Displaying 7 results from an estimated 7 matches for "flask_en".
Did you mean:
flask_op
2008 Sep 03
0
Xen 3.3 and ACM Security Errors
...rity_policy.xml'' not found." I
tried to find some documentation on what this is but I coming up with
nothing.
I checked Config.mk file and the following options that seem relevant
are set:
# Enable XSM security module. Enabling XSM requires selection of an
# XSM security module (FLASK_ENABLE or ACM_SECURITY).
XSM_ENABLE ?= n
FLASK_ENABLE ?= n
ACM_SECURITY ?= n
After the install completed, there was not a /etc/xen/acm-security
directory or xensec programs.
I tried creating the /etc/xen/acm-security/policies directory and copied
the client_v1-security-policy.xml from the
source/t...
2011 Sep 14
1
[PATCH] xen/xsm: Compile error due to naming clash between XSM and EFI runtime
While compiling XEN with XSM_ENABLE=y and FLASK_ENABLE=y, I received the following error.
gcc -O1 -fno-omit-frame-pointer -m64 -g -fno-strict-aliasing -std=gnu99 -Wall -Wstrict-prototypes -Wno-unused-value -Wdeclaration-after-statement -Wno-unused-but-set-variable -fno-builtin -fno-common -Wredundant-decls -iwithprefix include -Werror -Wno-pointe...
2007 Dec 03
8
xm create - Xend has probably crashed! Invalid or missing HTTP status code.
Hi,
I have compiled xen-unstable (using hg clone
http://xenbits.xensource.com/xen-unstable.hg).
I have successfully booted into the dom0 kernel.
output of xm list:
Name ID Mem VCPUs State
Time(s)
Domain-0 0 932 1 r----- 591.2
But whenever I xm create, I get:
# xm create /etc/xen/domu1
Using config file
2007 Sep 25
4
[XSM:ACM] When cw is used, dom0 reboots.
Hi ,
When cw is used, dom0 reboots.
Though I set quest memory size.
I want to study into the cause.
Please teach how to examine it.
#xm create vm1.conf <-- OK
#xm create vm4.conf <-- NO
................... <-- system boot
#last
root pts/1 myPC Tue Sep 25 11:25 - crash (09:01)
reboot system boot 2.6.18-xen Tue Sep 25 20:06 (-8:-16)
~~~~~~~~~~~
2012 Jan 15
2
[PATCH v3] libxl: add support for yajl 2.x
..._INCLUDES="$(CHECK_INCLUDES)"; \
+ . $(XEN_ROOT)/tools/check/funcs.sh; \
+ has_header yajl/yajl_version.h && echo ''y'' || echo ''n'')
+
# Enable XSM security module (by default, Flask).
XSM_ENABLE ?= n
FLASK_ENABLE ?= $(XSM_ENABLE)
diff -r cd47dde439e6 -r a1986ef30b7d tools/check/check_yajl_lib
--- a/tools/check/check_yajl_lib Sat Jan 14 19:04:48 2012 +0100
+++ /dev/null Thu Jan 01 00:00:00 1970 +0000
@@ -1,6 +0,0 @@
-#!/bin/sh
-# CHECK-BUILD CHECK-INSTALL
-
-. ./funcs.sh
-
-has_lib libyajl.so.1 || fail &...
2012 Jan 31
26
[PATCH 00/10] FLASK updates: MSI interrupts, cleanups
This patch set adds XSM security labels to useful debugging output
locations, and fixes some assumptions that all interrupts behaved like
GSI interrupts (which had useful non-dynamic IDs). It also cleans up the
policy build process and adds an example of how to use the user field in
the security context.
Debug output:
[PATCH 01/10] xsm: Add security labels to event-channel dump
[PATCH 02/10] xsm:
2011 Dec 20
26
[PATCH v2] libxl: add support for yajl 2.x
..._INCLUDES="$(CHECK_INCLUDES)"; \
+ . $(XEN_ROOT)/tools/check/funcs.sh; \
+ has_header yajl/yajl_version.h && echo ''y'' || echo ''n'')
+
# Enable XSM security module (by default, Flask).
XSM_ENABLE ?= n
FLASK_ENABLE ?= $(XSM_ENABLE)
diff -r f72b99fccfca -r 716d6d48e647 tools/check/check_yajl_lib
--- a/tools/check/check_yajl_lib Tue Dec 20 08:31:40 2011 +0100
+++ /dev/null Thu Jan 01 00:00:00 1970 +0000
@@ -1,6 +0,0 @@
-#!/bin/sh
-# CHECK-BUILD CHECK-INSTALL
-
-. ./funcs.sh
-
-has_lib libyajl.so.1 || fail &...