On Wed, Mar 29, 2023 at 12:40:24PM +0200, Greg KH wrote: > > + * - Guest malicious configuration > > + - A malicious host modifies one of the following guest's > > + configuration: > > + > > + 1. Guest firmware or bootloader > > + > > + 2. Guest kernel or module binaries > > + > > + 3. Guest command line parameters > > + > > + This allows the host to break the integrity of the code running > > + inside a CoCo guest and violate the CoCo security objectives. > > So hosts are not allowed to change this? I don't understand the use of > "violate" here, sorry. I think the situation described above is when malicious actors gain control of a CoCo host. Thanks. -- An old man doll... just what I always wanted! - Clara
Attachment:
signature.asc
Description: PGP signature