Forum RSS Feed Follow @ Twitter Follow On Facebook

Thread Rating:
  • 11 Vote(s) - 4.64 Average
  • 1
  • 2
  • 3
  • 4
  • 5
[-]
Welcome
You have to register before you can post on our site.

Username:


Password:





[-]
Latest Threads
[REQUEST] Acer Nitro 5 AN517-52 BIOS Unl...
Last Post: MATI1XD
Today 06:36 AM
» Replies: 17
» Views: 3668
Acer 7750G BIOS
Last Post: DeathBringer
Today 12:40 AM
» Replies: 1
» Views: 62
[Test, sp53139] HP Probook 6555b EFI INS...
Last Post: Maxinator500
Today 12:10 AM
» Replies: 13
» Views: 11138
MB (A55M-E33 FM2+)
Last Post: TamoNeki
Yesterday 03:28 PM
» Replies: 15
» Views: 610
Lenovo Ideapad flex 4 14IAU7 missing UUI...
Last Post: balli4u
Yesterday 01:10 PM
» Replies: 0
» Views: 84
[REQUEST] Lenovo S310 & S410 (8BCNxxWW) ...
Last Post: Dudu2002
Yesterday 08:34 AM
» Replies: 15
» Views: 7211
[REQUEST] Lenovo G780 (5ECNxxWW) Whiteli...
Last Post: Dudu2002
Yesterday 06:47 AM
» Replies: 875
» Views: 307271
HELP Unbrick ASUS N550JV
Last Post: halfchemistry
Yesterday 05:37 AM
» Replies: 9
» Views: 11803
Asus Strix G512LV Bios Unlock
Last Post: loic2907
Yesterday 04:12 AM
» Replies: 58
» Views: 16757
[Request] HP X99 CPU Support
Last Post: DeathBringer
06-09-2024 01:01 PM
» Replies: 3
» Views: 244
[REQUEST] Lenovo G710 BIOS Whitelist Rem...
Last Post: Dudu2002
06-09-2024 03:50 AM
» Replies: 469
» Views: 143756
[REQUEST] Lenovo ThinkCentre M715q 2nd G...
Last Post: Arcaderix
06-09-2024 02:11 AM
» Replies: 18
» Views: 2112
[REQUEST] Acer Aspire 4750(G,Z) & 4752(G...
Last Post: acezero4566
06-08-2024 08:33 PM
» Replies: 43
» Views: 33131
[REQUEST] Acer Aspire V5-121 Bios Unlock
Last Post: CoolerBarunhento
06-08-2024 11:37 AM
» Replies: 5
» Views: 6712
Lenovo Ideapad 300-15ARR unlock bios
Last Post: MgcStck98
06-07-2024 04:09 PM
» Replies: 2
» Views: 253
[REQUEST] Asus ROG Strix G10CE BIOS Unlo...
Last Post: Ruutical
06-07-2024 02:55 PM
» Replies: 0
» Views: 159
BIOS Unlock ASUS TUF F15 FX506HE Gaming ...
Last Post: abu333
06-07-2024 09:30 AM
» Replies: 2
» Views: 566
Overclock Intel GMA graphics by modding ...
Last Post: lolvatveo
06-07-2024 09:05 AM
» Replies: 0
» Views: 163
Dell Dimension 2100 Bios Dump / INTEL CA...
Last Post: newat6user
06-07-2024 04:13 AM
» Replies: 0
» Views: 333
[Request] Adding 7th Gen CPU support to ...
Last Post: DeathBringer
06-06-2024 02:16 PM
» Replies: 3
» Views: 299

(UEFI) Dell XPS 15z L511z modded BIOS - and HOWTO
I assume Setup modules (which essentially are tabs from the BIOS setup) generally are safe to modify .. well, to a certain degree...
It's the options we unlock that can cause some unwanted results .. like CMOS corruption or an option that if enabled will cause the machine to fail during post/boot.

I've looked at the strings related to TPM and it appears to be checking whether or not there is a TPM device installed on the board .. which I assume is your standard USB-hosted Biometric reader that has a key (fingerprint enrollment) storage that you could use to unlock your laptop when it boots. Vostro 3450 has one, but the functionality in windows is poor.

The crisis recovery feature of course is a number one priority, however reading on IXBT I have seen cases with Insyde H20 that even USB recovery won't boot anymore after tampering with PEG/SG and other stuff.. so you still have to be really careful to do even slightest adjustments. And bear in mind that Insyde is pretty much deciphered already as there are scripts and software that parses the *.efi modules and translates them into human readable text.. which we don't have such a privilege with our Tiano.
find
quote
Hello guys,

I know this is offtopic, but:
I can't find any forums that discuss the new OSX posibilities coming with the unlocking of the BIOS, any idea where we could talk about this?
I've been following this thread religiously and I am very glad it's unlocked, congrats to all the hardworking devs on this, jkhuba especially.

I tried installing OSX (Lion) a few months back with little to no success, could only boot from a USB Stick (I guess that's fixed now with UEFI Boot enabled), and I had [censored] with the graphics card, long story short here's a list with all the problems I had http://www.tonymacx86.com/lion-laptop-su...ll-10.html if you care to read (same username, ArthurianX).

My question now is, could someone (someone who's got OSX working) possibly upload and document all the files and modifications he or she did to make OSX work for our XP15z's? I'm willing to help, and to make tutorial/howto for others to make our laptops run OSX.

Thank you for reading, and even greater thanks for future answers and problem solving,
Arthur
find
quote
What i know for sure is that with classic locked bios you can't boot anything of off GPT-formated HDD/USB flashdrive. Since 15Z and Vostro 3450 share almost identical Phoenix SecureCore Tiano one can assume that everything below will be common for these series of machines:

With UEFI Boot unlocked we are now able to install EFI windows 7/8 or UEFI Clover onto a GPT disk .. however according to dmazar - one of the coders for Clover who is responsible for most of the UEFI fixes... even though our memory map looks cleaner than any other UEFI version out there and in theory wouldn't need any fixes to boot OSX... theres is a problem with runtime services and NVRAM implementation, so the system boots and hangs for about 10 minutes, you cant click on anything, but everything is active.. it's sort of like a transparent layer that prevents you from clicking on things. After 8 to 10 minutes it magically unfreezes and you are able to use the system just fine. According to dmazar it's not fixable yet.. and theres no ETA, because the reason is unknown. I can access third-party shell to set up an additional bcfg entry which points to cloverx64.efi in /EFI/BOOT folder but it's unusable at this point of time.. as you can't do much without with a OS that does not support runtime and NVRAM ...

I believe you are still unable to boot something like Chimera/Chameleon/XPC of off GPT disk because it wil say "No Operation System Found" as only thing UEFI Boot does is looks for the bootx64.efi file in /EFI/BOOT those allowing you to boot with OEM efi modules/drivers.
P.S. You are welcome here
find
quote
ok, took me a while, but I made a list of all the modules inside l502x a11 bios.

here is it if someone want to check it (it is as file attachment to this post)


oh, just wondering someone got the uefi shell unlocked on their bios


Attached Files
.txt   modules.txt (Size: 24.25 KB / Downloads: 22)
find
quote
The uefi shell isn't part of the bios, you need to load it from an usb drive, should work fine.

find
quote
It actually IS a part of the bios of you look closely. There's even an option to access it which is hidden.
Shell.efi C57AD6B7-0515-40A8-9D21-551652854E37_1_967.ROM
Also using a third party UEFI shell through /EFI/BOOT/bootx64.efi with UEFI Boot enabled can get you somewhere .. just don't know where ..

Also I just thought of something ... would it be possible to rename SystemCrisisRecoveryPei.efi as bootx64.efi and place it into /EFI/BOOT/bootx64.efi with UEFI boot enabled to be able to initiate the recovery .. I think you can extract the module using MMTOOL .. Technically if the module starts with MZ it will be called if dependencies are satisfied. Of course to access it we would have to have a somewhat bootable machine. If It doesn't start with MZ we would have to delete the header part until MZ is the initial offset, because we are unable to call for defined offset by booting in this manner.

P.S. Stumbled upon this abstract description over at mydigitallife forums:
Quote:Phoenix UEFI SHELL Flash Utility 1.5.2.0 (PFlash.efi)

1) Download latest bios for Dell Vostro 3450 (assuming XPS shares the same BIOS it would apply as well)
2) Open with 7zip -> Vostro_3450_AXX.exe -> .rsrc -> 1024 -> RCDATA -> 7000 (this is the BIOS.cap) file.
3) PFlash.efi lives inside.

This might help with the Phoenix UEFI Crisis Recovery process previously documented.

Also this:
Quote:To create the Crisis Recovery disk:
1 Prepare a removable USB storage device with a capacity size greater than 10 MB.
Note that all data on the USB storage device will be cleared during the creation of the crisis disk.
2 Set up a computer running the Windows OS and plug in the USB storage device into an available USB port.
3 Use the text editor to create a file named startup.nsh with the following contents.
fs0TongueFlash.efi/bb1/silent/sv/sd xxxxxxxx.fd (where xxxxxxxx.fd is the new BIOS image file)
4 Copy the startup.nsh file and the following folder and files to the USB storage device.
– EFI folder
– BIOS.cap
– PFlash.efi
– CrisisRecovery.efi
– BIOS image file
5 Eject and reconnect the USB storage device, and make sure the files are saved to the device.
source: http://forums.mydigitallife.info/threads...res/page82

The last method seems legit. Having Shell named as bootx64.efi in /EFI/BOOT on your usb stick would execute shell as soon as you boot of off the USB flash drive (with UEFI boot enabled) the startup script startup.nsh (placed nearby bootx64.efi) would be executed right away (I have tried it already to do UEFI dump) which in hand would run CrisisRecovery.efi from filesystem0 (same diskXs1) that would fash the image ..
find
quote
Hey guys - good to see some progress made since I've last been here. I have a couple of questions:

1) I haven't yet tried to patch the Security dxe module with the suppress efi module. Has anyone done so, and if so, to what effect?

2) @TimeWalker - I think your method could possibly work. If you do manage to do this let me know so I'll try and replicate it on a non-battery removable device such as the xps 15z.

3) Something else crossed my mind as well - there's the fvrecovery.fd file which is extracted during each bios flash. Surely this contains some form of recovery module?
find
quote
(10-03-2012, 11:56 AM)jkbuha Wrote: Hey guys - good to see some progress made since I've last been here. I have a couple of questions:

1) I haven't yet tried to patch the Security dxe module with the suppress efi module. Has anyone done so, and if so, to what effect?

2) @TimeWalker - I think your method could possibly work. If you do manage to do this let me know so I'll try and replicate it on a non-battery removable device such as the xps 15z.

3) Something else crossed my mind as well - there's the fvrecovery.fd file which is extracted during each bios flash. Surely this contains some form of recovery module?


1)
I replaced both 0A 82 45 8A (00) 00 00 00 00 00 00 00 45 0A strings at the SystemSetupSecurityDxe.efi module with 0A 82 45 8A (01) 00 00 00 00 00 00 00 45 0A

I am going to flash it and will report any change, I supose I have to expect extra stuff at the security tab inside the setup, right?


3)
yeah, I though about that several times, but I have no idea about how to access that file.

edit: I found that it can be also opened via PhoenixTool app, it also extracted several modules, I think that is worth of a deeper analysis Smile
find
quote
keep us posted, kasar!

Well, in a nutshell ... this is what's crawling my mind right now.

1. startup.nsh with fs0TongueFlash.efi/bb1/silent/sv/sd xxxxxxxx.fd <- this is clear so far, of course if the arguments are universal for all the Phoenix Tiano machines. fs0: defines working directory for the file system .. specifying PFlash.efi and arguments runs the respective efi module much like a terminal program .. which shell is .. in a way.
2. xxxxxxxx.fd is the new BIOS image file <- ok. we can get this *.fd file after every fw extraction. if it's indeed the BIOS image file then it's check.
3. BIOS.cap <- according to a ost regarding Vostro 3450 this can be obtained from the official updater
4. PFlash.efi <- BIOS.cap (or *.scap to be precise) are the files (firmware containers) that are being used by Apple to hold the firmware, you can extract the modules neatly using MMTOOL .. I have done it previously. So PFlash.efi should be there its the module that is executed when you run the official updater from within WinFlash. The blue interface thingy that beeps like crazy Big Grin
5. CrisisRecovery.efi <- this can probably be extracted the same way.. if no, then backup plan like I said previously .. we know the GUID, if it starts with MZ -> cool, if not -> we trim it Smile
6. BIOS image file <- that's already taken care of ...

We just have to gather everything together then .. I have a somewhat important test on Friday, so I'm not really willing to tamper with this at this point of time, but I will take a look tomorrow wether I can gather all the stuff for my Vostro to test the method.

P.S. wtf, this has been documented by Acer for ages (Packard Bell subdivision):
http://puu.sh/1b3se
http://puu.sh/1b3ti
find
quote
@all

as promised I flashed the new bios.

here you can see the security tab with stock bios:

[Image: bios3p.jpg]



and here with the modded bios

[Image: dsc0069isv.jpg]

as you can see two new options apeared, min and max password lenght.

not a big enchancement, but well, every new option is welcome Smile

conclusion, yes, it worked and unlocked more features ^^

computrace option still grey out and cant be changed since I disabled it.

maybe we can do a trick to that? Big Grin

waiting for more hex strings to change, every hex string I tried from this topic it worked flawesly! Smile
find
quote


Forum Jump:


Users browsing this thread: 28 Guest(s)