Displaying 20 results from an estimated 91 matches for "flasks".
Did you mean:
flask
2011 Dec 12
0
[PATCH] flask: add tools/flask/utils/flask-label-pci to .hgignore
I have just committed the patch below.
Ian.
# HG changeset patch
# User Ian Jackson <Ian.Jackson@eu.citrix.com>
# Date 1323712783 0
# Node ID 7ca56cca09ade16645fb4806be2c5b2b0bc3332b
# Parent 7e90178b8bbfd2f78e8f4c6d593a2fb233350f41
flask: add tools/flask/utils/flask-label-pci to .hgignore
This was apparently forgotten in 24353:448c48326d6b
Signed-off-by: Ian Jackson
2012 Jan 31
26
[PATCH 00/10] FLASK updates: MSI interrupts, cleanups
This patch set adds XSM security labels to useful debugging output
locations, and fixes some assumptions that all interrupts behaved like
GSI interrupts (which had useful non-dynamic IDs). It also cleans up the
policy build process and adds an example of how to use the user field in
the security context.
Debug output:
[PATCH 01/10] xsm: Add security labels to event-channel dump
[PATCH 02/10] xsm:
2013 Feb 13
4
[PATCH 0/3] FLASK policy build rework
These patches update the example FLASK policy shipped with Xen and
enable its build if the required tools are present. The third patch
requires rerunning autoconf to update tools/configure.
[PATCH 1/3] flask/policy: sort dom0 accesses
[PATCH 2/3] flask/policy: rework policy build system
[PATCH 3/3] tools/flask: add FLASK policy to build
2016 May 30
2
LNT General Failure
Renato, Kristof,
I confirm this is due to the latest Flask --- Flask-0.11 was released this weekend --- and for some unknown (to me at least) reason, although LNT's requirements.txt pins Flask to version 0.10.1, pip installs Flask-0.11. Forcing Flask to 0.10.1 gets the situation back to normal.
Reading pip's documentation makes me think it's not able to resolve dependencies
2008 Sep 12
3
[XSM][Patch] Minor XSM tools patch to dummy module - implement missing stub
- This minor patch implements the missing stub function
security_label_to_details in the dummy module. This stub function is
necessary to create domains with network interfaces for modules that do not
implement the security_label_to_details function.
Signed-off-by: George Coker <gscoker@alpha.ncsc.mil>
_______________________________________________
Xen-devel mailing list
2016 May 30
3
LNT General Failure
I honestly do not know how to fix that --- I would otherwise I've committed a fix.
I've been able to hack it locally exploiting the very same lit limitation then the one we're stumbling on (i.e it does not resolve dependency correctly and only pick-up the first constraint).
You need to make sure the Flask constraint is seen first, even before using the requirements.txt so on the
2015 May 10
2
[LLVMdev] http://llvm.org/perf/ instability: some clues
Daniel, Tobias, Renato and myself have been looking a little bit at the
potential underlying reason
for why http://llvm.org/perf/ is instable, and have found some clues. I want
to share them here
to give people with more experience in the frameworks used by LNT (flask,
sqlalchemy, wsgi, .)
a chance to check if our reasoning below seems plausible.
Daniel noticed the following backtrace in the
2016 May 30
0
LNT General Failure
Hi Renato,
We're also seeing this on internal bots.
My first guess is that it was triggered by the Flask package getting updated at Pypi on 29th of May, see https://pypi.python.org/pypi/Flask.
I haven't investigated further at this point.
Thanks,
Kristof
On 29 May 2016, at 14:28, Renato Golin <renato.golin at linaro.org<mailto:renato.golin at linaro.org>> wrote:
Folks,
2016 May 29
3
LNT General Failure
Folks,
Its seems that the latest master restart has introduced a failure in
*many* test-suite bots:
File "/home/buildslave/buildslave/clang-cmake-aarch64-full/test/lnt/lnt/server/ui/decorators.py",
line 6, in <module>
frontend = flask.Module(__name__)
AttributeError: 'module' object has no attribute 'Module'
2011 Nov 21
0
[PATCH] xsm/flask: fix resource list range checks
The FLASK security checks for resource ranges were not implemented
correctly - only the permissions on the endpoints of a range were
checked, instead of all items contained in the range. This would allow
certain resources (I/O ports, I/O memory) to be used by domains in
contravention to security policy.
This also corrects a bug where adding overlapping resource ranges did
not trigger an error.
2016 May 30
0
LNT General Failure
On 30 May 2016 at 12:25, Arnaud De Grandmaison
<Arnaud.DeGrandmaison at arm.com> wrote:
> I confirm this is due to the latest Flask --- Flask-0.11 was released this
> weekend --- and for some unknown (to me at least) reason, although LNT's
> requirements.txt pins Flask to version 0.10.1, pip installs Flask-0.11.
> Forcing Flask to 0.10.1 gets the situation back to normal.
Do
2008 Oct 07
0
[PATCH] [Flask] Add 2 permissions to the default flask policy to get a VIF-enabled guest to work
This adds two more permissions to the default Flask policy to get a VM
with a network interface to work.
Signed-off-by: Stefan Berger <stefanb@us.ibm.com>
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
http://lists.xensource.com/xen-devel
2009 Aug 14
0
[PATCH] xen/xsm/flask: Fix AVC audit message format
Fix formatting of Flask AVC audit messages so that existing
policy tools can parse them. After applying,
''xm dmesg | audit2allow'' yields the expected result.
Signed-off-by: Stephen D. Smalley <sds@tycho.nsa.gov>
Signed-off-by: George S. Coker, II <gscoker@alpha.ncsc.mil>
---
xen/xsm/flask/avc.c | 8 +++-----
1 file changed, 3 insertions(+), 5 deletions(-)
2012 Feb 08
0
[PATCH] remove references to removed libflask from setup.py
# HG changeset patch
# User Olaf Hering <olaf@aepfle.de>
# Date 1328707901 -3600
# Node ID b730f1f980bdc1edcebf7dbbbb5253ccafcd8c04
# Parent 3574f4d67843733ccaabab5f8ebb859c99d7314a
remove references to removed libflask from setup.py
Build in SLES11 SP1/2 fails after libflask removal.
> building ''flask'' extension
> error: ../../tools/flask/libflask/libflask.so: No
2011 Apr 15
3
[PATCHv3] libxl: Exposed Flask XSM functionality
Adds support for assigning a label to domains, obtaining and setting the
current enforcing mode, and loading a policy with xl command and libxl
header when the Flask XSM is in use. Adheres to the changes made by the
patch to remove exposure of libxenctrl/libxenstore headers via libxl.h.
tools/libxl/libxl_flask.c | 71 ++++++++++++++++++
tools/libxl/Makefile | 2
2016 May 31
0
LNT General Failure
I hope I've fixed this properly just now in http://llvm.org/viewvc/llvm-project?view=revision&revision=271274.
Fingers crossed that the bots will come back now...
On 30 May 2016, at 21:01, Arnaud De Grandmaison <Arnaud.DeGrandmaison at arm.com<mailto:Arnaud.DeGrandmaison at arm.com>> wrote:
I honestly do not know how to fix that --- I would otherwise I've committed a fix.
2008 Jun 09
1
Security module (Flask) support should be disabled
I notice that the Flask / ACM security module support has been enabled
in the latest Debian Xen packages. I'm afraid I think this is a
mistake.
In our opinion this code is of very poor quality. It is certainly
ill-tested and not widely used.
We (Xensource/Citrix) have received more than one serious
vulnerability report, of problems which make an installation with the
Flask support compiled
2011 Apr 04
2
[PATCHv2] libxl: Exposed Flask XSM functionality
Adds support for assigning a label to domains, obtaining and setting the
current enforcing mode, and loading a policy with xl command when the
Flask XSM is in use.
libxl.c | 1
libxl.idl | 3 -
xl.h | 3 +
xl_cmdimpl.c | 171
+++++++++++++++++++++++++++++++++++++++++++++++++++++++---
xl_cmdtable.c | 18 +++++-
5 files changed, 187 insertions(+), 9
2016 May 31
2
LNT General Failure
I think that will work. We should actually fix it to work with .11. It is a dot release, the changes are minor.
Sent from my iPhone
> On May 31, 2016, at 6:34 AM, Kristof Beyls via llvm-dev <llvm-dev at lists.llvm.org> wrote:
>
> I hope I've fixed this properly just now in http://llvm.org/viewvc/llvm-project?view=revision&revision=271274.
> Fingers crossed that the
2013 Feb 01
0
xenstore stubdom on Xen 4.2.1 (XSM/FLASK problem)
Hello all,
I am trying to get a xenstore/oxenstore (oxenstore is mirage based) stubdom
to get to work on Xen 4.2.1.
I know that I need to set XSM/FLASK rules and so I have compiled 4.2.1 with
XSM and FLASK.
I already talked with Daniel de Graaf (on the mailinglists) and Steven
Maresca on IRC about this thing. Daniel already wrote a XSM/FLASK ruleset
in this thread: