[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <e8908622-cf20-b2a4-672f-9072f5ea806b@apertussolutions.com>
Date: Mon, 11 May 2020 15:00:24 -0400
From: "Daniel P. Smith" <dpsmith@...rtussolutions.com>
To: Matthew Garrett <mjg59@...gle.com>,
Daniel Kiper <daniel.kiper@...cle.com>
Cc: Ross Philipson <ross.philipson@...cle.com>,
Linux Kernel Mailing List <linux-kernel@...r.kernel.org>,
the arch/x86 maintainers <x86@...nel.org>,
linux-doc@...r.kernel.org, Thomas Gleixner <tglx@...utronix.de>,
Ingo Molnar <mingo@...hat.com>, Borislav Petkov <bp@...en8.de>,
"H. Peter Anvin" <hpa@...or.com>,
trenchboot-devel@...glegroups.com,
Ard Biesheuvel <ardb@...nel.org>, leif@...iainc.com,
eric.snowberg@...cle.com, piotr.krol@...eb.com,
krystian.hebel@...eb.com, michal.zygowski@...eb.com,
James Bottomley <james.bottomley@...senpartnership.com>,
andrew.cooper3@...rix.com
Subject: Re: [RFC PATCH 00/12] x86: Trenchboot secure late launch Linux kernel
support
On 3/26/20 4:19 PM, Matthew Garrett wrote:
> How does Windows manage this? Retaining access to EFI runtime services
> is necessary, and the areas in the memory map marked as runtime
> services code or data should be considered part of the TCB and
> measured - they're very much not part of the gap.
>
Dave Weston was kind enough to speak at PSEC specifically on how they
are leveraging DRTM.
https://www.platformsecuritysummit.com/2019/speaker/weston/
V/r,
DPS
Powered by blists - more mailing lists