.rw.zumapro.ext4",
|
||||
],
|
||||
out: ["fstab.zuma"],
|
||||
cmd: "sed -e s/@fileencryption@//" +
|
||||
" -e s/@inlinecrypt@// " +
|
||||
" -e s/@metadata_encryption@// $(in) > $(out)",
|
||||
}
|
||||
|
||||
genrule {
|
||||
name: "gen_fstab.zumapro-no-encrypt",
|
||||
srcs: [
|
||||
":fstab.zumapro.common",
|
||||
"fstab.rw.zumapro.ext4",
|
||||
],
|
||||
out: ["fstab.zumapro"],
|
||||
cmd: "sed -e s/@fileencryption@//" +
|
||||
" -e s/@inlinecrypt@// " +
|
||||
" -e s/@metadata_encryption@// $(in) > $(out)",
|
||||
}
|
||||
|
||||
genrule {
|
||||
name: "gen_fstab.zuma-fips",
|
||||
srcs: [
|
||||
":fstab.zumapro.common",
|
||||
"fstab.rw.zumapro.ext4",
|
||||
],
|
||||
out: ["fstab.zuma-fips"],
|
||||
cmd: "sed -e s/@fileencryption@/fileencryption=aes-256-xts/" +
|
||||
" -e s/@inlinecrypt@/inlinecrypt/ " +
|
||||
" -e s/@metadata_encryption@/metadata_encryption=aes-256-xts/ $(in) > $(out)",
|
||||
}
|
||||
|
||||
genrule {
|
||||
name: "gen_fstab.zumapro-fips",
|
||||
srcs: [
|
||||
":fstab.zumapro.common",
|
||||
"fstab.rw.zumapro.ext4",
|
||||
],
|
||||
out: ["fstab.zumapro-fips"],
|
||||
cmd: "sed -e s/@fileencryption@/fileencryption=aes-256-xts/" +
|
||||
" -e s/@inlinecrypt@/inlinecrypt/ " +
|
||||
" -e s/@metadata_encryption@/metadata_encryption=aes-256-xts/ $(in) > $(out)",
|
||||
}
|
||||
|
||||
prebuilt_etc {
|
||||
name: "fstab.zuma",
|
||||
src: ":gen_fstab.zuma-hw-encrypt",
|
||||
vendor: true,
|
||||
vendor_ramdisk_available: true,
|
||||
}
|
||||
|
||||
prebuilt_etc {
|
||||
name: "fstab.zumapro",
|
||||
src: ":gen_fstab.zumapro-hw-encrypt",
|
||||
vendor: true,
|
||||
vendor_ramdisk_available: true,
|
||||
}
|
||||
|
||||
prebuilt_etc {
|
||||
name: "fstab.zuma-fips",
|
||||
src: ":gen_fstab.zuma-fips",
|
||||
vendor: true,
|
||||
vendor_ramdisk_available: true,
|
||||
}
|
||||
|
||||
prebuilt_etc {
|
||||
name: "fstab.zumapro-fips",
|
||||
src: ":gen_fstab.zumapro-fips",
|
||||
vendor: true,
|
||||
vendor_ramdisk_available: true,
|
||||
}
|
5
conf/ext4/fstab.rw.zumapro.ext4
Normal file
5
conf/ext4/fstab.rw.zumapro.ext4
Normal file
|
@ -0,0 +1,5 @@
|
|||
# Android fstab file for /data and /metadata partitions.
|
||||
#
|
||||
#<src> <mnt_point> <type> <mnt_flags and options> <fs_mgr_flags>
|
||||
/dev/block/platform/13200000.ufs/by-name/metadata /metadata ext4 noatime,nosuid,nodev,sync wait,check,formattable,first_stage_mount
|
||||
/dev/block/platform/13200000.ufs/by-name/userdata /data ext4 noatime,nosuid,nodev latemount,wait,check,quota,formattable,sysfs_path=/dev/sys/block/bootdevice,reservedsize=128M,readahead_size_kb=128
|
164
conf/f2fs/Android.bp
Normal file
164
conf/f2fs/Android.bp
Normal file
|
@ -0,0 +1,164 @@
|
|||
/*
|
||||
* Copyright (C) 2024 The Android Open Source Project
|
||||
*
|
||||
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||
* you may not use this file except in compliance with the License.
|
||||
* You may obtain a copy of the License at
|
||||
*
|
||||
* http://www.apache.org/licenses/LICENSE-2.0
|
||||
*
|
||||
* Unless required by applicable law or agreed to in writing, software
|
||||
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
* See the License for the specific language governing permissions and
|
||||
* limitations under the License.
|
||||
*/
|
||||
|
||||
// By default this device uses hardware-wrapped keys for storage encryption,
|
||||
// which is intended to offer increased security over the traditional method
|
||||
// (software keys). However, hardware-wrapped keys aren't compatible with
|
||||
// FIPS-140 certification of the encryption hardware, and hence we have to
|
||||
// disable the use of them in FIPS mode. This requires having two fstab files:
|
||||
// one for the default mode, and one for FIPS mode selectable via
|
||||
// androidboot.fstab_suffix on the kernel command line. These fstabs should be
|
||||
// identical with the exception of the encryption settings, so to keep them in
|
||||
// sync the rules below generate them from a template file.
|
||||
|
||||
soong_namespace {
|
||||
imports: [
|
||||
"device/google/zumapro",
|
||||
],
|
||||
}
|
||||
|
||||
package {
|
||||
// See: http://go/android-license-faq
|
||||
// A large-scale-change added 'default_applicable_licenses' to import
|
||||
// all of the 'license_kinds' from "device_google_zumapro_license"
|
||||
// to get the below license kinds:
|
||||
// SPDX-license-identifier-Apache-2.0
|
||||
default_applicable_licenses: ["device_google_zumapro_license"],
|
||||
}
|
||||
|
||||
genrule {
|
||||
name: "gen_fstab.zuma-hw-encrypt",
|
||||
srcs: [
|
||||
":fstab.zumapro.common",
|
||||
"fstab.rw.zumapro.f2fs",
|
||||
],
|
||||
out: ["fstab.zuma"],
|
||||
cmd: "sed -e s/@fileencryption@/fileencryption=:aes-256-hctr2:inlinecrypt_optimized+wrappedkey_v0/" +
|
||||
" -e s/@inlinecrypt@/inlinecrypt/ " +
|
||||
" -e s/@metadata_encryption@/metadata_encryption=:wrappedkey_v0/ $(in) > $(out)",
|
||||
}
|
||||
|
||||
genrule {
|
||||
name: "gen_fstab.zumapro-hw-encrypt",
|
||||
srcs: [
|
||||
":fstab.zumapro.common",
|
||||
"fstab.rw.zumapro.f2fs",
|
||||
],
|
||||
out: ["fstab.zumapro"],
|
||||
cmd: "sed -e s/@fileencryption@/fileencryption=:aes-256-hctr2:inlinecrypt_optimized+wrappedkey_v0/" +
|
||||
" -e s/@inlinecrypt@/inlinecrypt/ " +
|
||||
" -e s/@metadata_encryption@/metadata_encryption=:wrappedkey_v0/ $(in) > $(out)",
|
||||
}
|
||||
|
||||
genrule {
|
||||
name: "gen_fstab.zuma-sw-encrypt",
|
||||
srcs: [
|
||||
":fstab.zumapro.common",
|
||||
"fstab.rw.zumapro.f2fs",
|
||||
],
|
||||
out: ["fstab.zuma"],
|
||||
cmd: "sed -e s/@fileencryption@/fileencryption=aes-256-xts:aes-256-hctr2/" +
|
||||
" -e s/@inlinecrypt@// " +
|
||||
" -e s/@metadata_encryption@/metadata_encryption=/ $(in) > $(out)",
|
||||
}
|
||||
|
||||
genrule {
|
||||
name: "gen_fstab.zumapro-sw-encrypt",
|
||||
srcs: [
|
||||
":fstab.zumapro.common",
|
||||
"fstab.rw.zumapro.f2fs",
|
||||
],
|
||||
out: ["fstab.zumapro"],
|
||||
cmd: "sed -e s/@fileencryption@/fileencryption=aes-256-xts:aes-256-hctr2/" +
|
||||
" -e s/@inlinecrypt@// " +
|
||||
" -e s/@metadata_encryption@/metadata_encryption=/ $(in) > $(out)",
|
||||
}
|
||||
|
||||
genrule {
|
||||
name: "gen_fstab.zuma-no-encrypt",
|
||||
srcs: [
|
||||
":fstab.zumapro.common",
|
||||
"fstab.rw.zumapro.f2fs",
|
||||
],
|
||||
out: ["fstab.zuma"],
|
||||
cmd: "sed -e s/@fileencryption@//" +
|
||||
" -e s/@inlinecrypt@// " +
|
||||
" -e s/@metadata_encryption@// $(in) > $(out)",
|
||||
}
|
||||
|
||||
genrule {
|
||||
name: "gen_fstab.zumapro-no-encrypt",
|
||||
srcs: [
|
||||
":fstab.zumapro.common",
|
||||
"fstab.rw.zumapro.f2fs",
|
||||
],
|
||||
out: ["fstab.zumapro"],
|
||||
cmd: "sed -e s/@fileencryption@//" +
|
||||
" -e s/@inlinecrypt@// " +
|
||||
" -e s/@metadata_encryption@// $(in) > $(out)",
|
||||
}
|
||||
|
||||
genrule {
|
||||
name: "gen_fstab.zuma-fips",
|
||||
srcs: [
|
||||
":fstab.zumapro.common",
|
||||
"fstab.rw.zumapro.f2fs",
|
||||
],
|
||||
out: ["fstab.zuma-fips"],
|
||||
cmd: "sed -e s/@fileencryption@/fileencryption=aes-256-xts/" +
|
||||
" -e s/@inlinecrypt@/inlinecrypt/ " +
|
||||
" -e s/@metadata_encryption@/metadata_encryption=aes-256-xts/ $(in) > $(out)",
|
||||
}
|
||||
|
||||
genrule {
|
||||
name: "gen_fstab.zumapro-fips",
|
||||
srcs: [
|
||||
":fstab.zumapro.common",
|
||||
"fstab.rw.zumapro.f2fs",
|
||||
],
|
||||
out: ["fstab.zumapro-fips"],
|
||||
cmd: "sed -e s/@fileencryption@/fileencryption=aes-256-xts/" +
|
||||
" -e s/@inlinecrypt@/inlinecrypt/ " +
|
||||
" -e s/@metadata_encryption@/metadata_encryption=aes-256-xts/ $(in) > $(out)",
|
||||
}
|
||||
|
||||
prebuilt_etc {
|
||||
name: "fstab.zuma",
|
||||
src: ":gen_fstab.zuma-hw-encrypt",
|
||||
vendor: true,
|
||||
vendor_ramdisk_available: true,
|
||||
}
|
||||
|
||||
prebuilt_etc {
|
||||
name: "fstab.zumapro",
|
||||
src: ":gen_fstab.zumapro-hw-encrypt",
|
||||
vendor: true,
|
||||
vendor_ramdisk_available: true,
|
||||
}
|
||||
|
||||
prebuilt_etc {
|
||||
name: "fstab.zuma-fips",
|
||||
src: ":gen_fstab.zuma-fips",
|
||||
vendor: true,
|
||||
vendor_ramdisk_available: true,
|
||||
}
|
||||
|
||||
prebuilt_etc {
|
||||
name: "fstab.zumapro-fips",
|
||||
src: ":gen_fstab.zumapro-fips",
|
||||
vendor: true,
|
||||
vendor_ramdisk_available: true,
|
||||
}
|
5
conf/f2fs/fstab.rw.zumapro.f2fs
Normal file
5
conf/f2fs/fstab.rw.zumapro.f2fs
Normal file
|
@ -0,0 +1,5 @@
|
|||
# Android fstab file for /data and /metadata partitions.
|
||||
#
|
||||
#<src> <mnt_point> <type> <mnt_flags and options> <fs_mgr_flags>
|
||||
/dev/block/platform/13200000.ufs/by-name/metadata /metadata f2fs noatime,nosuid,nodev,sync wait,check,formattable,first_stage_mount
|
||||
/dev/block/platform/13200000.ufs/by-name/userdata /data f2fs noatime,nosuid,nodev,discard,reserve_root=32768,resgid=1065,fsync_mode=nobarrier,compress_extension=apk,compress_extension=so,compress_extension=vdex,compress_extension=odex,@inlinecrypt@,atgc,checkpoint_merge,compress_cache latemount,wait,check,quota,formattable,sysfs_path=/dev/sys/block/bootdevice,checkpoint=fs,reservedsize=128M,fscompress,readahead_size_kb=128,@fileencryption@,@metadata_encryption@,keydirectory=/metadata/vold/metadata_encryption,device=zoned:/dev/block/by-name/zoned_device
|
6
conf/fstab.rw.efs
Normal file
6
conf/fstab.rw.efs
Normal file
|
@ -0,0 +1,6 @@
|
|||
# Android fstab file for efs partitions
|
||||
#
|
||||
#<src> <mnt_point> <type> <mnt_flags and options> <fs_mgr_flags>
|
||||
/dev/block/platform/13200000.ufs/by-name/efs /mnt/vendor/efs f2fs noatime,sync wait,check,formattable
|
||||
/dev/block/platform/13200000.ufs/by-name/efs_backup /mnt/vendor/efs_backup f2fs noatime,sync wait,check,formattable
|
||||
/dev/block/platform/13200000.ufs/by-name/modem_userdata /mnt/vendor/modem_userdata f2fs noatime,sync wait,check,formattable
|
|
@ -14,12 +14,7 @@ vendor /vendor
|
|||
vendor_dlkm /vendor_dlkm ext4 noatime,ro wait,slotselect,avb=vbmeta,avb_keys=no_such_key,logical,first_stage_mount
|
||||
/dev/block/platform/13200000.ufs/by-name/boot /boot emmc defaults slotselect,avb=boot,first_stage_mount
|
||||
/dev/block/platform/13200000.ufs/by-name/init_boot /init_boot emmc defaults slotselect,avb=init_boot,first_stage_mount
|
||||
/dev/block/platform/13200000.ufs/by-name/efs /mnt/vendor/efs f2fs noatime,sync wait,check,formattable
|
||||
/dev/block/platform/13200000.ufs/by-name/efs_backup /mnt/vendor/efs_backup f2fs noatime,sync wait,check,formattable
|
||||
/dev/block/platform/13200000.ufs/by-name/modem_userdata /mnt/vendor/modem_userdata f2fs noatime,sync wait,check,formattable
|
||||
/dev/block/platform/13200000.ufs/by-name/misc /misc emmc defaults wait
|
||||
/dev/block/platform/13200000.ufs/by-name/metadata /metadata f2fs noatime,nosuid,nodev,sync wait,check,formattable,first_stage_mount
|
||||
#/dev/block/platform/13200000.ufs/by-name/pvmfw /pvmfw emmc defaults wait,slotselect,avb=pvmfw,first_stage_mount
|
||||
/dev/block/platform/13200000.ufs/by-name/userdata /data f2fs noatime,nosuid,nodev,discard,reserve_root=32768,resgid=1065,fsync_mode=nobarrier,compress_extension=apk,compress_extension=so,compress_extension=vdex,compress_extension=odex,@inlinecrypt@,atgc,checkpoint_merge,compress_cache latemount,wait,check,quota,formattable,sysfs_path=/dev/sys/block/bootdevice,checkpoint=fs,reservedsize=128M,fscompress,readahead_size_kb=128,@fileencryption@,@metadata_encryption@,keydirectory=/metadata/vold/metadata_encryption,device=zoned:/dev/block/by-name/zoned_device
|
||||
/dev/block/platform/13200000.ufs/by-name/vbmeta /vbmeta emmc defaults slotselect,first_stage_mount
|
||||
/devices/platform/11210000.usb* auto vfat defaults voldmanaged=usb:auto
|
5
conf/init.efs.rc
Normal file
5
conf/init.efs.rc
Normal file
|
@ -0,0 +1,5 @@
|
|||
on early-init
|
||||
mount_all /vendor/etc/fstab.persist --early
|
||||
|
||||
on late-fs
|
||||
mount_all /vendor/etc/fstab.efs --early
|
|
@ -1,10 +1,10 @@
|
|||
import /vendor/etc/init/hw/init.zumapro.usb.rc
|
||||
import /vendor/etc/init/hw/init.efs.rc
|
||||
import android.hardware.drm@1.2-service.widevine.rc
|
||||
import init.exynos.sensorhub.rc
|
||||
import /vendor/etc/init/hw/init.${ro.boot.hardware.platform}.soc.rc
|
||||
|
||||
on early-init
|
||||
mount_all /vendor/etc/fstab.persist --early
|
||||
write /proc/sys/kernel/sched_pelt_multiplier 1
|
||||
write /sys/kernel/mm/lru_gen/enabled n
|
||||
|
||||
|
|
14
device.mk
14
device.mk
|
@ -438,7 +438,8 @@ PRODUCT_COPY_FILES += \
|
|||
PRODUCT_COPY_FILES += \
|
||||
device/google/zumapro/conf/init.zumapro.soc.rc:$(TARGET_COPY_OUT_VENDOR)/etc/init/hw/init.zumapro.soc.rc \
|
||||
device/google/zumapro/conf/init.zuma.soc.rc:$(TARGET_COPY_OUT_VENDOR)/etc/init/hw/init.zuma.soc.rc \
|
||||
device/google/zumapro/conf/init.zumapro.board.rc:$(TARGET_COPY_OUT_VENDOR)/etc/init/hw/init.zumapro.board.rc
|
||||
device/google/zumapro/conf/init.zumapro.board.rc:$(TARGET_COPY_OUT_VENDOR)/etc/init/hw/init.zumapro.board.rc \
|
||||
device/google/zumapro/conf/init.efs.rc:$(TARGET_COPY_OUT_VENDOR)/etc/init/hw/init.efs.rc
|
||||
|
||||
ifneq (,$(filter userdebug eng, $(TARGET_BUILD_VARIANT)))
|
||||
PRODUCT_COPY_FILES += \
|
||||
|
@ -453,6 +454,14 @@ PRODUCT_COPY_FILES += \
|
|||
device/google/zumapro/conf/init.recovery.device.rc:$(TARGET_COPY_OUT_RECOVERY)/root/init.recovery.zuma.rc
|
||||
|
||||
# Fstab files
|
||||
ifeq (ext4,$(TARGET_RW_FILE_SYSTEM_TYPE))
|
||||
PRODUCT_SOONG_NAMESPACES += \
|
||||
device/google/zumapro/conf/ext4
|
||||
else
|
||||
PRODUCT_SOONG_NAMESPACES += \
|
||||
device/google/zumapro/conf/f2fs
|
||||
endif
|
||||
|
||||
PRODUCT_PACKAGES += \
|
||||
fstab.zuma \
|
||||
fstab.zumapro \
|
||||
|
@ -465,7 +474,8 @@ PRODUCT_PACKAGES += \
|
|||
|
||||
PRODUCT_COPY_FILES += \
|
||||
device/google/$(TARGET_BOARD_PLATFORM)/conf/fstab.persist:$(TARGET_COPY_OUT_VENDOR)/etc/fstab.persist \
|
||||
device/google/$(TARGET_BOARD_PLATFORM)/conf/fstab.modem:$(TARGET_COPY_OUT_VENDOR)/etc/fstab.modem
|
||||
device/google/$(TARGET_BOARD_PLATFORM)/conf/fstab.modem:$(TARGET_COPY_OUT_VENDOR)/etc/fstab.modem \
|
||||
device/google/$(TARGET_BOARD_PLATFORM)/conf/fstab.rw.efs:$(TARGET_COPY_OUT_VENDOR)/etc/fstab.efs
|
||||
|
||||
# Shell scripts
|
||||
PRODUCT_PACKAGES += \
|
||||
|
|
|
@ -114,7 +114,7 @@
|
|||
</hal>
|
||||
<hal format="aidl" optional="true">
|
||||
<name>com.google.hardware.pixel.display</name>
|
||||
<version>12</version>
|
||||
<version>13</version>
|
||||
<interface>
|
||||
<name>IDisplay</name>
|
||||
<instance>default</instance>
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue