gs101: remove init.ramoops.sh

Ramoops encryption/decryption is handled by bootloader now.

Bug: 173808916
Signed-off-by: Oleg Matcovschi <omatcovschi@google.com>
Change-Id: If98ca902728e2fc7674f5f18615de685dcebd488
This commit is contained in:
Oleg Matcovschi 2021-04-22 00:16:00 -07:00
parent a45f9156ad
commit 982119744c
2 changed files with 0 additions and 18 deletions

View file

@ -209,7 +209,6 @@ PRODUCT_COPY_FILES += \
# Shell scripts # Shell scripts
PRODUCT_COPY_FILES += \ PRODUCT_COPY_FILES += \
device/google/gs101/init.insmod.sh:$(TARGET_COPY_OUT_VENDOR)/bin/init.insmod.sh \ device/google/gs101/init.insmod.sh:$(TARGET_COPY_OUT_VENDOR)/bin/init.insmod.sh \
device/google/gs101/init.ramoops.sh:$(TARGET_COPY_OUT_VENDOR)/bin/init.ramoops.sh
# insmod files # insmod files
PRODUCT_COPY_FILES += \ PRODUCT_COPY_FILES += \

View file

@ -1,17 +0,0 @@
#!/vendor/bin/sh
# Decrypt the keys and write them to the kernel
ramoops -D
if [ $? -eq 0 ]; then
# Pivot (and decrypt)
echo 1 > /sys/devices/virtual/ramoops/pstore/use_alt
else
setprop vendor.ramoops.decryption.error $?
fi
# Trigger remount of pstore regardless of decryption state
setprop vendor.ramoops.decrypted true
# Generate keys (if none exist), and load the keys to carveout
ramoops -g -l -c