/external/vboot_reference/scripts/image_signing/ |
remove_test_label.sh | 16 rootfs=$(make_temp_dir) 17 mount_image_partition ${image} 3 ${rootfs} 18 sed -i 's/test//' "${rootfs}/etc/lsb-release"
|
set_chronos_password.sh | 15 local rootfs=$1 19 local temp_shadow="$rootfs/etc/tempshadow" 22 sudo grep -Ev ^chronos: "$rootfs/etc/shadow" \ 24 sudo mv -f "$temp_shadow" "$rootfs/etc/shadow" 37 local rootfs=$(make_temp_dir) 39 mount_image_partition_ro "$image" 3 "$rootfs" 40 if ! no_chronos_password "$rootfs"; then 45 sudo umount $rootfs 47 mount_image_partition "$image" 3 "$rootfs" 48 change_chronos_password "$rootfs" "$chronos_password [all...] |
ensure_not_ASAN.sh | 25 local rootfs=$(make_temp_dir) 26 mount_image_partition_ro "$image" 3 "$rootfs" 30 if readelf -s "$rootfs/opt/google/chrome/chrome" | \
|
ensure_update_verification.sh | 26 local rootfs=$(make_temp_dir) 28 mount_image_partition_ro "$image" 3 "$rootfs" 29 if [ ! -e "$rootfs/$key_location" ]; then
|
ensure_no_nonrelease_files.sh | 40 local rootfs=$(make_temp_dir) 41 mount_image_partition_ro "$image" 3 "$rootfs" 44 if [ -e "$rootfs/$file" ]; then 46 ls -al "$rootfs/$file" 53 local config_path="$rootfs/etc/chrome_dev.conf"
|
insert_au_publickey.sh | 24 local rootfs=$(make_temp_dir) 26 mount_image_partition "$image" 3 "$rootfs" 27 sudo mkdir -p "$rootfs/$key_location" 28 sudo cp "$pub_key" "$rootfs/$key_location/update-payload-key.pub.pem" 29 sudo chown root:root "$rootfs/$key_location/update-payload-key.pub.pem" 30 sudo chmod 644 "$rootfs/$key_location/update-payload-key.pub.pem"
|
tag_image.sh | 125 # Args: ROOTFS DO_MODIFICATION 129 local rootfs="$1" 134 "${rootfs}" \ 140 "${rootfs}" \ 146 "${rootfs}" \ 152 "${rootfs}" \ 158 "${rootfs}" \ 164 # Args: ROOTFS DO_MODIFICATION 166 local rootfs="$1" 168 local lsb="${rootfs}/etc/lsb-release [all...] |
set_channel.sh | 27 local rootfs lsb 29 rootfs=$(make_temp_dir) 30 lsb="${rootfs}/etc/lsb-release" 31 mount_image_partition "${image}" 3 "${rootfs}"
|
strip_boot_from_image.sh | 31 local rootfs="$1" 33 echo "Zeroing freespace in ${rootfs}" 36 ( sudo dd if=/dev/zero of="${rootfs}/filler" bs=4096 conv=fdatasync \ 38 sudo rm "${rootfs}/filler"
|
set_lsb_release.sh | 13 local rootfs=$1 16 local temp_lsb_release="$rootfs/etc/temp-lsb-release" 18 grep -Ev "^$key=" "$rootfs/etc/lsb-release" \ 20 sudo sort -o "$rootfs/etc/lsb-release" "$temp_lsb_release" 49 local rootfs=$(make_temp_dir) 53 mount_image_partition_ro "${image}" 3 "${rootfs}" 55 mount_image_partition "${image}" 3 "${rootfs}" 64 set_lsb_release_keyval "${rootfs}" "${key}" "${value}" 68 cat "${rootfs}/etc/lsb-release"
|
common_minimal.sh | 15 # The tag when the rootfs is changed. 249 local rootfs="$1" 253 if ! is_ext2 "$rootfs" $offset; then 254 echo "enable_rw_mount called on non-ext2 filesystem: $rootfs $offset" 1>&2 263 sudo dd of="$rootfs" seek=$((offset + ro_compat_offset)) \ 269 local rootfs="$1" 274 local sb_value=$(sudo dd if="$rootfs" skip=$((offset + sb_magic_offset)) \ 284 local rootfs="$1" 288 if ! is_ext2 "$rootfs" $offset; then 289 echo "disable_rw_mount called on non-ext2 filesystem: $rootfs $offset" 1>& [all...] |
convert_recovery_to_full_ssd.sh | 51 rootfs=$(make_temp_file) 52 echo "Replacing RootFS on the SSD with that of the RECOVERY image" 53 extract_image_partition ${RECOVERY_IMAGE} 3 ${rootfs} 54 replace_image_partition ${SSD_IMAGE} 3 ${rootfs}
|
ensure_sane_lsb-release.sh | 131 local rootfs=$(make_temp_dir) 132 mount_image_partition_ro "$image" 3 "$rootfs" 133 local lsb="$rootfs/$LSB_FILE"
|
ensure_secure_kernelparams.sh | 98 local rootfs=$(make_temp_dir) 99 mount_image_partition_ro "$image" 3 "$rootfs" 103 local board=$(grep CHROMEOS_RELEASE_BOARD= "$rootfs/etc/lsb-release" | \
|
sign_official_build.sh | 35 verify (verify an image including rootfs hashes) 95 # Get current rootfs hash and kernel command line 107 # to move all signing and rootfs code to one single place where it can be 162 # Calculate rootfs hash of an image 165 # rootfs calculation parameters are grabbed from KERNEL_CONFIG 177 echo "WARNING: Couldn't grab dm_config. Aborting rootfs hash calculation." 215 # Run the verity tool on the rootfs partition. 229 # Re-calculate rootfs hash, update rootfs and kernel command line(s). 233 # The rootfs is hashed by tool 'verity', and the hash data is stored after th [all...] |
/external/toolchain-utils/ |
chromiumos_image_diff.py | 46 self.rootfs = '' 52 self.rootfs = '/tmp/{0}.rootfs'.format(mount_basename) 56 self.rootfs = tempfile.mkdtemp(suffix='.rootfs', 58 ## rootfs is like /tmp/tmpxyz012.rootfs. 59 match = re.match(r'^(.*)\.rootfs$', self.rootfs) 66 self.image, self.rootfs, self.stateful) [all...] |
/external/avb/test/ |
avbtool_unittest.cc | 351 std::vector<uint8_t> rootfs; local 352 rootfs.resize(rootfs_size); 357 rootfs[n] = uint8_t(n) & 0x03; 359 rootfs[n] = uint8_t(n); 363 base::FilePath rootfs_path = testdir_.Append("rootfs.bin"); 367 reinterpret_cast<const char*>(rootfs.data()), 368 rootfs.size()))); 460 avb_sha256_update(&hasher_ctx, rootfs.data(), rootfs_size); 643 std::vector<uint8_t> rootfs; local 644 rootfs.resize(rootfs_size) 915 std::vector<uint8_t> rootfs; local [all...] |
avb_slot_verify_unittest.cc | 1172 std::vector<uint8_t> rootfs; local [all...] |
/external/kmod/testsuite/ |
testsuite.c | 248 const char *stamp = TESTSUITE_ROOTFS "../stamp-rootfs"; 249 const char *rootfs = t->config[TC_ROOTFS]; local 257 if (stat(rootfs, &rootfsst) != 0) { 258 ERR("could not stat %s\n - %m", rootfs); 263 ERR("rootfs %s is dirty, please run 'make rootfs' before runnning this test\n", 264 rootfs); 636 const char *rootfs = t->config[TC_ROOTFS] ? t->config[TC_ROOTFS] : ""; local 639 if (snprintf(dirname, sizeof(dirname), "%s/sys/module", rootfs) 641 ERR("rootfs path too long: %s\n", rootfs) [all...] |
/system/sepolicy/private/ |
file_contexts | 3 / u:object_r:rootfs:s0 7 /build\.prop u:object_r:rootfs:s0 8 /default\.prop u:object_r:rootfs:s0 9 /fstab\..* u:object_r:rootfs:s0 10 /init\..* u:object_r:rootfs:s0 11 /res(/.*)? u:object_r:rootfs:s0 12 /selinux_version u:object_r:rootfs:s0 13 /ueventd\..* u:object_r:rootfs:s0 14 /verity_key u:object_r:rootfs:s0 17 /charger u:object_r:rootfs:s [all...] |
app.te | 38 allow { appdomain -isolated_app } rootfs:lnk_file r_file_perms; 412 # Write to rootfs. 413 neverallow appdomain rootfs:dir_file_class_set 492 rootfs
|
/external/vboot_reference/utility/ |
vbutil_what_keys | 15 With the -v option, it will attempt to mount any rootfs partitions from disk 136 for pnum in $(cgpt find -n -t rootfs "$file" 2>/dev/null); do
|
/kernel/tests/net/test/ |
run_net_test.sh | 50 ROOTFS=net_test.rootfs.20150203 51 COMPRESSED_ROOTFS=$ROOTFS.xz 129 if [ ! -f $ROOTFS ]; then 137 echo "Using $ROOTFS" 208 exec $KERNEL_BINARY umid=net_test $blockdevice=$SCRIPT_DIR/$ROOTFS \
|
/external/autotest/site_utils/ |
lxc_config.py | 227 self.tmp_append = os.path.join(self.container.rootfs, APPEND_FOLDER) 250 target = os.path.join(self.container.rootfs,
|
lxc.py | 154 # Skip all files and folders without rootfs subfolder. 157 'rootfs'))): 450 # Path to the rootfs of the container. This will be initialized when 451 # property rootfs is retrieved. 471 def rootfs(self): member in class:Container 472 """Path to the rootfs of the container. 474 This property returns the path to the rootfs of the container, that is, 476 attribute lxc.rootfs from the config file of the container, e.g., 477 lxc.rootfs = /usr/local/autotest/containers/t4/rootfs [all...] |