HomeSort by relevance Sort by last modified time
    Searched refs:rootfs (Results 1 - 25 of 29) sorted by null

1 2

  /external/vboot_reference/scripts/image_signing/
remove_test_label.sh 16 rootfs=$(make_temp_dir)
17 mount_image_partition ${image} 3 ${rootfs}
18 sed -i 's/test//' "${rootfs}/etc/lsb-release"
set_chronos_password.sh 15 local rootfs=$1
19 local temp_shadow="$rootfs/etc/tempshadow"
22 sudo grep -Ev ^chronos: "$rootfs/etc/shadow" \
24 sudo mv -f "$temp_shadow" "$rootfs/etc/shadow"
37 local rootfs=$(make_temp_dir)
39 mount_image_partition_ro "$image" 3 "$rootfs"
40 if ! no_chronos_password "$rootfs"; then
45 sudo umount $rootfs
47 mount_image_partition "$image" 3 "$rootfs"
48 change_chronos_password "$rootfs" "$chronos_password
    [all...]
ensure_not_ASAN.sh 25 local rootfs=$(make_temp_dir)
26 mount_image_partition_ro "$image" 3 "$rootfs"
30 if readelf -s "$rootfs/opt/google/chrome/chrome" | \
ensure_update_verification.sh 26 local rootfs=$(make_temp_dir)
28 mount_image_partition_ro "$image" 3 "$rootfs"
29 if [ ! -e "$rootfs/$key_location" ]; then
ensure_no_nonrelease_files.sh 40 local rootfs=$(make_temp_dir)
41 mount_image_partition_ro "$image" 3 "$rootfs"
44 if [ -e "$rootfs/$file" ]; then
46 ls -al "$rootfs/$file"
53 local config_path="$rootfs/etc/chrome_dev.conf"
insert_au_publickey.sh 24 local rootfs=$(make_temp_dir)
26 mount_image_partition "$image" 3 "$rootfs"
27 sudo mkdir -p "$rootfs/$key_location"
28 sudo cp "$pub_key" "$rootfs/$key_location/update-payload-key.pub.pem"
29 sudo chown root:root "$rootfs/$key_location/update-payload-key.pub.pem"
30 sudo chmod 644 "$rootfs/$key_location/update-payload-key.pub.pem"
tag_image.sh 125 # Args: ROOTFS DO_MODIFICATION
129 local rootfs="$1"
134 "${rootfs}" \
140 "${rootfs}" \
146 "${rootfs}" \
152 "${rootfs}" \
158 "${rootfs}" \
164 # Args: ROOTFS DO_MODIFICATION
166 local rootfs="$1"
168 local lsb="${rootfs}/etc/lsb-release
    [all...]
set_channel.sh 27 local rootfs lsb
29 rootfs=$(make_temp_dir)
30 lsb="${rootfs}/etc/lsb-release"
31 mount_image_partition "${image}" 3 "${rootfs}"
strip_boot_from_image.sh 31 local rootfs="$1"
33 echo "Zeroing freespace in ${rootfs}"
36 ( sudo dd if=/dev/zero of="${rootfs}/filler" bs=4096 conv=fdatasync \
38 sudo rm "${rootfs}/filler"
set_lsb_release.sh 13 local rootfs=$1
16 local temp_lsb_release="$rootfs/etc/temp-lsb-release"
18 grep -Ev "^$key=" "$rootfs/etc/lsb-release" \
20 sudo sort -o "$rootfs/etc/lsb-release" "$temp_lsb_release"
49 local rootfs=$(make_temp_dir)
53 mount_image_partition_ro "${image}" 3 "${rootfs}"
55 mount_image_partition "${image}" 3 "${rootfs}"
64 set_lsb_release_keyval "${rootfs}" "${key}" "${value}"
68 cat "${rootfs}/etc/lsb-release"
common_minimal.sh 15 # The tag when the rootfs is changed.
249 local rootfs="$1"
253 if ! is_ext2 "$rootfs" $offset; then
254 echo "enable_rw_mount called on non-ext2 filesystem: $rootfs $offset" 1>&2
263 sudo dd of="$rootfs" seek=$((offset + ro_compat_offset)) \
269 local rootfs="$1"
274 local sb_value=$(sudo dd if="$rootfs" skip=$((offset + sb_magic_offset)) \
284 local rootfs="$1"
288 if ! is_ext2 "$rootfs" $offset; then
289 echo "disable_rw_mount called on non-ext2 filesystem: $rootfs $offset" 1>&
    [all...]
convert_recovery_to_full_ssd.sh 51 rootfs=$(make_temp_file)
52 echo "Replacing RootFS on the SSD with that of the RECOVERY image"
53 extract_image_partition ${RECOVERY_IMAGE} 3 ${rootfs}
54 replace_image_partition ${SSD_IMAGE} 3 ${rootfs}
ensure_sane_lsb-release.sh 131 local rootfs=$(make_temp_dir)
132 mount_image_partition_ro "$image" 3 "$rootfs"
133 local lsb="$rootfs/$LSB_FILE"
ensure_secure_kernelparams.sh 98 local rootfs=$(make_temp_dir)
99 mount_image_partition_ro "$image" 3 "$rootfs"
103 local board=$(grep CHROMEOS_RELEASE_BOARD= "$rootfs/etc/lsb-release" | \
sign_official_build.sh 35 verify (verify an image including rootfs hashes)
95 # Get current rootfs hash and kernel command line
107 # to move all signing and rootfs code to one single place where it can be
162 # Calculate rootfs hash of an image
165 # rootfs calculation parameters are grabbed from KERNEL_CONFIG
177 echo "WARNING: Couldn't grab dm_config. Aborting rootfs hash calculation."
215 # Run the verity tool on the rootfs partition.
229 # Re-calculate rootfs hash, update rootfs and kernel command line(s).
233 # The rootfs is hashed by tool 'verity', and the hash data is stored after th
    [all...]
  /external/toolchain-utils/
chromiumos_image_diff.py 46 self.rootfs = ''
52 self.rootfs = '/tmp/{0}.rootfs'.format(mount_basename)
56 self.rootfs = tempfile.mkdtemp(suffix='.rootfs',
58 ## rootfs is like /tmp/tmpxyz012.rootfs.
59 match = re.match(r'^(.*)\.rootfs$', self.rootfs)
66 self.image, self.rootfs, self.stateful)
    [all...]
  /external/avb/test/
avbtool_unittest.cc 351 std::vector<uint8_t> rootfs; local
352 rootfs.resize(rootfs_size);
357 rootfs[n] = uint8_t(n) & 0x03;
359 rootfs[n] = uint8_t(n);
363 base::FilePath rootfs_path = testdir_.Append("rootfs.bin");
367 reinterpret_cast<const char*>(rootfs.data()),
368 rootfs.size())));
460 avb_sha256_update(&hasher_ctx, rootfs.data(), rootfs_size);
643 std::vector<uint8_t> rootfs; local
644 rootfs.resize(rootfs_size)
915 std::vector<uint8_t> rootfs; local
    [all...]
avb_slot_verify_unittest.cc 1172 std::vector<uint8_t> rootfs; local
    [all...]
  /external/kmod/testsuite/
testsuite.c 248 const char *stamp = TESTSUITE_ROOTFS "../stamp-rootfs";
249 const char *rootfs = t->config[TC_ROOTFS]; local
257 if (stat(rootfs, &rootfsst) != 0) {
258 ERR("could not stat %s\n - %m", rootfs);
263 ERR("rootfs %s is dirty, please run 'make rootfs' before runnning this test\n",
264 rootfs);
636 const char *rootfs = t->config[TC_ROOTFS] ? t->config[TC_ROOTFS] : ""; local
639 if (snprintf(dirname, sizeof(dirname), "%s/sys/module", rootfs)
641 ERR("rootfs path too long: %s\n", rootfs)
    [all...]
  /system/sepolicy/private/
file_contexts 3 / u:object_r:rootfs:s0
7 /build\.prop u:object_r:rootfs:s0
8 /default\.prop u:object_r:rootfs:s0
9 /fstab\..* u:object_r:rootfs:s0
10 /init\..* u:object_r:rootfs:s0
11 /res(/.*)? u:object_r:rootfs:s0
12 /selinux_version u:object_r:rootfs:s0
13 /ueventd\..* u:object_r:rootfs:s0
14 /verity_key u:object_r:rootfs:s0
17 /charger u:object_r:rootfs:s
    [all...]
app.te 38 allow { appdomain -isolated_app } rootfs:lnk_file r_file_perms;
412 # Write to rootfs.
413 neverallow appdomain rootfs:dir_file_class_set
492 rootfs
  /external/vboot_reference/utility/
vbutil_what_keys 15 With the -v option, it will attempt to mount any rootfs partitions from disk
136 for pnum in $(cgpt find -n -t rootfs "$file" 2>/dev/null); do
  /kernel/tests/net/test/
run_net_test.sh 50 ROOTFS=net_test.rootfs.20150203
51 COMPRESSED_ROOTFS=$ROOTFS.xz
129 if [ ! -f $ROOTFS ]; then
137 echo "Using $ROOTFS"
208 exec $KERNEL_BINARY umid=net_test $blockdevice=$SCRIPT_DIR/$ROOTFS \
  /external/autotest/site_utils/
lxc_config.py 227 self.tmp_append = os.path.join(self.container.rootfs, APPEND_FOLDER)
250 target = os.path.join(self.container.rootfs,
lxc.py 154 # Skip all files and folders without rootfs subfolder.
157 'rootfs'))):
450 # Path to the rootfs of the container. This will be initialized when
451 # property rootfs is retrieved.
471 def rootfs(self): member in class:Container
472 """Path to the rootfs of the container.
474 This property returns the path to the rootfs of the container, that is,
476 attribute lxc.rootfs from the config file of the container, e.g.,
477 lxc.rootfs = /usr/local/autotest/containers/t4/rootfs
    [all...]

Completed in 358 milliseconds

1 2