Forum RSS Feed Follow @ Twitter Follow On Facebook

Thread Rating:
  • 2 Vote(s) - 3 Average
  • 1
  • 2
  • 3
  • 4
  • 5
[-]
Welcome
You have to register before you can post on our site.

Username:


Password:





[-]
Latest Threads
[Request] Mod Adaptec ARCCONF to allow x...
Last Post: Teetrinker
09-13-2025 10:14 AM
» Replies: 0
» Views: 1327
[REQUEST] Lenovo G580 (5ECNxxWW) Whiteli...
Last Post: Princeneo
09-12-2025 09:23 AM
» Replies: 1726
» Views: 896190
[REQUEST] Lenovo Ideapad 100-14IBD & 100...
Last Post: Dudu2002
09-12-2025 02:22 AM
» Replies: 26
» Views: 23042
[REQUEST] Acer Nitro 5 AN515-58 BIOS Unl...
Last Post: iku56m22v
09-11-2025 10:02 AM
» Replies: 37
» Views: 25959
3rd Party RAM Mod For HP EliteDesk 705 G...
Last Post: AmyGrrl
09-10-2025 09:40 AM
» Replies: 0
» Views: 3140
MSI PR210 AHCI
Last Post: iday82
09-09-2025 04:40 PM
» Replies: 0
» Views: 3367
Honor Magicbook D14 Ryzen 4800H
Last Post: Altermann
09-09-2025 05:04 AM
» Replies: 0
» Views: 3699
[REQUEST] Thinkpad X60S WiFi WhiteList r...
Last Post: Vigor89
09-08-2025 04:46 PM
» Replies: 0
» Views: 4366
[REQUEST] GIGABYTE G6 MF (2024) Bios Unl...
Last Post: lovesickugh
09-07-2025 09:15 PM
» Replies: 3
» Views: 8243
Gigabyte GA-G33-DS3R: USB Boot
Last Post: dinix
09-04-2025 10:37 AM
» Replies: 0
» Views: 6254
Optiplex 7060 SFF 9th Generation Intel C...
Last Post: DeathBringer
08-31-2025 01:59 AM
» Replies: 68
» Views: 38318
Bios Powered classmate
Last Post: MosheNessi
08-28-2025 08:08 AM
» Replies: 0
» Views: 6299
[REQUEST] Lenovo Thinkpad X12 Detachable...
Last Post: Kokoko123
08-28-2025 12:48 AM
» Replies: 0
» Views: 6538
[REQUEST] Unlock advanced options to HP ...
Last Post: huguito
08-26-2025 02:57 PM
» Replies: 0
» Views: 6716
[REQUEST] Dell Precision T3500 BIOS Unlo...
Last Post: DEX0ZEN
08-25-2025 01:30 PM
» Replies: 45
» Views: 51221
[REQUEST] Samsung NP900X4D AES-NI enable...
Last Post: Vesly
08-23-2025 05:25 PM
» Replies: 63
» Views: 46885
Acer Veriton X2640G Xeon support
Last Post: hercares
08-19-2025 03:21 PM
» Replies: 5
» Views: 2502
[Request] Lenovo v520s sff unit bios sup...
Last Post: DeathBringer
08-17-2025 02:05 PM
» Replies: 15
» Views: 3392
[Success] [Bios Mod] Dell XPS L321X EFI ...
Last Post: tuwumo
08-17-2025 11:37 AM
» Replies: 18
» Views: 29346
Samsung N140 JA05IT AHCI
Last Post: Ranmamez
08-12-2025 05:22 PM
» Replies: 0
» Views: 7214

[UNLOCKED] Acer Aspire 5517 bios unlock
#11
Hey forcrz6 I downloaded your zip and tried to run the InsydeFlash.exe but I get this error message

IHISI: get support mode fail SMI !

If anyone knows what is going on please help me out. I might add that I have upgraded the CPU and Ram on this laptop as well as the HDD. Also I fried my board a while ago when replacing the CPU and bought a new one I remember the borads being physically different will the newer on having more chips n such on it but it was still labeled as a Acer Aspire 5517 Mobo. Anyway if any one can help thanks.
find
quote
#12
Confirming I ran the Insideflash posted by forcrz6 in post #7 on my Acer 5532, and it worked perfectly. I was already on the most current 1.11 factory/oe bios, and the one posted here on bios-mods.com successfully unlocked a few areas including an advanced CPU management setting, including the ability to enable "c1e" and "svm".

I'm not overclocked, and dare not to run without these energy saving settings on this older machine, especially with a very weakly designed heatsink. But this custom bios is really nice to have.

Is there any possibility to unlock the virtualization capabilities of my upgraded processor via the bios? Most Turion S1G1 upgrades (which DO support virtualization) from the standard TF-20 processors that came with the computer (which do not support virtualization), are severely limited on these machines. I can tell virtualization is still disabled in my Windows settings, and unless I'm able to unlock it via the bios, I'm not sure what else I can do to unlock this much needed capability.

The goal is to run Mac OS on a virtual machine efficiently to utilize applications that I use which are not supported by Windows.

Thank you for the help and support bios-mods, if anyone can assist with my request for the ability to enable virtualization, I would appreciate it.
find
quote
#13
Is there any chance someone can come through with a bios that allows a user to enable virtualization on these machines? Confirmed in a post above that the Insideflash zip posed by forcrz6, also works on the acer 5532 laptop and allows for some additional modifications not previously available in the manufacturer bios.

Please help if you can.
find
quote
#14
Would anyone be willing to help with modifying this bios to allow for the virtualization setting to be enabled?
find
quote
#15
Information 
The Virtualization is olny shown in the BIOS, if the cpu supports it. Doesn't? The TF-20 CPU doesn't supports virtualization...
find
quote
#16
I've performed the upgrade in post #7 to flash the modified BIOS and have confirmed that the C1E and SVM options are now displayed in the processor settings tab. However, when I run the Microsoft hardware-assisted virtualization detection tool (located at https://www.microsoft.com/en-us/download...spx?id=592), it reports that virtualization support isn't enabled.

I suspect that the modification to the BIOS code in that post changes an unconditional jump instruction to one that doesn't bypass the code for the additional menu functionality. Quite obviously, the modified menu sets the motherboard's nonvolatile memory properly and thus appears to work at first glance, but the appropriate flags in the CPU machine state register aren't being updated to reflect the NVRAM setting for enabled virtualization support.

I think what remains missing is the module that sets the SVM flag in the MSR on POST. It may have been bypassed in a manner not unlike the hidden menu settings. Some casual browsing of CPU programming manuals (which are freely available on the manufacturers' websites) suggest that setting the SVM flag and its lock bit is a fairly easy task to accomplish.

While I don't have the necessary knowledge of assembly language along with the tools to build a fully functional fix, I hope someone else is inspired to do so. Like software, hardware too should be free; the end user should be freely able to do as he wishes with the components he purchased—including adding nonstandard extras.
find
quote
#17
Thanks for the response sdub.  Unfortunate that there isn't a way to unlock virtualization on the 5516, 5517, 5532 Acer notebooks.

e_favero, you are correct, the TF-20 does not support virtualization, however on the 5516, 5517, and 5532 notebooks, you can upgrade to a dual core Turion TL-XX model CPU that does support virtualization.  The issue is, that the BIOS will not allow you to enable that functionality.
find
quote
#18
Only to get a sense for how much effort making a proper, fully-functional modification would take, I downloaded a copy of the appropriate manuals for my processor family (I have the AMD Turion TL-64) and perused it for steps to enable virtualization. These are:

Page 447 (499 in Acrobat Reader) of Volume 2 contains a C snippet illustrating how to detect whether or not SVM can be enabled. I emulated the steps using Crystal CPUID to access the model-specific register and the feature flags.

For the step:
Code:
if (CPUID Fn8000_0001_ECX[SVM] == 0)

I have the values in the CPUID Information box:
Code:
CPUID -- EAX ---- EBX ---- ECX ---- EDX ----
80000001 00060f81 000005a3 0000011f ebd3fbff

0000011f is the value of ECX (100011111 in binary), and this shows a value of 1 for the SVM bit. The table is in Volume 3, page 607 (643).

For the step (skipping the second step because we know no software is currently using SVM):
Code:
if (CPUID Fn8000_000A_EDX[SVML] == 0)

I have the values:
Code:
CPUID -- EAX ---- EBX ---- ECX ---- EDX ----
8000000a 00000001 00000040 00000000 00000002

00000002 is the value of EDX (10 in binary), and this shows a value of 0 for the SVML bit. This table is in Volume 3, page 617 (653). I understand this to mean that the Turion doesn't support unlocking SVM after the lock bit has been set. According to Volume 2, some architectures do support unlocking after the lock has been set by writing a 64-bit key into a register in the next segment or two prior to resetting the lock and SVM enable/disable bits.

The MSR address c0010114 is responsible for these states, and it has a value of 00000018 (11000 in binary). Volume 2, page 525 (577) shows what these bits are for; the bits SVMDIS and LOCK both being set confirms that the BIOS explicitly disables this feature in all cases and can't be altered by the MSR Editor or any other software.

I used the Phoenix BIOS Tool 2.5.6 to disassemble the NCWxx111.FD file into individual modules and examine the overall structure of the BIOS in an easy-to-read format. I've noted the layout of the driver modules and the various executables within, including one for the POST. While I haven't examined enough BIOSes to know whether or not I'm missing a large driver, I have a hunch that simply changing the data that is written into c0010114 to all zeroes would be sufficient to enable virtualization. It isn't as professional a hack as would be a full integration with the appropriate menu, but it provides the needed feature, and editing data is far less risky than altering any of the actual code.

I'm willing to continue poking around with this if any of the experienced members of this forum are willing guide me in this undertaking.
find
quote
#19
(02-09-2017, 05:36 AM)s⚡dub Wrote: Only to get a sense for how much effort making a proper, fully-functional modification would take, I downloaded a copy of the appropriate manuals for my processor family (I have the AMD Turion TL-64) and perused it for steps to enable virtualization. These are:

Page 447 (499 in Acrobat Reader) of Volume 2 contains a C snippet illustrating how to detect whether or not SVM can be enabled. I emulated the steps using Crystal CPUID to access the model-specific register and the feature flags.

For the step:
Code:
if (CPUID Fn8000_0001_ECX[SVM] == 0)

I have the values in the CPUID Information box:
Code:
CPUID -- EAX ---- EBX ---- ECX ---- EDX ----
80000001 00060f81 000005a3 0000011f ebd3fbff

0000011f is the value of ECX (100011111 in binary), and this shows a value of 1 for the SVM bit. The table is in Volume 3, page 607 (643).

For the step (skipping the second step because we know no software is currently using SVM):
Code:
if (CPUID Fn8000_000A_EDX[SVML] == 0)

I have the values:
Code:
CPUID -- EAX ---- EBX ---- ECX ---- EDX ----
8000000a 00000001 00000040 00000000 00000002

00000002 is the value of EDX (10 in binary), and this shows a value of 0 for the SVML bit. This table is in Volume 3, page 617 (653). I understand this to mean that the Turion doesn't support unlocking SVM after the lock bit has been set. According to Volume 2, some architectures do support unlocking after the lock has been set by writing a 64-bit key into a register in the next segment or two prior to resetting the lock and SVM enable/disable bits.

The MSR address c0010114 is responsible for these states, and it has a value of 00000018 (11000 in binary). Volume 2, page 525 (577) shows what these bits are for; the bits SVMDIS and LOCK both being set confirms that the BIOS explicitly disables this feature in all cases and can't be altered by the MSR Editor or any other software.

I used the Phoenix BIOS Tool 2.5.6 to disassemble the NCWxx111.FD file into individual modules and examine the overall structure of the BIOS in an easy-to-read format. I've noted the layout of the driver modules and the various executables within, including one for the POST. While I haven't examined enough BIOSes to know whether or not I'm missing a large driver, I have a hunch that simply changing the data that is written into c0010114 to all zeroes would be sufficient to enable virtualization. It isn't as professional a hack as would be a full integration with the appropriate menu, but it provides the needed feature, and editing data is far less risky than altering any of the actual code.

I'm willing to continue poking around with this if any of the experienced members of this forum are willing guide me in this undertaking.







can you explain about this in detail please , if possible by snapshots
whatever you said right. i gone through those AMD architectures book.
but setting SVM enable by MSRWR of Crystal CPUID, doesn't allow.
after that i am not able understand yours passage
canyou help this 

"
 Phoenix BIOS Tool 2.5.6 to disassemble the NCWxx111.FD file into individual modules and examine the overall structure of the BIOS in an easy-to-read format. I've noted the layout of the driver modules and the various executables within, including one for the POST. While I haven't examined enough BIOSes to know whether or not I'm missing a large driver, I have a hunch that simply changing the data that is written into c0010114 to all zeroes would be sufficient to enable virtualization. It isn't as professional a hack as would be a full integration with the appropriate menu, but it provides the needed feature, and editing data is far less risky than altering any of the actual code.
"

Thanking you
find
quote
#20
(02-09-2017, 05:36 AM)s⚡dub Wrote: Well, the settings for my Acer Apire E 15
According with the link you posted
I have the values in the CPUID Information box:
Code:
CPUID -- EAX ---- EBX ---- ECX ---- EDX ----
80000001 00660f51 00000000 2FaBBFFF 2FD3FBFF

For the step (skipping the second step because we know no software is currently using SVM):
Code:
if (CPUID Fn8000_000A_EDX[SVML] == 0)

2FaBBFFFf is the value of ECX (0010 1111 1010 1011 1011 1111 1111 1111 in binary), and this shows a value of 1 for the SVM bit. The table is in Volume 3, page 607 (643).

I have the values:
Code:
CPUID -- EAX ---- EBX ---- ECX ---- EDX ----
8000000a 00000001 00008000 00000000 0001BCFF


Bits Field Name Description
2 SVML SVM lock. Indicates support for SVM-Lock. See “Enabling SVM.”

0001BCFFis the value of EDX (0000 0000 0000 0001 1011 1100 1111 1111 in binary), and this shows a value of 0 for the SVML bit. This table is in Volume 3, page 617 (653).

So "F" in EDX register means it does support SVM lock.
So what should I do from here?


Only to get a sense for how much effort making a proper, fully-functional modification would take, I downloaded a copy of the appropriate manuals for my processor family (I have the AMD Turion TL-64) and perused it for steps to enable virtualization. These are:

Page 447 (499 in Acrobat Reader) of Volume 2 contains a C snippet illustrating how to detect whether or not SVM can be enabled. I emulated the steps using Crystal CPUID to access the model-specific register and the feature flags.

For the step:
Code:
if (CPUID Fn8000_0001_ECX[SVM] == 0)

I have the values in the CPUID Information box:
Code:
CPUID -- EAX ---- EBX ---- ECX ---- EDX ----
80000001 00060f81 000005a3 0000011f ebd3fbff

0000011f is the value of ECX (100011111 in binary), and this shows a value of 1 for the SVM bit. The table is in Volume 3, page 607 (643).

For the step (skipping the second step because we know no software is currently using SVM):
Code:
if (CPUID Fn8000_000A_EDX[SVML] == 0)

I have the values:
Code:
CPUID -- EAX ---- EBX ---- ECX ---- EDX ----
8000000a 00000001 00000040 00000000 00000002

00000002 is the value of EDX (10 in binary), and this shows a value of 0 for the SVML bit. This table is in Volume 3, page 617 (653). I understand this to mean that the Turion doesn't support unlocking SVM after the lock bit has been set. According to Volume 2, some architectures do support unlocking after the lock has been set by writing a 64-bit key into a register in the next segment or two prior to resetting the lock and SVM enable/disable bits.

The MSR address c0010114 is responsible for these states, and it has a value of 00000018 (11000 in binary). Volume 2, page 525 (577) shows what these bits are for; the bits SVMDIS and LOCK both being set confirms that the BIOS explicitly disables this feature in all cases and can't be altered by the MSR Editor or any other software.

I used the Phoenix BIOS Tool 2.5.6 to disassemble the NCWxx111.FD file into individual modules and examine the overall structure of the BIOS in an easy-to-read format. I've noted the layout of the driver modules and the various executables within, including one for the POST. While I haven't examined enough BIOSes to know whether or not I'm missing a large driver, I have a hunch that simply changing the data that is written into c0010114 to all zeroes would be sufficient to enable virtualization. It isn't as professional a hack as would be a full integration with the appropriate menu, but it provides the needed feature, and editing data is far less risky than altering any of the actual code.

I'm willing to continue poking around with this if any of the experienced members of this forum are willing guide me in this undertaking.
find
quote


Forum Jump:


Users browsing this thread: 1 Guest(s)