Sounds like a rootkit.
On Thu, Jun 6, 2013 at 9:35 PM, Jerry Backer <bataill...@gmail.com> wrote: > Hi, > > The idea is to run some security and packet inspection codes on the hidden > core. > There is a typo on the title, it should be 'Running privilege code on > hidden core'. > > Thanks, > > > On Thu, Jun 6, 2013 at 3:04 PM, Fred . <eldman...@gmail.com> wrote: > >> I am curious as to why you would want to do such a thing... >> >> >> On Thu, Jun 6, 2013 at 6:52 PM, Jerry Backer <bataill...@gmail.com>wrote: >> >>> Hello, >>> >>> I am using seaBIOS with QEMU and am attempting to hide a processor core >>> (on an smp system) from the O.S. and then load a dedicated code on that >>> core before boot. I have managed to hide one of the cores by decreasing >>> CountCPUs (within smp.c) after running the ap core code, hence the BIOS >>> load info for 1 less core on the mp table. >>> >>> However, I have not been able to figure out how to load the privileged >>> code. My intuition was to load it when the hidden core enters protected >>> mode before running kernel code. But I don't see where in the code the >>> cores go into protected mode during boot. >>> >>> Can anyone give me some insight on how to proceed? >>> >>> Thanks, >>> >>> -- >>> Jerry >>> >>> _______________________________________________ >>> SeaBIOS mailing list >>> SeaBIOS@seabios.org >>> http://www.seabios.org/mailman/listinfo/seabios >>> >>> >> > > > -- > Jerry Backer >
_______________________________________________ SeaBIOS mailing list SeaBIOS@seabios.org http://www.seabios.org/mailman/listinfo/seabios