Date: Thu, 14 Oct 1999 00:00:36 +0930 (CST) From: Mark Newton <newton@internode.com.au> To: jkruger@oskar.nanoteq.co.za Cc: newton@internode.com.au, freebsd-hackers@freebsd.org Subject: Re: Generating interrupts ? Message-ID: <199910131430.AAA53879@gizmo.internode.com.au> In-Reply-To: <38049249.F3453D17@oskar.nanoteq.co.za> from "Johan Kruger" at Oct 13, 99 04:08:09 pm
next in thread | previous in thread | raw e-mail | index | archive | help
Johan Kruger wrote: > Hmmmm, OK , well, i want to use the specific strings as part of the > info with which i am going to encrypt the kernel. Don't ask why, i am > not at liberty to say. Great. We get to deal with someone who wants assistance but is too concerned with intrigue to fully explain the problem domain. We shall press on. It sounds like you want a kernel that's only able to boot on a particular machine, and you figure that that information from the BIOS is the closest thing a PC has to a hostid. I assume you'll have a kernel with an unencrypted entrypoint which knows how to decrypt the rest. > Don't worry , it'l work, i just need the info from the motherboard > and bios rev Have a look at i386_vm86(2) and its associated kernel support in /sys/i386, or (perhaps a better idea) think about doing your decryption in the bootloader where you have full access to the BIOS. While you're reading through it all, always keep the fact that there's probably a better way at the forefront of your mind :-) - mark ---- Mark Newton Email: newton@internode.com.au (W) Network Engineer Email: newton@atdot.dotat.org (H) Internode Systems Pty Ltd Desk: +61-8-82232999 "Network Man" - Anagram of "Mark Newton" Mobile: +61-416-202-223 To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199910131430.AAA53879>