acrn-hypervisor/misc/config_tools/board_inspector/legacy
Junjie Mao ce6500893f board_inspector: use executables found under system paths
Using partial executable paths in the board inspector may cause unintended
results when another executable has the same name and is also detectable in
the search paths.

Introduce a wrapper module (`external_tools`) which locates executables
only under system paths such as /usr/bin and /usr/sbin and converts partial
executable paths to absolute ones before executing them via the subprocess
module. All invocations to `subprocess.run` or `subprocess.Popen`
throughout the board inspector are replaced with `external_tools.run`, with
the only exception being the invocation to the legacy board parser which
already uses an absolute path to the current Python interpreter.

Tracked-On: #8315
Signed-off-by: Junjie Mao <junjie.mao@intel.com>
2022-11-16 11:02:42 +08:00
..
acpi.py board_inspector: use executables found under system paths 2022-11-16 11:02:42 +08:00
board_parser.py board_inspector: use executables found under system paths 2022-11-16 11:02:42 +08:00
clos.py board_inspector: use executables found under system paths 2022-11-16 11:02:42 +08:00
dmar.py board_inspector: use executables found under system paths 2022-11-16 11:02:42 +08:00
dmi.py Update copyright year range in code headers 2022-07-15 11:48:35 +08:00
misc.py board_inspector: use executables found under system paths 2022-11-16 11:02:42 +08:00
parser_lib.py board_inspector: use executables found under system paths 2022-11-16 11:02:42 +08:00
pci_dev.py Update copyright year range in code headers 2022-07-15 11:48:35 +08:00