summaryrefslogtreecommitdiff
path: root/util
diff options
context:
space:
mode:
authorNicholas Chin <nic.c3.14@gmail.com>2023-11-12 20:14:08 -0700
committerNicholas Chin <nic.c3.14@gmail.com>2023-12-17 19:38:16 -0700
commitf481908135470d55124013bb8770148544979712 (patch)
tree4f13557136b9149ac75050b763a03e7f31f7a0fc /util
parent39a3de574a7ae6d6165a660cd7efd9ac6a31a922 (diff)
README.md: Add references to Open Security Training
The old Open Security Training site had a course called Advanced x86: BIOS and SMM Internals, which had a set of slides outlining the method to supress SMIs by changing the GBL_SMI_EN bit. Add a reference to it as this is where I originally learned of this method.
Diffstat (limited to 'util')
-rw-r--r--util/dell-flash-unlock/README.md4
1 files changed, 4 insertions, 0 deletions
diff --git a/util/dell-flash-unlock/README.md b/util/dell-flash-unlock/README.md
index ba45ddc..7d9b4b8 100644
--- a/util/dell-flash-unlock/README.md
+++ b/util/dell-flash-unlock/README.md
@@ -100,3 +100,7 @@ There are other possible protection mechanisms that the firmware can utilize,
such as Protected Range Register settings, which apply access permissions to
address ranges of the flash, similar to the IFD. However, the E6400 vendor
firmware does not utilize these, so they will not be discussed.
+
+## References
+- Open Security Training: Advanced x86: BIOS and SMM Internals - SMI Suppression
+ - https://opensecuritytraining.info/IntroBIOS_files/Day1_XX_Advanced%20x86%20-%20BIOS%20and%20SMM%20Internals%20-%20SMI%20Suppression.pdf