/external/vboot_reference/scripts/image_signing/ |
H A D | remove_test_label.sh | 16 rootfs=$(make_temp_dir) 17 mount_image_partition ${image} 3 ${rootfs} 18 sed -i 's/test//' "${rootfs}/etc/lsb-release"
|
H A D | set_chronos_password.sh | 15 local rootfs=$1 19 local temp_shadow="$rootfs/etc/tempshadow" 22 sudo grep -Ev ^chronos: "$rootfs/etc/shadow" \ 24 sudo mv -f "$temp_shadow" "$rootfs/etc/shadow" 37 local rootfs=$(make_temp_dir) 39 mount_image_partition_ro "$image" 3 "$rootfs" 40 if ! no_chronos_password "$rootfs"; then 45 sudo umount $rootfs 47 mount_image_partition "$image" 3 "$rootfs" 48 change_chronos_password "$rootfs" " [all...] |
H A D | ensure_not_ASAN.sh | 25 local rootfs=$(make_temp_dir) 26 mount_image_partition_ro "$image" 3 "$rootfs" 30 if readelf -s "$rootfs/opt/google/chrome/chrome" | \
|
H A D | ensure_update_verification.sh | 26 local rootfs=$(make_temp_dir) 28 mount_image_partition_ro "$image" 3 "$rootfs" 29 if [ ! -e "$rootfs/$key_location" ]; then
|
H A D | ensure_no_nonrelease_files.sh | 40 local rootfs=$(make_temp_dir) 41 mount_image_partition_ro "$image" 3 "$rootfs" 44 if [ -e "$rootfs/$file" ]; then 46 ls -al "$rootfs/$file" 53 local config_path="$rootfs/etc/chrome_dev.conf"
|
H A D | insert_au_publickey.sh | 24 local rootfs=$(make_temp_dir) 26 mount_image_partition "$image" 3 "$rootfs" 27 sudo mkdir -p "$rootfs/$key_location" 28 sudo cp "$pub_key" "$rootfs/$key_location/update-payload-key.pub.pem" 29 sudo chown root:root "$rootfs/$key_location/update-payload-key.pub.pem" 30 sudo chmod 644 "$rootfs/$key_location/update-payload-key.pub.pem"
|
H A D | tag_image.sh | 129 local rootfs="$1" 134 "${rootfs}" \ 140 "${rootfs}" \ 146 "${rootfs}" \ 152 "${rootfs}" \ 158 "${rootfs}" \ 166 local rootfs="$1" 168 local lsb="${rootfs}/etc/lsb-release" 205 rootfs=$(make_temp_dir) 206 mount_image_partition_ro "${IMAGE}" 3 "${rootfs}" [all...] |
H A D | set_channel.sh | 27 local rootfs lsb 29 rootfs=$(make_temp_dir) 30 lsb="${rootfs}/etc/lsb-release" 31 mount_image_partition "${image}" 3 "${rootfs}"
|
H A D | strip_boot_from_image.sh | 31 local rootfs="$1" 33 echo "Zeroing freespace in ${rootfs}" 36 ( sudo dd if=/dev/zero of="${rootfs}/filler" bs=4096 conv=fdatasync \ 38 sudo rm "${rootfs}/filler"
|
H A D | set_lsb_release.sh | 13 local rootfs=$1 16 local temp_lsb_release="$rootfs/etc/temp-lsb-release" 18 grep -Ev "^$key=" "$rootfs/etc/lsb-release" \ 20 sudo sort -o "$rootfs/etc/lsb-release" "$temp_lsb_release" 49 local rootfs=$(make_temp_dir) 53 mount_image_partition_ro "${image}" 3 "${rootfs}" 55 mount_image_partition "${image}" 3 "${rootfs}" 64 set_lsb_release_keyval "${rootfs}" "${key}" "${value}" 68 cat "${rootfs}/etc/lsb-release"
|
H A D | common_minimal.sh | 15 # The tag when the rootfs is changed. 249 local rootfs="$1" 253 if ! is_ext2 "$rootfs" $offset; then 254 echo "enable_rw_mount called on non-ext2 filesystem: $rootfs $offset" 1>&2 263 sudo dd of="$rootfs" seek=$((offset + ro_compat_offset)) \ 269 local rootfs="$1" 274 local sb_value=$(sudo dd if="$rootfs" skip=$((offset + sb_magic_offset)) \ 284 local rootfs="$1" 288 if ! is_ext2 "$rootfs" $offset; then 289 echo "disable_rw_mount called on non-ext2 filesystem: $rootfs [all...] |
H A D | convert_recovery_to_full_ssd.sh | 51 rootfs=$(make_temp_file) 53 extract_image_partition ${RECOVERY_IMAGE} 3 ${rootfs} 54 replace_image_partition ${SSD_IMAGE} 3 ${rootfs}
|
H A D | ensure_sane_lsb-release.sh | 131 local rootfs=$(make_temp_dir) 132 mount_image_partition_ro "$image" 3 "$rootfs" 133 local lsb="$rootfs/$LSB_FILE"
|
H A D | ensure_secure_kernelparams.sh | 98 local rootfs=$(make_temp_dir) 99 mount_image_partition_ro "$image" 3 "$rootfs" 103 local board=$(grep CHROMEOS_RELEASE_BOARD= "$rootfs/etc/lsb-release" | \
|
H A D | sign_official_build.sh | 35 verify (verify an image including rootfs hashes) 95 # Get current rootfs hash and kernel command line 107 # to move all signing and rootfs code to one single place where it can be 162 # Calculate rootfs hash of an image 165 # rootfs calculation parameters are grabbed from KERNEL_CONFIG 177 echo "WARNING: Couldn't grab dm_config. Aborting rootfs hash calculation." 215 # Run the verity tool on the rootfs partition. 229 # Re-calculate rootfs hash, update rootfs and kernel command line(s). 233 # The rootfs i [all...] |
/external/toolchain-utils/ |
H A D | chromiumos_image_diff.py | 46 self.rootfs = '' 52 self.rootfs = '/tmp/{0}.rootfs'.format(mount_basename) 56 self.rootfs = tempfile.mkdtemp( 57 suffix='.rootfs', prefix='chromiumos_image_diff') 58 ## rootfs is like /tmp/tmpxyz012.rootfs. 59 match = re.match(r'^(.*)\.rootfs$', self.rootfs) 66 self.image, self.rootfs, sel [all...] |
/external/autotest/site_utils/lxc/ |
H A D | lxc_config_unittest.py | 106 self.rootfs = tempfile.mkdtemp() 116 utils.run('sudo rm -rf %s' % self.rootfs)
|
H A D | container.py | 141 # Path to the rootfs of the container. This will be initialized when 142 # property rootfs is retrieved. 264 def rootfs(self): member in class:Container 265 """Path to the rootfs of the container. 267 This property returns the path to the rootfs of the container, that is, 269 attribute lxc.rootfs from the config file of the container, e.g., 270 lxc.rootfs = /usr/local/autotest/containers/t4/rootfs 271 If the container is created with snapshot, the rootfs is a chain of 274 lxc.rootfs [all...] |
H A D | base_image.py | 164 rootfs_path = os.path.join(base_path, 'rootfs') 166 '-i "s|\(lxc\.rootfs[[:space:]]*=\).*$|\\1 {rootfs}|" ' 167 '"{config}"').format(rootfs=rootfs_path,
|
H A D | config.py | 231 tmp_append = os.path.join(self.container.rootfs,
|
/external/autotest/client/site_tests/security_Libcontainer/src/ |
H A D | libcontainer_target_unittest.cc | 68 base::FilePath rootfs; variable 70 temp_dir_.path(), FILE_PATH_LITERAL("rootfs"), &rootfs)); 81 container_ = container_new("containerUT", rootfs.value().c_str());
|
/external/kmod/testsuite/ |
H A D | testsuite.c | 248 const char *stamp = TESTSUITE_ROOTFS "../stamp-rootfs"; 249 const char *rootfs = t->config[TC_ROOTFS]; local 257 if (stat(rootfs, &rootfsst) != 0) { 258 ERR("could not stat %s\n - %m", rootfs); 263 ERR("rootfs %s is dirty, please run 'make rootfs' before runnning this test\n", 264 rootfs); 636 const char *rootfs = t->config[TC_ROOTFS] ? t->config[TC_ROOTFS] : ""; local 639 if (snprintf(dirname, sizeof(dirname), "%s/sys/module", rootfs) 641 ERR("rootfs pat [all...] |
/external/avb/test/ |
H A D | avbtool_unittest.cc | 425 std::vector<uint8_t> rootfs; local 426 rootfs.resize(rootfs_size); 431 rootfs[n] = uint8_t(n) & 0x03; 433 rootfs[n] = uint8_t(n); 437 base::FilePath rootfs_path = testdir_.Append("rootfs.bin"); 441 reinterpret_cast<const char*>(rootfs.data()), 442 rootfs.size()))); 497 // size than the original rootfs fails. Then resize to something 498 // larger than the original rootfs but smaller than the current 531 avb_sha256_update(&hasher_ctx, rootfs 877 std::vector<uint8_t> rootfs; local 1153 std::vector<uint8_t> rootfs; local [all...] |
H A D | avb_slot_verify_unittest.cc | 1490 std::vector<uint8_t> rootfs; local 1491 rootfs.resize(rootfs_size); 1493 rootfs[n] = uint8_t(n); 1494 base::FilePath rootfs_path = testdir_.Append("rootfs.bin"); 1498 reinterpret_cast<const char*>(rootfs.data()), 1499 rootfs.size()))); 1806 std::vector<uint8_t> rootfs; local 1807 rootfs.resize(rootfs_size); 1809 rootfs[n] = uint8_t(n); 1810 base::FilePath rootfs_path = testdir_.Append("rootfs [all...] |
/external/vboot_reference/utility/ |
H A D | vbutil_what_keys | 15 With the -v option, it will attempt to mount any rootfs partitions from disk 136 for pnum in $(cgpt find -n -t rootfs "$file" 2>/dev/null); do
|