Home
last modified time | relevance | path

Searched refs:root (Results 1 – 17 of 17) sorted by relevance

/bootable/recovery/uncrypt/
Duncrypt.rc6 user root
13 user root
20 user root
/bootable/deprecated-ota/edify/
Dparser.yy36 void yyerror(std::unique_ptr<Expr>* root, int* error_count, const char* s);
37 int yyparse(std::unique_ptr<Expr>* root, int* error_count);
74 %parse-param {std::unique_ptr<Expr>* root}
89 input: expr { root->reset($1); }
111 yyerror(root, error_count, msg.c_str());
134 void yyerror(std::unique_ptr<Expr>* root, int* error_count, const char* s) {
142 int ParseString(const std::string& str, std::unique_ptr<Expr>* root, int* error_count) {
144 return yyparse(root, error_count);
/bootable/recovery/updater_sample/src/com/example/android/systemupdatersample/util/
DUpdateConfigs.java63 File root = new File(getConfigsRoot(context)); in getUpdateConfigs() local
65 if (!root.exists()) { in getUpdateConfigs()
68 for (final File f : root.listFiles()) { in getUpdateConfigs()
/bootable/recovery/etc/
Dinit.rc35 chown root shell /tmp
79 user root
84 user root
89 user root
95 user root
101 user root
103 # Restart adbd so it can run as root
104 on property:service.adb.root=1
/bootable/deprecated-ota/updater/
Dupdater.cpp69 std::unique_ptr<Expr> root; in RunUpdate() local
71 int error = ParseString(updater_script_, &root, &error_count); in RunUpdate()
81 bool status = Evaluate(&state, root, &result_); in RunUpdate()
/bootable/deprecated-ota/applypatch/
Dvendor_flash_recovery.rc4 user root
/bootable/recovery/update_verifier/
Dupdate_verifier.rc2 user root
/bootable/recovery/bootloader_message/
Dmisctrl.rc2 user root # for misc partition access
/bootable/recovery/
DCleanSpec.mk49 $(call add-clean-step, rm -rf $(PRODUCT_OUT)/recovery/root/sbin)
52 $(call add-clean-step, rm -rf $(PRODUCT_OUT)/recovery/root/system/lib64/libinstall.so)
DREADME.md34 adb root
69 subset of `adb` commands are meaningful under recovery, such as `adb root`, `adb shell`, `adb push`,
/bootable/recovery/tools/recovery_l10n/
DREADME.md24 adb root && adb pull /data/data/com.android.recovery_l10n/files/text-out.png
/bootable/libbootloader/gbl/
Dbazel.MODULE.bazel18 root module. However, rules_rust_tinyjson and other crates needs to be resolved
/bootable/deprecated-ota/edify/include/edify/
Dexpr.h157 int ParseString(const std::string& str, std::unique_ptr<Expr>* root, int* error_count);
/bootable/libbootloader/gbl/smoltcp/
DBUILD.smoltcp.bazel64 # Add fixup.rs to build and use our own crate root that imports it.
/bootable/libbootloader/gbl/libbootimg/
DBUILD79 # The source files do not specify "no_std" and thus can't be used as library crate root in our EFI
/bootable/recovery/updater_sample/
DREADME.md200 `adb root` might be required.
261 local$ adb root
/bootable/recovery/tests/testdata/
Drecovery_body1513 …������������������������/procy�����u:object_r:rootfs:s0����/root������������������…
2829 chown root shell /tmp
2905 # Restart adbd so it can run as root
2906 on property:service.adb.root=1
2943 service.adb.root u:object_r:shell_prop:s0
8657 /dev/null 0666 root root
8658 /dev/zero 0666 root root
8659 /dev/full 0666 root root
8660 /dev/ptmx 0666 root root
8661 /dev/tty 0666 root root
[all …]