Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754734AbYKIIlb (ORCPT ); Sun, 9 Nov 2008 03:41:31 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1751996AbYKIIlY (ORCPT ); Sun, 9 Nov 2008 03:41:24 -0500 Received: from mail.gmx.net ([213.165.64.20]:55784 "HELO mail.gmx.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with SMTP id S1751195AbYKIIlX (ORCPT ); Sun, 9 Nov 2008 03:41:23 -0500 X-Authenticated: #36613700 X-Provags-ID: V01U2FsdGVkX18N4UJvhNANpdnwC5xilfLehfHSYqb4u7Aspyo9w2 NPwLwdOE8r1mE7 From: Mathias Schnarrenberger Reply-To: mathias.schnarrenberger@gmx.de To: "Olaf van der Spek" Subject: Re: security: delete BIOS password in keyboard buffer during kernel bootup Date: Sun, 9 Nov 2008 09:41:20 +0100 User-Agent: KMail/1.10.3 (Linux/2.6.27-7-generic; KDE/4.1.3; i686; ; ) Cc: linux-kernel@vger.kernel.org References: <200811081100.03966.mathias.schnarrenberger@gmx.de> In-Reply-To: MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Content-Disposition: inline Message-Id: <200811090941.20401.mathias.schnarrenberger@gmx.de> X-Y-GMX-Trusted: 0 X-FuHaFi: 0.78 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 472 Lines: 11 > What if my BIOS stores some critical info at that memory address? > I don't think the kernel is the right place to work around this issue. AFAIK every IBM PC compatible BIOS stores the keyboard buffer in this area. Mathias -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/