On Thu, Jun 27, 2019 at 11:14 AM James Morris <jmorris@xxxxxxxxx> wrote: > > On Thu, 27 Jun 2019, Matthew Garrett wrote: > > > By that metric, on a secure boot system how do we determine that code > > running in the firmware environment wasn't compromised before it > > launched the initial signed kernel? > > Remote attestation tied to a hardware root of trust, before allowing > access to any further resources. If you use IMA you can get the same guarantees over kexec. _______________________________________________ kexec mailing list kexec@xxxxxxxxxxxxxxxxxxx http://lists.infradead.org/mailman/listinfo/kexec