PSPEmu | Secure Processor or PSP with the goal to understand AMDs
kandi X-RAY | PSPEmu Summary
kandi X-RAY | PSPEmu Summary
PSPEmu is a C library. PSPEmu has no bugs, it has no vulnerabilities, it has a Strong Copyleft License and it has low support. You can download it from GitHub.
This is an emulator for AMDs (Platform) Secure Processor or PSP with the goal to understand AMDs prorietary AGESA code running on the PSP by watching execution of the involved code modules. The PSP is the first processor to run on an AMD CPU after power is applied and is responsible for bootstrapping the whole system. It loads firmware for other micro controllers inside the CPU like the SMU for instance and initializes the memory controllers so DRAM is fully initialized when the first instruction starts executing on the x86 cores. The PSP also acts as the systems trust anchor by doing signature verification for loaded code including the UEFI firmware running on the x86 cores and implementing a firmware TPM on some models. On EPYC the PSP is responsible for key management and programming the encryption keys for the AES engines inside the memory controllers for AMDs Secure Encrypted Virtualization (SEV) feature.
This is an emulator for AMDs (Platform) Secure Processor or PSP with the goal to understand AMDs prorietary AGESA code running on the PSP by watching execution of the involved code modules. The PSP is the first processor to run on an AMD CPU after power is applied and is responsible for bootstrapping the whole system. It loads firmware for other micro controllers inside the CPU like the SMU for instance and initializes the memory controllers so DRAM is fully initialized when the first instruction starts executing on the x86 cores. The PSP also acts as the systems trust anchor by doing signature verification for loaded code including the UEFI firmware running on the x86 cores and implementing a firmware TPM on some models. On EPYC the PSP is responsible for key management and programming the encryption keys for the AES engines inside the memory controllers for AMDs Secure Encrypted Virtualization (SEV) feature.
Support
Quality
Security
License
Reuse
Support
PSPEmu has a low active ecosystem.
It has 46 star(s) with 5 fork(s). There are 3 watchers for this library.
It had no major release in the last 6 months.
There are 5 open issues and 7 have been closed. On average issues are closed in 4 days. There are no pull requests.
It has a neutral sentiment in the developer community.
The latest version of PSPEmu is current.
Quality
PSPEmu has 0 bugs and 0 code smells.
Security
PSPEmu has no vulnerabilities reported, and its dependent libraries have no vulnerabilities reported.
PSPEmu code analysis shows 0 unresolved vulnerabilities.
There are 0 security hotspots that need review.
License
PSPEmu is licensed under the GPL-3.0 License. This license is Strong Copyleft.
Strong Copyleft licenses enforce sharing, and you can use them when creating open source projects.
Reuse
PSPEmu releases are not available. You will need to build from source code and install.
Installation instructions, examples and code snippets are available.
Top functions reviewed by kandi - BETA
kandi's functional review helps you automatically verify the functionalities of the libraries and avoid rework.
Currently covering the most popular Java, JavaScript and Python libraries. See a Sample of PSPEmu
Currently covering the most popular Java, JavaScript and Python libraries. See a Sample of PSPEmu
PSPEmu Key Features
No Key Features are available at this moment for PSPEmu.
PSPEmu Examples and Code Snippets
No Code Snippets are available at this moment for PSPEmu.
Community Discussions
No Community Discussions are available at this moment for PSPEmu.Refer to stack overflow page for discussions.
Community Discussions, Code Snippets contain sources that include Stack Exchange Network
Vulnerabilities
No vulnerabilities reported
Install PSPEmu
For first steps no access to AMD hardware is required, only a firmware image from a Mainboard vendor which can be downloaded from the vendors websites. In this example the off chip BL is executed in the emulator by using a fully emulated setup based on the first generation Zen architecture.
Support
For any new features, suggestions and bugs create an issue on GitHub.
If you have any questions check and ask questions on community page Stack Overflow .
Find more information at:
Reuse Trending Solutions
Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items
Find more librariesStay Updated
Subscribe to our newsletter for trending solutions and developer bootcamps
Share this Page