Hi Matt,
[auto build test WARNING on security/next]
[also build test WARNING on v4.12-rc5 next-20170615]
[if your patch is applied to the wrong git tree, please drop us a note to help
improve the system]
url:
https://github.com/0day-ci/linux/commits/Matt-Brown/Add-Trusted-Path-Execution-as-a
On Fri, 2017-06-09 at 09:18 -0400, Matt Brown wrote:
> On 6/9/17 9:16 AM, Mimi Zohar wrote:
> > On Fri, 2017-06-09 at 05:55 -0700, Kees Cook wrote:
> >> On Fri, Jun 9, 2017 at 3:18 AM, Mimi Zohar
> >> wrote:
> >>> On Thu, 2017-06-08 at 23:50 -0400, Matt Brown wrote:
> >>
> >> * Issues:
>
On 6/9/17 9:16 AM, Mimi Zohar wrote:
> On Fri, 2017-06-09 at 05:55 -0700, Kees Cook wrote:
>> On Fri, Jun 9, 2017 at 3:18 AM, Mimi Zohar wrote:
>>> On Thu, 2017-06-08 at 23:50 -0400, Matt Brown wrote:
>>
>> * Issues:
>>* Can be bypassed by interpreted languages such as python. Yo
On Fri, 2017-06-09 at 05:55 -0700, Kees Cook wrote:
> On Fri, Jun 9, 2017 at 3:18 AM, Mimi Zohar wrote:
> > On Thu, 2017-06-08 at 23:50 -0400, Matt Brown wrote:
> >> >>
> >> >> * Issues:
> >> >>* Can be bypassed by interpreted languages such as python. You can
> >> >> run
> >> >> mali
On 6/9/17 8:55 AM, Kees Cook wrote:
> On Fri, Jun 9, 2017 at 3:18 AM, Mimi Zohar wrote:
>> On Thu, 2017-06-08 at 23:50 -0400, Matt Brown wrote:
>
> * Issues:
>* Can be bypassed by interpreted languages such as python. You can run
> malicious code by doing: python -c 'ev
On Fri, Jun 9, 2017 at 3:18 AM, Mimi Zohar wrote:
> On Thu, 2017-06-08 at 23:50 -0400, Matt Brown wrote:
>> >>
>> >> * Issues:
>> >>* Can be bypassed by interpreted languages such as python. You can run
>> >> malicious code by doing: python -c 'evil code'
>> >
>> > What's the recommend
On Thu, 2017-06-08 at 23:50 -0400, Matt Brown wrote:
> >>
> >> * Issues:
> >> * Can be bypassed by interpreted languages such as python. You can run
> >> malicious code by doing: python -c 'evil code'
> >
> > What's the recommendation for people interested in using TPE but
> > having int
On 06/08/2017 10:38 PM, Kees Cook wrote:
On Wed, Jun 7, 2017 at 8:43 PM, Matt Brown wrote:
This patch was modified from Brad Spengler's Trusted Path Execution (TPE)
feature. It also adds features and config options that were found in Corey
Henderson's tpe-lkm project.
Modifications from Brad S
On Wed, Jun 7, 2017 at 8:43 PM, Matt Brown wrote:
> This patch was modified from Brad Spengler's Trusted Path Execution (TPE)
> feature. It also adds features and config options that were found in Corey
> Henderson's tpe-lkm project.
>
> Modifications from Brad Spengler's implementation of TPE wer
This patch was modified from Brad Spengler's Trusted Path Execution (TPE)
feature. It also adds features and config options that were found in Corey
Henderson's tpe-lkm project.
Modifications from Brad Spengler's implementation of TPE were made to
turn it into a stackable LSM using the existing LS
10 matches
Mail list logo