Home
last modified time | relevance | path

Searched refs:rootfs (Results 1 – 25 of 29) sorted by relevance

12

/external/vboot_reference/scripts/image_signing/
Dtag_image.sh129 local rootfs="$1"
134 "${rootfs}" \
140 "${rootfs}" \
146 "${rootfs}" \
152 "${rootfs}" \
158 "${rootfs}" \
166 local rootfs="$1"
168 local lsb="${rootfs}/etc/lsb-release"
205 rootfs=$(make_temp_dir)
206 mount_image_partition_ro "${IMAGE}" 3 "${rootfs}"
[all …]
Dset_chronos_password.sh15 local rootfs=$1
19 local temp_shadow="$rootfs/etc/tempshadow"
22 sudo grep -Ev ^chronos: "$rootfs/etc/shadow" \
24 sudo mv -f "$temp_shadow" "$rootfs/etc/shadow"
37 local rootfs=$(make_temp_dir)
39 mount_image_partition_ro "$image" 3 "$rootfs"
40 if ! no_chronos_password "$rootfs"; then
45 sudo umount $rootfs
47 mount_image_partition "$image" 3 "$rootfs"
48 change_chronos_password "$rootfs" "$chronos_password"
Dcommon_minimal.sh249 local rootfs="$1"
253 if ! is_ext2 "$rootfs" $offset; then
254 echo "enable_rw_mount called on non-ext2 filesystem: $rootfs $offset" 1>&2
263 sudo dd of="$rootfs" seek=$((offset + ro_compat_offset)) \
269 local rootfs="$1"
274 local sb_value=$(sudo dd if="$rootfs" skip=$((offset + sb_magic_offset)) \
284 local rootfs="$1"
288 if ! is_ext2 "$rootfs" $offset; then
289 echo "disable_rw_mount called on non-ext2 filesystem: $rootfs $offset" 1>&2
298 sudo dd of="$rootfs" seek=$((offset + ro_compat_offset)) \
[all …]
Dset_lsb_release.sh13 local rootfs=$1
16 local temp_lsb_release="$rootfs/etc/temp-lsb-release"
18 grep -Ev "^$key=" "$rootfs/etc/lsb-release" \
20 sudo sort -o "$rootfs/etc/lsb-release" "$temp_lsb_release"
53 mount_image_partition_ro "${image}" 3 "${rootfs}"
55 mount_image_partition "${image}" 3 "${rootfs}"
64 set_lsb_release_keyval "${rootfs}" "${key}" "${value}"
68 cat "${rootfs}/etc/lsb-release"
Dinsert_au_publickey.sh24 local rootfs=$(make_temp_dir)
26 mount_image_partition "$image" 3 "$rootfs"
27 sudo mkdir -p "$rootfs/$key_location"
28 sudo cp "$pub_key" "$rootfs/$key_location/update-payload-key.pub.pem"
29 sudo chown root:root "$rootfs/$key_location/update-payload-key.pub.pem"
30 sudo chmod 644 "$rootfs/$key_location/update-payload-key.pub.pem"
Densure_no_nonrelease_files.sh40 local rootfs=$(make_temp_dir)
41 mount_image_partition_ro "$image" 3 "$rootfs"
44 if [ -e "$rootfs/$file" ]; then
46 ls -al "$rootfs/$file"
53 local config_path="$rootfs/etc/chrome_dev.conf"
Dstrip_boot_from_image.sh31 local rootfs="$1"
33 echo "Zeroing freespace in ${rootfs}"
36 ( sudo dd if=/dev/zero of="${rootfs}/filler" bs=4096 conv=fdatasync \
38 sudo rm "${rootfs}/filler"
Dset_channel.sh27 local rootfs lsb
29 rootfs=$(make_temp_dir)
30 lsb="${rootfs}/etc/lsb-release"
31 mount_image_partition "${image}" 3 "${rootfs}"
Dremove_test_label.sh16 rootfs=$(make_temp_dir)
17 mount_image_partition ${image} 3 ${rootfs}
18 sed -i 's/test//' "${rootfs}/etc/lsb-release"
Densure_not_ASAN.sh25 local rootfs=$(make_temp_dir)
26 mount_image_partition_ro "$image" 3 "$rootfs"
30 if readelf -s "$rootfs/opt/google/chrome/chrome" | \
Densure_update_verification.sh26 local rootfs=$(make_temp_dir)
28 mount_image_partition_ro "$image" 3 "$rootfs"
29 if [ ! -e "$rootfs/$key_location" ]; then
Dconvert_recovery_to_full_ssd.sh51 rootfs=$(make_temp_file)
53 extract_image_partition ${RECOVERY_IMAGE} 3 ${rootfs}
54 replace_image_partition ${SSD_IMAGE} 3 ${rootfs}
Densure_sane_lsb-release.sh131 local rootfs=$(make_temp_dir)
132 mount_image_partition_ro "$image" 3 "$rootfs"
133 local lsb="$rootfs/$LSB_FILE"
Densure_secure_kernelparams.sh98 local rootfs=$(make_temp_dir)
99 mount_image_partition_ro "$image" 3 "$rootfs"
103 local board=$(grep CHROMEOS_RELEASE_BOARD= "$rootfs/etc/lsb-release" | \
/external/autotest/client/site_tests/security_RootfsOwners/
Dcontrol8 Ensures there is no files owned by chronos on the rootfs.
11 PURPOSE = "Ensures there is no files owned by chronos on the rootfs."
13 Fail if there are any files owned by the chronos on the rootfs.
/external/autotest/client/site_tests/platform_PartitionCheck/
Dcontrol7 PURPOSE = "Verify size of rootfs are as expected."
8 CRITERIA = "Fail if rootfs partitions are not of our reference size."
19 as a hard-coded expected rootfs size.
/external/autotest/client/site_tests/build_RootFilesystemSize/
Dcontrol7 PURPOSE = "Report the production size of the rootfs."
9 This test will fail if the size of the rootfs size cannot be obtained.
/external/autotest/client/site_tests/security_RootfsStatefulSymlinks/
Dcontrol9 rootfs can undermine the security provided by verified boot. Therefore,
11 we symlink from inside the rootfs out to the stateful partition. This
/external/autotest/server/site_tests/debugd_DevTools/
Dcontrol18 the device rootfs is verified, this test will disable verification and reboot.
29 - Restore rootfs verification
/external/autotest/site_utils/
Dlxc_config.py149 self.tmp_append = os.path.join(self.container.rootfs, APPEND_FOLDER)
172 target = os.path.join(self.container.rootfs,
Dlxc.py431 def rootfs(self): member in Container
578 utils.run('sudo mkdir -p %s' % os.path.join(self.rootfs, destination))
862 usr_local_path = os.path.join(container.rootfs, 'usr', 'local')
/external/selinux/secilc/docs/
Dcil_file_labeling_statements.md193 <td align="left"><p>Name of the supported filesystem (e.g. <code>rootfs</code> or <code>proc</code>…
211 (type rootfs)
212 (roletype object_r rootfs)
213 (context rootfs_context (u object_r rootfs low_low))
222 (genfscon rootfs / rootfs_context)
/external/autotest/server/site_tests/platform_CorruptRootfs/
Dcontrol16 Checks that the machine comes back up on B rootfs.
Dcontrol.regression19 Checks that the machine comes back up on B rootfs.
/external/vboot_reference/utility/
Dvbutil_what_keys136 for pnum in $(cgpt find -n -t rootfs "$file" 2>/dev/null); do

12