You seem to be describing Static Root for Trust Measurement (SRTM) where each part of the boot sequence verifies the integrity of the next phase. Afaik if you use Dynamic Root for Trust Measurement (DRTM) then a bug in a boot loader is not enough to compromise the system. Qubes development blog has somewhat related posts
what about DRTM?
http://theinvisiblethings.blogspot.com/2010/04/remotely-attacking-network-cards-or-why.html
http://theinvisiblethings.blogspot.com/2009/01/why-do-i-miss-microsoft-bitlocker.html
You might also want to read the description of the x86 SENTER/SINIT (secure init) instruction.