Home
last modified time | relevance | path

Searched +full:- +full:- +full:root (Results 1 – 25 of 1029) sorted by relevance

12345678910>>...42

/openbmc/openbmc/meta-openembedded/meta-oe/recipes-graphics/xscreensaver/files/
H A D0001-Tweak-app-defaults.patch3 Date: Sat, 16 Jul 2022 09:58:24 -0700
6 Upstream-Status: Inappropriate [OE-Specific]
7 Signed-off-by: Khem Raj <raj.khem@gmail.com>
8 ---
9 driver/XScreenSaver.ad.in | 259 +-------------------------------------
10 1 file changed, 6 insertions(+), 253 deletions(-)
12 --- a/driver/XScreenSaver.ad.in
14 @@ -29,7 +29,7 @@
18 -*timeout: 0:10:00
23 @@ -38,7 +38,7 @@
[all …]
/openbmc/openbmc/poky/meta/lib/oeqa/files/
H A Dbuildhistory_filelist2.txt1 drwxr-xr-x root root 4096 ./bin
2 lrwxrwxrwx root root 19 ./bin/ash -> /bin/busybox.nosuid
3 lrwxrwxrwx root root 25 ./bin/base64 -> /usr/bin/base64.coreutils
4 -rwxr-xr-x root root 1190872 ./bin/bash.bash
5 lrwxrwxrwx root root 14 ./bin/bash -> /bin/bash.bash
6 lrwxrwxrwx root root 14 ./bin/busybox -> busybox.nosuid
7 -rwxr-xr-x root root 613008 ./bin/busybox.nosuid
8 -rwsr-xr-x root root 59440 ./bin/busybox.suid
9 lrwxrwxrwx root root 18 ./bin/cat -> /bin/cat.coreutils
10 -rwxr-xr-x root root 47336 ./bin/cat.coreutils
[all …]
H A Dbuildhistory_filelist1.txt1 drwxr-xr-x root root 4096 ./bin
2 lrwxrwxrwx root root 19 ./bin/ash -> /bin/busybox.nosuid
3 lrwxrwxrwx root root 25 ./bin/base64 -> /usr/bin/base64.coreutils
4 -rwxr-xr-x root root 1190872 ./bin/bash.bash
5 lrwxrwxrwx root root 14 ./bin/bash -> /bin/bash.bash
6 lrwxrwxrwx root root 14 ./bin/busybox -> busybox.nosuid
7 -rwxr-xr-x root root 613008 ./bin/busybox.nosuid
8 -rwsr-xr-x root root 59440 ./bin/busybox.suid
9 lrwxrwxrwx root root 18 ./bin/cat -> /bin/cat.coreutils
10 -rwxr-xr-x root root 47336 ./bin/cat.coreutils
[all …]
/openbmc/openbmc/poky/meta/files/
H A Dfs-perms.txt23 # in mode, uid or gid, a "-" means don't change any existing values
25 # /usr/src 0755 root root false - - -
26 # /usr/share/man 0755 root root true 0644 root root
28 # Note: all standard config directories are automatically assigned "0755 root root false - - -"
31 ${mandir} 0755 root root true 0644 root root
32 ${infodir} 0755 root root true 0644 root root
33 ${docdir} 0755 root root true 0644 root root
34 ${datadir}/gtk-doc 0755 root root true 0644 root root
37 ${datadir}/locale 0755 root root true 0644 root root
40 ${includedir} 0755 root root true 0644 root root
[all …]
H A Ddevice_table-minimal.txt2 #/dev/mem c 640 0 0 1 1 0 0 -
11 /dev d 755 root root - - - - -
12 /dev/console c 662 root tty 5 1 - - -
13 /dev/fb0 c 600 root root 29 0 - - -
14 /dev/hda b 660 root disk 3 0 - - -
15 /dev/hda b 660 root disk 3 1 1 1 4
16 /dev/kmem c 640 root kmem 1 2 - - -
17 /dev/kmsg c 600 root root 1 11 - - -
18 /dev/mem c 640 root kmem 1 1 - - -
19 /dev/mmcblk0 b 660 root disk 179 0 - - -
[all …]
H A Dfs-perms-volatile-tmp.txt23 # in mode, uid or gid, a "-" means don't change any existing values
25 # /usr/src 0755 root root false - - -
26 # /usr/share/man 0755 root root true 0644 root root
28 # Note: all standard config directories are automatically assigned "0755 root root false - - -"
32 # Items from base-files
36 # Special permissions from base-files
38 ${localstatedir}/volatile/tmp 01777 root root false - - -
H A Dfs-perms-volatile-log.txt23 # in mode, uid or gid, a "-" means don't change any existing values
25 # /usr/src 0755 root root false - - -
26 # /usr/share/man 0755 root root true 0644 root root
28 # Note: all standard config directories are automatically assigned "0755 root root false - - -"
32 # Items from base-files
/openbmc/qemu/scripts/
H A Dxml-preprocess-test.py5 # SPDX-License-Identifier: MIT
6 """Unit tests for xml-preprocess"""
17 xmlpp = importlib.import_module("xml-preprocess")
21 """Tests for xml-preprocess.Preprocessor"""
25 temp_file.write("<root></root>")
28 self.assertEqual(result, "<root></root>")
34 xmlpp.save_xml("<root></root>", temp_file_name)
52 xml_str = "<root>$(env.TEST_ENV_VAR)</root>"
53 expected = "<root>TestValue</root>"
60 xml_str = "<root>$(sys.ARCH)</root>"
[all …]
/openbmc/qemu/tests/unit/
H A Dtest-interval-tree.c5 * See the COPYING.LIB file in the top-level directory.
10 #include "qemu/interval-tree.h"
13 static IntervalTreeRoot root; variable
19 if (last - start > INT32_MAX) { in rand_interval()
22 l_max = last - start; in rand_interval()
27 n->start = start + s_ofs; in rand_interval()
28 n->last = start + l_ofs; in rand_interval()
33 g_assert(root.rb_root.rb_node == NULL); in test_empty()
34 g_assert(root.rb_leftmost == NULL); in test_empty()
35 g_assert(interval_tree_iter_first(&root, 0, UINT64_MAX) == NULL); in test_empty()
[all …]
/openbmc/qemu/hw/pci-host/
H A Ddesignware.c29 #include "hw/qdev-properties.h"
32 #include "hw/pci-host/designware.h"
64 * Designware has only a single root complex. Enforce the limit on the in designware_pcie_root_bus_class_init()
67 k->max_dev = 1; in designware_pcie_root_bus_class_init()
71 designware_pcie_root_to_host(DesignwarePCIERoot *root) in designware_pcie_root_to_host() argument
73 BusState *bus = qdev_get_parent_bus(DEVICE(root)); in designware_pcie_root_to_host()
74 return DESIGNWARE_PCIE_HOST(bus->parent); in designware_pcie_root_to_host()
85 * AHB/AXI bus like any other PCI-device-initiated DMA read. in designware_pcie_root_msi_read()
87 * well-behaved guests won't ever ask a PCI device to DMA from in designware_pcie_root_msi_read()
97 DesignwarePCIERoot *root = DESIGNWARE_PCIE_ROOT(opaque); in designware_pcie_root_msi_write() local
[all …]
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-devtools/systemd/systemd-systemctl/
H A Dsystemctl18 ROOT = Path("/") variable
28 def __init__(self, root, path): argument
30 self._parse(root, path)
33 for path2 in sorted((root / location / "system" / dirname).glob("*.conf")):
34 self._parse(root, path2)
36 def _parse(self, root, path): argument
52 # broken symlink, try relative to root
53 path = root / Path(os.readlink(str(path))).relative_to(ROOT)
98 def __init__(self, scope, root): argument
100 self._collect_presets(scope, root)
[all …]
/openbmc/openbmc/meta-security/recipes-ids/ossec/files/
H A D0002-Makefile-don-t-set-uid-gid.patch6 Upstream-Status: Inappropriate [embedded specific]
8 Signed-off-by: Armin Kuster <akuster808@gmail.com>
9 ---
10 src/Makefile | 166 +++++++++++++++++++++++++--------------------------
11 1 file changed, 83 insertions(+), 83 deletions(-)
13 diff --git a/src/Makefile b/src/Makefile
15 --- a/src/Makefile
17 @@ -21,7 +21,7 @@ OSSEC_USER?=ossec
21 -INSTALL_CMD?=install -m $(1) -o $(2) -g $(3)
22 +INSTALL_CMD?=install -m $(1)
[all …]
/openbmc/qemu/include/qemu/
H A Dinterval-tree.h1 /* SPDX-License-Identifier: GPL-2.0-or-later */
12 * For now, don't expose Linux Red-Black Trees separately, but retain the
47 * @root: root of the tree.
51 static inline bool interval_tree_is_empty(const IntervalTreeRoot *root) in interval_tree_is_empty() argument
53 return root->rb_root.rb_node == NULL; in interval_tree_is_empty()
59 * @root: root of the tree.
61 * Insert @node into @root, and rebalance.
63 void interval_tree_insert(IntervalTreeNode *node, IntervalTreeRoot *root);
68 * @root: root of the tree.
70 * Remove @node from @root, and rebalance.
[all …]
/openbmc/qemu/docs/
H A Dpcie.txt25 QEMU does not have a clear socket-device matching mechanism
34 PCI Express devices should be plugged only into PCI Express Root Ports and
37 2.1 Root Bus (pcie.0)
39 Place only the following kinds of devices directly on the Root Complex:
42 the Root Complex. These will be considered Integrated Endpoints.
43 Note: Integrated Endpoints are not hot-pluggable.
47 devices with the Root Complex. Guest OSes are suspected to behave
49 with the Root Complex.
51 (2) PCI Express Root Ports (pcie-root-port), for starting exclusively
54 (3) PCI Express to PCI Bridge (pcie-pci-bridge), for starting legacy PCI
[all …]
/openbmc/openbmc/poky/meta/recipes-core/initscripts/initscripts-1.0/
H A Dvolatiles14 # l root root 0777 /var/test /tmp/testfile
15 # f root root 0644 /var/test none
18 # When populate-volatile is to verify/create a directory or file, it will first
26 d root root 1777 /run/lock none
27 d root root 0755 /var/volatile/log none
28 d root root 1777 /var/volatile/tmp none
29 l root root 1777 /var/lock /run/lock
30 l root root 0755 /var/run /run
31 l root root 1777 /var/tmp /var/volatile/tmp
32 l root root 1777 /tmp /var/tmp
[all …]
/openbmc/openbmc/poky/meta/recipes-connectivity/bind/bind/
H A Dconf.patch6 Upstream-Status: Inappropriate [configuration]
10 11/30/2010 - Qing He <qing.he@intel.com>
11 ---
17 conf/db.root | 45 ++++++++++++++++++++++++++
29 create mode 100644 conf/db.root
36 diff --git a/conf/db.0 b/conf/db.0
39 --- /dev/null
41 @@ -0,0 +1,12 @@
46 +@ IN SOA localhost. root.localhost. (
54 diff --git a/conf/db.127 b/conf/db.127
[all …]
/openbmc/openbmc/poky/documentation/dev-manual/
H A Dread-only-rootfs.rst1 .. SPDX-License-Identifier: CC-BY-SA-2.0-UK
3 Creating a Read-Only Root Filesystem
7 root filesystem's write permissions (i.e. you need a read-only root
9 from a read-only storage device. For either case, you can customize your
14 Supporting a read-only root filesystem requires that the system and
15 applications do not try to write to the root filesystem. You must
17 gracefully fail in the event of attempting to write to the root
20 Creating the Root Filesystem
23 To create the read-only root filesystem, simply add the
24 "read-only-rootfs" feature to your image, normally in one of two ways.
[all …]
/openbmc/openbmc/poky/meta/lib/oe/
H A Dcachedpath.py4 # SPDX-License-Identifier: GPL-2.0-only
114 # WARNING - this is not currently a drop in replacement since they return False
119 # WARNING - this is not currently a drop in replacement since they return False
157 def __is_path_below(self, file, root): argument
158 return (file + os.path.sep).startswith(root)
160 def __realpath_rel(self, start, rel_path, root, loop_cnt, assume_dir): argument
162 'root'; no part of 'start' below 'root' must contain symlinks. """
170 if len(start) >= len(root):
171 # do not follow '..' before root
178 root, loop_cnt, assume_dir)
[all …]
H A Dpath.py4 # SPDX-License-Identifier: GPL-2.0-only
54 depth -= 1
95 …cmd = "tar --xattrs --xattrs-include='*' -cf - -S -C %s -p . | tar --xattrs --xattrs-include='*' -
106 for root, dirs, files in os.walk(src):
108 testfile = os.path.join(root, files[0])
122 …nd . -type d -print | tar --xattrs --xattrs-include='*' -cf - -S -C %s -p --no-recursion --files-f…
134 cmd = 'cp -afl --preserve=xattr %s %s' % (source, os.path.realpath(dst))
149 Equivalent to rm -f or rm -rf
151 wildcards in them (as opposed to passing an actual wildcarded path) -
182 for root, dirs, files in os.walk(dir, **walkoptions):
[all …]
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-kernel/oprofile/oprofile/
H A D0010-oprofile-Determine-the-root-home-directory-dynamical.patch3 Date: Thu, 18 Mar 2021 01:02:49 -0700
4 Subject: [PATCH 10/10] oprofile: Determine the root home directory dynamically
6 This commit detects the root home directory dynamically with changes to
10 'non-standard' root home directory at build time. The advantage of this
11 patch is that the oprofile tools are adjusted to the current run-time
12 path to ~root, not the build time path.
14 Upstream-Status: Inappropriate [OE specific]
16 Signed-off-by: Dave Lerner <dave.lerner@windriver.com>
17 ---
18 doc/oprofile.xml | 4 ++--
[all …]
/openbmc/openbmc/meta-openembedded/meta-initramfs/recipes-devtools/dracut/dracut/
H A D0001-fix-broken-symlink-in-dracut-config-examples.patch9 root@qemux86-64:~# ls /usr/lib/dracut/dracut.conf.d/test* -ahl
10 lrwxrwxrwx 1 root root 27 Apr 5 2011 /usr/lib/dracut/dracut.conf.d/test -> ../test/dracut.conf.d/…
11 lrwxrwxrwx 1 root root 36 Apr 5 2011 /usr/lib/dracut/dracut.conf.d/test-makeroot -> ../test/dracu…
12 lrwxrwxrwx 1 root root 31 Apr 5 2011 /usr/lib/dracut/dracut.conf.d/test-root -> ../test/dracut.co…
13 root@qemux86-64:~# realpath /usr/lib/dracut/dracut.conf.d/test*
15 realpath: /usr/lib/dracut/dracut.conf.d/test-makeroot: No such file or directory
16 realpath: /usr/lib/dracut/dracut.conf.d/test-root: No such file or directory
21 [1] https://github.com/dracut-ng/dracut-ng/commit/0d369e3e30935dffe48dfff1e90463868e7f804a
23 Upstream-Status: Submitted [https://github.com/dracut-ng/dracut-ng/pull/1344]
25 Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com>
[all …]
/openbmc/hiomapd/vpnor/test/
H A Dtmpd.hpp1 /* SPDX-License-Identifier: Apache-2.0 */
37 root = fs::path{tmpdir}; in VpnorRoot()
41 fs::create_directory(root / attr); in VpnorRoot()
44 fs::path tocFilePath = root / "ro" / PARTITION_TOC_FILE; in VpnorRoot()
54 fs::path partitionFilePath = root / "ro" / part.data.name; in VpnorRoot()
64 snprintf(paths.ro_loc, PATH_MAX - 1, "%s/ro", root.c_str()); in VpnorRoot()
65 paths.ro_loc[PATH_MAX - 1] = '\0'; in VpnorRoot()
66 snprintf(paths.rw_loc, PATH_MAX - 1, "%s/rw", root.c_str()); in VpnorRoot()
67 paths.rw_loc[PATH_MAX - 1] = '\0'; in VpnorRoot()
68 snprintf(paths.prsv_loc, PATH_MAX - 1, "%s/prsv", root.c_str()); in VpnorRoot()
[all …]
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-devtools/iptraf/iptraf-ng/
H A Diptraf-ng-tmpfiles.conf1 d /run/iptraf-ng 0755 root root -
2 d /var/log/iptraf-ng 0755 root root -
3 d /var/lib/iptraf-ng 0755 root root -
/openbmc/u-boot/fs/btrfs/
H A Dbtrfs.c1 // SPDX-License-Identifier: GPL-2.0+
3 * BTRFS filesystem implementation for U-Boot
15 static int readdir_callback(const struct btrfs_root *root, in readdir_callback() argument
34 if (btrfs_lookup_inode(root, &item->location, &inode, NULL)) { in readdir_callback()
36 __func__, item->name_len, name); in readdir_callback()
43 if (item->type == BTRFS_FT_SYMLINK) { in readdir_callback()
47 if (target && btrfs_readlink(root, item->location.objectid, in readdir_callback()
57 printf("<%s> ", typestr[item->type]); in readdir_callback()
58 if (item->type == BTRFS_FT_CHRDEV || item->type == BTRFS_FT_BLKDEV) in readdir_callback()
64 printf("%24.24s %.*s", filetime, item->name_len, name); in readdir_callback()
[all …]
/openbmc/openbmc-test-automation/openpower/ext_interfaces/
H A Dtest_vmicert_management.robot51 Get Root Certificate Using Different Privilege Users Role
52 [Documentation] Get root certificate using different users.
54 [Template] Get Root Certificate
57 # Request root certificate from admin user.
60 # Request root certificate from operator user.
63 # Request root certificate from ReadOnly user.
66 # Request root certificate from NoAccess user.
109 Get Root Certificate When VMI Is Off And Verify
110 [Documentation] Get root certificate when vmi is off and verify.
115 [Template] Get Root Certificate
[all …]

12345678910>>...42