From owner-freebsd-hackers Mon Apr 1 10:58:36 2002 Delivered-To: freebsd-hackers@freebsd.org Received: from mass.dis.org (dhcp45-24.dis.org [216.240.45.24]) by hub.freebsd.org (Postfix) with ESMTP id 6502037B417 for ; Mon, 1 Apr 2002 10:58:27 -0800 (PST) Received: from mass.dis.org (localhost [127.0.0.1]) by mass.dis.org (8.11.6/8.11.6) with ESMTP id g31Iv0g01534; Mon, 1 Apr 2002 10:57:01 -0800 (PST) (envelope-from msmith@mass.dis.org) Message-Id: <200204011857.g31Iv0g01534@mass.dis.org> X-Mailer: exmh version 2.5 07/13/2001 with nmh-1.0.4 To: Terry Lambert Cc: Dmitry Konyshev , freebsd-hackers@FreeBSD.ORG Subject: Re: finding out boot device In-reply-to: Your message of "Mon, 01 Apr 2002 10:28:30 PST." <3CA8A6CE.DBB6CEEB@mindspring.com> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Date: Mon, 01 Apr 2002 10:57:00 -0800 From: Michael Smith Sender: owner-freebsd-hackers@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.ORG > One way to obtain this information is to write a program > that uses vm86() calls to read the first N sectors of a > BIOS disk, then read the same area using the protected mode > drivers. When you get a unique MD5 hash match between the > BIOS and the boot device, you're there. This won't work, since we'll have spammed the device state by then. You'd have to compute the fingerprints in the loader before booting. -- To announce that there must be no criticism of the president, or that we are to stand by the president, right or wrong, is not only unpatriotic and servile, but is morally treasonable to the American public. - Theodore Roosevelt To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message