Hi everyone,

over the past year I did some research on AMD’s controversial Secure Processor 
(formerly known as Platform Security Processor or PSP). Its firmware is stored 
in an undocumented area of UEFI images and so I wrote a tool that can parse it. 
I thought some of you might be interested in that: 
https://github.com/cwerling/psptool <https://github.com/cwerling/psptool>

It is accompanied by PSPTrace, which can correlate an SPI capture of a boot 
procedure to the AMD firmware entries so you can deduct some boot logic from it.

Cheers,
Christian
_______________________________________________
coreboot mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to