Re: Xen, Fedora, and UEFI Secure Boot

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Tue, 2012-07-17 at 11:33 -0400, Konrad Rzeszutek Wilk wrote:
> > The only thing that comes to my mind is PCI passthrough, as it probably
> > could be thought at something allowing physical memory accesses... Or is
> > the control Xen/qemu provides over it sufficient? (Again, I think the
> > same could apply to KVM, right?).
> 
> Right, and also kexec for example. There is code loaded from userspace
> binary into the kernel to deal with a crashed kernel. Its called
> purgatory code.
> 
I see.

> What I am not clear is how far the "chain of trust" needs to go - b/c
> this also would imply module signing - which is right now _not_ in the
> upstream kernel.
>
It sure does, and in fact, module signing figures in the (still drafted)
Fedora's plan: http://mjg59.dreamwidth.org/12368.html ("Signed modules
are obviously troubling from a user perspective. We'll be signing all
the drivers that we ship [...]").

The X server is also mentioned there, so I guess qemu (it open /dev/mem
as root after all, doesn't it?) could be a candidate either? :-O

Thanks and Regards,
Dario

-- 
<<This happens because I choose it to happen!>> (Raistlin Majere)
-----------------------------------------------------------------
Dario Faggioli, Ph.D, http://retis.sssup.it/people/faggioli
Senior Software Engineer, Citrix Systems R&D Ltd., Cambridge (UK)

Attachment: signature.asc
Description: This is a digitally signed message part

--
xen mailing list
xen@xxxxxxxxxxxxxxxxxxxxxxx
https://admin.fedoraproject.org/mailman/listinfo/xen

[Index of Archives]     [Fedora General]     [Fedora Music]     [Linux Kernel]     [Fedora Desktop]     [Fedora Directory]     [PAM]     [Big List of Linux Books]     [Gimp]     [Yosemite News]

  Powered by Linux