From f481908135470d55124013bb8770148544979712 Mon Sep 17 00:00:00 2001 From: Nicholas Chin Date: Sun, 12 Nov 2023 20:14:08 -0700 Subject: README.md: Add references to Open Security Training The old Open Security Training site had a course called Advanced x86: BIOS and SMM Internals, which had a set of slides outlining the method to supress SMIs by changing the GBL_SMI_EN bit. Add a reference to it as this is where I originally learned of this method. --- util/dell-flash-unlock/README.md | 4 ++++ 1 file changed, 4 insertions(+) (limited to 'util/dell-flash-unlock') diff --git a/util/dell-flash-unlock/README.md b/util/dell-flash-unlock/README.md index ba45ddcc..7d9b4b85 100644 --- a/util/dell-flash-unlock/README.md +++ b/util/dell-flash-unlock/README.md @@ -100,3 +100,7 @@ There are other possible protection mechanisms that the firmware can utilize, such as Protected Range Register settings, which apply access permissions to address ranges of the flash, similar to the IFD. However, the E6400 vendor firmware does not utilize these, so they will not be discussed. + +## References +- Open Security Training: Advanced x86: BIOS and SMM Internals - SMI Suppression + - https://opensecuritytraining.info/IntroBIOS_files/Day1_XX_Advanced%20x86%20-%20BIOS%20and%20SMM%20Internals%20-%20SMI%20Suppression.pdf -- cgit v1.2.1