| /openbmc/openbmc/meta-openembedded/meta-oe/recipes-graphics/xscreensaver/files/ |
| H A D | 0001-Tweak-app-defaults.patch | 3 Date: Sat, 16 Jul 2022 09:58:24 -0700 6 Upstream-Status: Inappropriate [OE-Specific] 7 Signed-off-by: Khem Raj <raj.khem@gmail.com> 8 --- 9 driver/XScreenSaver.ad.in | 259 +------------------------------------- 10 1 file changed, 6 insertions(+), 253 deletions(-) 12 --- a/driver/XScreenSaver.ad.in 14 @@ -29,7 +29,7 @@ 18 -*timeout: 0:10:00 23 @@ -38,7 +38,7 @@ [all …]
|
| /openbmc/openbmc/poky/meta/lib/oeqa/files/ |
| H A D | buildhistory_filelist2.txt | 1 drwxr-xr-x root root 4096 ./bin 2 lrwxrwxrwx root root 19 ./bin/ash -> /bin/busybox.nosuid 3 lrwxrwxrwx root root 25 ./bin/base64 -> /usr/bin/base64.coreutils 4 -rwxr-xr-x root root 1190872 ./bin/bash.bash 5 lrwxrwxrwx root root 14 ./bin/bash -> /bin/bash.bash 6 lrwxrwxrwx root root 14 ./bin/busybox -> busybox.nosuid 7 -rwxr-xr-x root root 613008 ./bin/busybox.nosuid 8 -rwsr-xr-x root root 59440 ./bin/busybox.suid 9 lrwxrwxrwx root root 18 ./bin/cat -> /bin/cat.coreutils 10 -rwxr-xr-x root root 47336 ./bin/cat.coreutils [all …]
|
| H A D | buildhistory_filelist1.txt | 1 drwxr-xr-x root root 4096 ./bin 2 lrwxrwxrwx root root 19 ./bin/ash -> /bin/busybox.nosuid 3 lrwxrwxrwx root root 25 ./bin/base64 -> /usr/bin/base64.coreutils 4 -rwxr-xr-x root root 1190872 ./bin/bash.bash 5 lrwxrwxrwx root root 14 ./bin/bash -> /bin/bash.bash 6 lrwxrwxrwx root root 14 ./bin/busybox -> busybox.nosuid 7 -rwxr-xr-x root root 613008 ./bin/busybox.nosuid 8 -rwsr-xr-x root root 59440 ./bin/busybox.suid 9 lrwxrwxrwx root root 18 ./bin/cat -> /bin/cat.coreutils 10 -rwxr-xr-x root root 47336 ./bin/cat.coreutils [all …]
|
| /openbmc/openbmc/poky/meta/files/ |
| H A D | fs-perms.txt | 23 # in mode, uid or gid, a "-" means don't change any existing values 25 # /usr/src 0755 root root false - - - 26 # /usr/share/man 0755 root root true 0644 root root 28 # Note: all standard config directories are automatically assigned "0755 root root false - - -" 31 ${mandir} 0755 root root true 0644 root root 32 ${infodir} 0755 root root true 0644 root root 33 ${docdir} 0755 root root true 0644 root root 34 ${datadir}/gtk-doc 0755 root root true 0644 root root 37 ${datadir}/locale 0755 root root true 0644 root root 40 ${includedir} 0755 root root true 0644 root root [all …]
|
| H A D | device_table-minimal.txt | 2 #/dev/mem c 640 0 0 1 1 0 0 - 11 /dev d 755 root root - - - - - 12 /dev/console c 662 root tty 5 1 - - - 13 /dev/fb0 c 600 root root 29 0 - - - 14 /dev/hda b 660 root disk 3 0 - - - 15 /dev/hda b 660 root disk 3 1 1 1 4 16 /dev/kmem c 640 root kmem 1 2 - - - 17 /dev/kmsg c 600 root root 1 11 - - - 18 /dev/mem c 640 root kmem 1 1 - - - 19 /dev/mmcblk0 b 660 root disk 179 0 - - - [all …]
|
| H A D | fs-perms-volatile-tmp.txt | 23 # in mode, uid or gid, a "-" means don't change any existing values 25 # /usr/src 0755 root root false - - - 26 # /usr/share/man 0755 root root true 0644 root root 28 # Note: all standard config directories are automatically assigned "0755 root root false - - -" 32 # Items from base-files 36 # Special permissions from base-files 38 ${localstatedir}/volatile/tmp 01777 root root false - - -
|
| H A D | fs-perms-volatile-log.txt | 23 # in mode, uid or gid, a "-" means don't change any existing values 25 # /usr/src 0755 root root false - - - 26 # /usr/share/man 0755 root root true 0644 root root 28 # Note: all standard config directories are automatically assigned "0755 root root false - - -" 32 # Items from base-files
|
| /openbmc/qemu/scripts/ |
| H A D | xml-preprocess-test.py | 5 # SPDX-License-Identifier: MIT 6 """Unit tests for xml-preprocess""" 17 xmlpp = importlib.import_module("xml-preprocess") 21 """Tests for xml-preprocess.Preprocessor""" 25 temp_file.write("<root></root>") 28 self.assertEqual(result, "<root></root>") 34 xmlpp.save_xml("<root></root>", temp_file_name) 52 xml_str = "<root>$(env.TEST_ENV_VAR)</root>" 53 expected = "<root>TestValue</root>" 60 xml_str = "<root>$(sys.ARCH)</root>" [all …]
|
| /openbmc/qemu/tests/unit/ |
| H A D | test-interval-tree.c | 5 * See the COPYING.LIB file in the top-level directory. 10 #include "qemu/interval-tree.h" 13 static IntervalTreeRoot root; variable 19 if (last - start > INT32_MAX) { in rand_interval() 22 l_max = last - start; in rand_interval() 27 n->start = start + s_ofs; in rand_interval() 28 n->last = start + l_ofs; in rand_interval() 33 g_assert(root.rb_root.rb_node == NULL); in test_empty() 34 g_assert(root.rb_leftmost == NULL); in test_empty() 35 g_assert(interval_tree_iter_first(&root, 0, UINT64_MAX) == NULL); in test_empty() [all …]
|
| /openbmc/qemu/hw/pci-host/ |
| H A D | designware.c | 29 #include "hw/qdev-properties.h" 32 #include "hw/pci-host/designware.h" 64 * Designware has only a single root complex. Enforce the limit on the in designware_pcie_root_bus_class_init() 67 k->max_dev = 1; in designware_pcie_root_bus_class_init() 71 designware_pcie_root_to_host(DesignwarePCIERoot *root) in designware_pcie_root_to_host() argument 73 BusState *bus = qdev_get_parent_bus(DEVICE(root)); in designware_pcie_root_to_host() 74 return DESIGNWARE_PCIE_HOST(bus->parent); in designware_pcie_root_to_host() 85 * AHB/AXI bus like any other PCI-device-initiated DMA read. in designware_pcie_root_msi_read() 87 * well-behaved guests won't ever ask a PCI device to DMA from in designware_pcie_root_msi_read() 97 DesignwarePCIERoot *root = DESIGNWARE_PCIE_ROOT(opaque); in designware_pcie_root_msi_write() local [all …]
|
| /openbmc/openbmc/meta-openembedded/meta-oe/recipes-devtools/systemd/systemd-systemctl/ |
| H A D | systemctl | 18 ROOT = Path("/") variable 28 def __init__(self, root, path): argument 30 self._parse(root, path) 33 for path2 in sorted((root / location / "system" / dirname).glob("*.conf")): 34 self._parse(root, path2) 36 def _parse(self, root, path): argument 52 # broken symlink, try relative to root 53 path = root / Path(os.readlink(str(path))).relative_to(ROOT) 98 def __init__(self, scope, root): argument 100 self._collect_presets(scope, root) [all …]
|
| /openbmc/openbmc/meta-security/recipes-ids/ossec/files/ |
| H A D | 0002-Makefile-don-t-set-uid-gid.patch | 6 Upstream-Status: Inappropriate [embedded specific] 8 Signed-off-by: Armin Kuster <akuster808@gmail.com> 9 --- 10 src/Makefile | 166 +++++++++++++++++++++++++-------------------------- 11 1 file changed, 83 insertions(+), 83 deletions(-) 13 diff --git a/src/Makefile b/src/Makefile 15 --- a/src/Makefile 17 @@ -21,7 +21,7 @@ OSSEC_USER?=ossec 21 -INSTALL_CMD?=install -m $(1) -o $(2) -g $(3) 22 +INSTALL_CMD?=install -m $(1) [all …]
|
| /openbmc/qemu/include/qemu/ |
| H A D | interval-tree.h | 1 /* SPDX-License-Identifier: GPL-2.0-or-later */ 12 * For now, don't expose Linux Red-Black Trees separately, but retain the 47 * @root: root of the tree. 51 static inline bool interval_tree_is_empty(const IntervalTreeRoot *root) in interval_tree_is_empty() argument 53 return root->rb_root.rb_node == NULL; in interval_tree_is_empty() 59 * @root: root of the tree. 61 * Insert @node into @root, and rebalance. 63 void interval_tree_insert(IntervalTreeNode *node, IntervalTreeRoot *root); 68 * @root: root of the tree. 70 * Remove @node from @root, and rebalance. [all …]
|
| /openbmc/qemu/docs/ |
| H A D | pcie.txt | 25 QEMU does not have a clear socket-device matching mechanism 34 PCI Express devices should be plugged only into PCI Express Root Ports and 37 2.1 Root Bus (pcie.0) 39 Place only the following kinds of devices directly on the Root Complex: 42 the Root Complex. These will be considered Integrated Endpoints. 43 Note: Integrated Endpoints are not hot-pluggable. 47 devices with the Root Complex. Guest OSes are suspected to behave 49 with the Root Complex. 51 (2) PCI Express Root Ports (pcie-root-port), for starting exclusively 54 (3) PCI Express to PCI Bridge (pcie-pci-bridge), for starting legacy PCI [all …]
|
| /openbmc/openbmc/poky/meta/recipes-core/initscripts/initscripts-1.0/ |
| H A D | volatiles | 14 # l root root 0777 /var/test /tmp/testfile 15 # f root root 0644 /var/test none 18 # When populate-volatile is to verify/create a directory or file, it will first 26 d root root 1777 /run/lock none 27 d root root 0755 /var/volatile/log none 28 d root root 1777 /var/volatile/tmp none 29 l root root 1777 /var/lock /run/lock 30 l root root 0755 /var/run /run 31 l root root 1777 /var/tmp /var/volatile/tmp 32 l root root 1777 /tmp /var/tmp [all …]
|
| /openbmc/openbmc/poky/meta/recipes-connectivity/bind/bind/ |
| H A D | conf.patch | 6 Upstream-Status: Inappropriate [configuration] 10 11/30/2010 - Qing He <qing.he@intel.com> 11 --- 17 conf/db.root | 45 ++++++++++++++++++++++++++ 29 create mode 100644 conf/db.root 36 diff --git a/conf/db.0 b/conf/db.0 39 --- /dev/null 41 @@ -0,0 +1,12 @@ 46 +@ IN SOA localhost. root.localhost. ( 54 diff --git a/conf/db.127 b/conf/db.127 [all …]
|
| /openbmc/openbmc/poky/documentation/dev-manual/ |
| H A D | read-only-rootfs.rst | 1 .. SPDX-License-Identifier: CC-BY-SA-2.0-UK 3 Creating a Read-Only Root Filesystem 7 root filesystem's write permissions (i.e. you need a read-only root 9 from a read-only storage device. For either case, you can customize your 14 Supporting a read-only root filesystem requires that the system and 15 applications do not try to write to the root filesystem. You must 17 gracefully fail in the event of attempting to write to the root 20 Creating the Root Filesystem 23 To create the read-only root filesystem, simply add the 24 "read-only-rootfs" feature to your image, normally in one of two ways. [all …]
|
| /openbmc/openbmc/poky/meta/lib/oe/ |
| H A D | cachedpath.py | 4 # SPDX-License-Identifier: GPL-2.0-only 114 # WARNING - this is not currently a drop in replacement since they return False 119 # WARNING - this is not currently a drop in replacement since they return False 157 def __is_path_below(self, file, root): argument 158 return (file + os.path.sep).startswith(root) 160 def __realpath_rel(self, start, rel_path, root, loop_cnt, assume_dir): argument 162 'root'; no part of 'start' below 'root' must contain symlinks. """ 170 if len(start) >= len(root): 171 # do not follow '..' before root 178 root, loop_cnt, assume_dir) [all …]
|
| H A D | path.py | 4 # SPDX-License-Identifier: GPL-2.0-only 54 depth -= 1 95 …cmd = "tar --xattrs --xattrs-include='*' -cf - -S -C %s -p . | tar --xattrs --xattrs-include='*' -… 106 for root, dirs, files in os.walk(src): 108 testfile = os.path.join(root, files[0]) 122 …nd . -type d -print | tar --xattrs --xattrs-include='*' -cf - -S -C %s -p --no-recursion --files-f… 134 cmd = 'cp -afl --preserve=xattr %s %s' % (source, os.path.realpath(dst)) 149 Equivalent to rm -f or rm -rf 151 wildcards in them (as opposed to passing an actual wildcarded path) - 182 for root, dirs, files in os.walk(dir, **walkoptions): [all …]
|
| /openbmc/openbmc/meta-openembedded/meta-oe/recipes-kernel/oprofile/oprofile/ |
| H A D | 0010-oprofile-Determine-the-root-home-directory-dynamical.patch | 3 Date: Thu, 18 Mar 2021 01:02:49 -0700 4 Subject: [PATCH 10/10] oprofile: Determine the root home directory dynamically 6 This commit detects the root home directory dynamically with changes to 10 'non-standard' root home directory at build time. The advantage of this 11 patch is that the oprofile tools are adjusted to the current run-time 12 path to ~root, not the build time path. 14 Upstream-Status: Inappropriate [OE specific] 16 Signed-off-by: Dave Lerner <dave.lerner@windriver.com> 17 --- 18 doc/oprofile.xml | 4 ++-- [all …]
|
| /openbmc/openbmc/meta-openembedded/meta-initramfs/recipes-devtools/dracut/dracut/ |
| H A D | 0001-fix-broken-symlink-in-dracut-config-examples.patch | 9 root@qemux86-64:~# ls /usr/lib/dracut/dracut.conf.d/test* -ahl 10 lrwxrwxrwx 1 root root 27 Apr 5 2011 /usr/lib/dracut/dracut.conf.d/test -> ../test/dracut.conf.d/… 11 lrwxrwxrwx 1 root root 36 Apr 5 2011 /usr/lib/dracut/dracut.conf.d/test-makeroot -> ../test/dracu… 12 lrwxrwxrwx 1 root root 31 Apr 5 2011 /usr/lib/dracut/dracut.conf.d/test-root -> ../test/dracut.co… 13 root@qemux86-64:~# realpath /usr/lib/dracut/dracut.conf.d/test* 15 realpath: /usr/lib/dracut/dracut.conf.d/test-makeroot: No such file or directory 16 realpath: /usr/lib/dracut/dracut.conf.d/test-root: No such file or directory 21 [1] https://github.com/dracut-ng/dracut-ng/commit/0d369e3e30935dffe48dfff1e90463868e7f804a 23 Upstream-Status: Submitted [https://github.com/dracut-ng/dracut-ng/pull/1344] 25 Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com> [all …]
|
| /openbmc/hiomapd/vpnor/test/ |
| H A D | tmpd.hpp | 1 /* SPDX-License-Identifier: Apache-2.0 */ 37 root = fs::path{tmpdir}; in VpnorRoot() 41 fs::create_directory(root / attr); in VpnorRoot() 44 fs::path tocFilePath = root / "ro" / PARTITION_TOC_FILE; in VpnorRoot() 54 fs::path partitionFilePath = root / "ro" / part.data.name; in VpnorRoot() 64 snprintf(paths.ro_loc, PATH_MAX - 1, "%s/ro", root.c_str()); in VpnorRoot() 65 paths.ro_loc[PATH_MAX - 1] = '\0'; in VpnorRoot() 66 snprintf(paths.rw_loc, PATH_MAX - 1, "%s/rw", root.c_str()); in VpnorRoot() 67 paths.rw_loc[PATH_MAX - 1] = '\0'; in VpnorRoot() 68 snprintf(paths.prsv_loc, PATH_MAX - 1, "%s/prsv", root.c_str()); in VpnorRoot() [all …]
|
| /openbmc/openbmc/meta-openembedded/meta-oe/recipes-devtools/iptraf/iptraf-ng/ |
| H A D | iptraf-ng-tmpfiles.conf | 1 d /run/iptraf-ng 0755 root root - 2 d /var/log/iptraf-ng 0755 root root - 3 d /var/lib/iptraf-ng 0755 root root -
|
| /openbmc/u-boot/fs/btrfs/ |
| H A D | btrfs.c | 1 // SPDX-License-Identifier: GPL-2.0+ 3 * BTRFS filesystem implementation for U-Boot 15 static int readdir_callback(const struct btrfs_root *root, in readdir_callback() argument 34 if (btrfs_lookup_inode(root, &item->location, &inode, NULL)) { in readdir_callback() 36 __func__, item->name_len, name); in readdir_callback() 43 if (item->type == BTRFS_FT_SYMLINK) { in readdir_callback() 47 if (target && btrfs_readlink(root, item->location.objectid, in readdir_callback() 57 printf("<%s> ", typestr[item->type]); in readdir_callback() 58 if (item->type == BTRFS_FT_CHRDEV || item->type == BTRFS_FT_BLKDEV) in readdir_callback() 64 printf("%24.24s %.*s", filetime, item->name_len, name); in readdir_callback() [all …]
|
| /openbmc/openbmc-test-automation/openpower/ext_interfaces/ |
| H A D | test_vmicert_management.robot | 51 Get Root Certificate Using Different Privilege Users Role 52 [Documentation] Get root certificate using different users. 54 [Template] Get Root Certificate 57 # Request root certificate from admin user. 60 # Request root certificate from operator user. 63 # Request root certificate from ReadOnly user. 66 # Request root certificate from NoAccess user. 109 Get Root Certificate When VMI Is Off And Verify 110 [Documentation] Get root certificate when vmi is off and verify. 115 [Template] Get Root Certificate [all …]
|