lanzaboote/rust/tool
Alois Wohlschlager 3885f114a8
Do not sign the kernel
Malicious boot loader specification entries could be used to make a
signed kernel load arbitrary unprotected initrds. Since we do not want
this, do not sign the kernel. This way, the only things allowed to boot
are our UKI stubs, which do verify the initrd.
2023-01-31 18:25:27 +01:00
..
src Do not sign the kernel 2023-01-31 18:25:27 +01:00
tests tool: write systemd-boot loader.conf 2023-01-29 16:19:14 +01:00
Cargo.lock treewide: simplify subproject names 2023-01-17 21:31:14 +01:00
Cargo.toml treewide: simplify subproject names 2023-01-17 21:31:14 +01:00