ce6500893f
Using partial executable paths in the board inspector may cause unintended results when another executable has the same name and is also detectable in the search paths. Introduce a wrapper module (`external_tools`) which locates executables only under system paths such as /usr/bin and /usr/sbin and converts partial executable paths to absolute ones before executing them via the subprocess module. All invocations to `subprocess.run` or `subprocess.Popen` throughout the board inspector are replaced with `external_tools.run`, with the only exception being the invocation to the legacy board parser which already uses an absolute path to the current Python interpreter. Tracked-On: #8315 Signed-off-by: Junjie Mao <junjie.mao@intel.com> |
||
---|---|---|
.. | ||
config_tools | ||
debug_tools | ||
efi-stub | ||
hv_prebuild | ||
packaging | ||
sample_application | ||
services | ||
Makefile | ||
README.rst |
README.rst
ACRN Tools ########## The open source `Project ACRN`_ defines a device hypervisor reference stack and an architecture for running multiple software subsystems, managed securely, on a consolidated system by means of a virtual machine manager. It also defines a reference framework implementation for virtual device emulation, called the "ACRN Device Model". This folder holds the source to a number of tools that facilitate the management, debugging, profiling, and logging of multi-OS systems based on ACRN. You can find out more about Project ACRN and its set of tools on the `Project ACRN documentation`_ website. .. _`Project ACRN`: https://projectacrn.org .. _`Project ACRN documentation`: https://projectacrn.github.io/