From 982119744c5c44039ed623b2d0a891760d7600fe Mon Sep 17 00:00:00 2001 From: Oleg Matcovschi Date: Thu, 22 Apr 2021 00:16:00 -0700 Subject: [PATCH] gs101: remove init.ramoops.sh Ramoops encryption/decryption is handled by bootloader now. Bug: 173808916 Signed-off-by: Oleg Matcovschi Change-Id: If98ca902728e2fc7674f5f18615de685dcebd488 --- device.mk | 1 - init.ramoops.sh | 17 ----------------- 2 files changed, 18 deletions(-) delete mode 100755 init.ramoops.sh diff --git a/device.mk b/device.mk index 74799a6d..99d00267 100644 --- a/device.mk +++ b/device.mk @@ -209,7 +209,6 @@ PRODUCT_COPY_FILES += \ # Shell scripts PRODUCT_COPY_FILES += \ device/google/gs101/init.insmod.sh:$(TARGET_COPY_OUT_VENDOR)/bin/init.insmod.sh \ - device/google/gs101/init.ramoops.sh:$(TARGET_COPY_OUT_VENDOR)/bin/init.ramoops.sh # insmod files PRODUCT_COPY_FILES += \ diff --git a/init.ramoops.sh b/init.ramoops.sh deleted file mode 100755 index 22146da1..00000000 --- a/init.ramoops.sh +++ /dev/null @@ -1,17 +0,0 @@ -#!/vendor/bin/sh - -# Decrypt the keys and write them to the kernel -ramoops -D - -if [ $? -eq 0 ]; then - # Pivot (and decrypt) - echo 1 > /sys/devices/virtual/ramoops/pstore/use_alt -else - setprop vendor.ramoops.decryption.error $? -fi - -# Trigger remount of pstore regardless of decryption state -setprop vendor.ramoops.decrypted true - -# Generate keys (if none exist), and load the keys to carveout -ramoops -g -l -c