Forum RSS Feed Follow @ Twitter Follow On Facebook

Thread Rating:
  • 11 Vote(s) - 4.64 Average
  • 1
  • 2
  • 3
  • 4
  • 5
[-]
Welcome
You have to register before you can post on our site.

Username:


Password:





[-]
Latest Threads
[REQUEST] Bios for packard bell tj65 wit...
Last Post: THECAIDA
Today 03:49 PM
» Replies: 2
» Views: 52
[REQUEST] Lenovo G710 BIOS Whitelist Rem...
Last Post: Dudu2002
Today 02:47 PM
» Replies: 476
» Views: 167637
[REQUEST] Lenovo Thinkpad X230(i) (G2ETx...
Last Post: Dudu2002
Today 02:46 PM
» Replies: 1089
» Views: 448946
[REQUEST] Lenovo G50-70 (9ACNxxWW) White...
Last Post: tarikyeter
Today 02:44 PM
» Replies: 236
» Views: 88991
[REQUEST] Remove whitelist in a Panasoni...
Last Post: coco62
Today 11:20 AM
» Replies: 2
» Views: 1570
Lenovo ThinkPad SL510 Whitelist Removal....
Last Post: deepTeNk
Yesterday 03:32 PM
» Replies: 5
» Views: 6364
[REQUEST] HP Pavilion G42-272BR Whitelis...
Last Post: eepromm
11-22-2024 01:55 AM
» Replies: 0
» Views: 131
[REQUEST] Acer Aspire 5738(G,Z): CPU Upg...
Last Post: DeathBringer
11-21-2024 03:44 PM
» Replies: 49
» Views: 32967
[REQUEST] HP Mini 110-4100 BIOS Unlock
Last Post: DSI INF
11-21-2024 09:24 AM
» Replies: 7
» Views: 275
[REQUEST] Lenovo IdeaPad U310 & U410 (65...
Last Post: Dudu2002
11-21-2024 03:11 AM
» Replies: 1780
» Views: 496537
Lenovo ThinkCentre M715q 2nd Gen & AMD R...
Last Post: Elmurley
11-20-2024 09:37 PM
» Replies: 2
» Views: 1304
[REQUEST] Lenovo Y50-70 (9ECNxxWW) White...
Last Post: SWZSSR
11-20-2024 09:34 PM
» Replies: 1775
» Views: 554985
[REQUEST] Lenovo Thinkpad X240 (GIETxxWW...
Last Post: Dudu2002
11-20-2024 04:58 PM
» Replies: 337
» Views: 144071
Unlock bios insyde
Last Post: Matox3140
11-19-2024 03:40 PM
» Replies: 0
» Views: 250
Whitelist WIFI card removal Lenovo Yoga ...
Last Post: Dudu2002
11-19-2024 12:58 PM
» Replies: 1
» Views: 243
[REQUEST] H310 MSI Gaming Infinite S (MS...
Last Post: awittyusername
11-19-2024 09:21 AM
» Replies: 10
» Views: 147
[REQUEST] Gigabyte GA-B85M-HD3 Rev 2.0 u...
Last Post: Maduli
11-19-2024 02:22 AM
» Replies: 0
» Views: 191
[REQUEST] Lenovo Ideapad 330-15ICH BIOS ...
Last Post: Dudu2002
11-18-2024 01:25 PM
» Replies: 8
» Views: 1910
[REQUEST] Lenovo ThinkPad Edge E330 (H3E...
Last Post: Dudu2002
11-18-2024 01:23 PM
» Replies: 640
» Views: 221736
[Request] Unlocked Bios for Asus TUF FX5...
Last Post: FlT4ever
11-18-2024 01:05 PM
» Replies: 1
» Views: 433

(UEFI) Dell XPS 15z L511z modded BIOS - and HOWTO
I assume Setup modules (which essentially are tabs from the BIOS setup) generally are safe to modify .. well, to a certain degree...
It's the options we unlock that can cause some unwanted results .. like CMOS corruption or an option that if enabled will cause the machine to fail during post/boot.

I've looked at the strings related to TPM and it appears to be checking whether or not there is a TPM device installed on the board .. which I assume is your standard USB-hosted Biometric reader that has a key (fingerprint enrollment) storage that you could use to unlock your laptop when it boots. Vostro 3450 has one, but the functionality in windows is poor.

The crisis recovery feature of course is a number one priority, however reading on IXBT I have seen cases with Insyde H20 that even USB recovery won't boot anymore after tampering with PEG/SG and other stuff.. so you still have to be really careful to do even slightest adjustments. And bear in mind that Insyde is pretty much deciphered already as there are scripts and software that parses the *.efi modules and translates them into human readable text.. which we don't have such a privilege with our Tiano.
find
quote
Hello guys,

I know this is offtopic, but:
I can't find any forums that discuss the new OSX posibilities coming with the unlocking of the BIOS, any idea where we could talk about this?
I've been following this thread religiously and I am very glad it's unlocked, congrats to all the hardworking devs on this, jkhuba especially.

I tried installing OSX (Lion) a few months back with little to no success, could only boot from a USB Stick (I guess that's fixed now with UEFI Boot enabled), and I had [censored] with the graphics card, long story short here's a list with all the problems I had http://www.tonymacx86.com/lion-laptop-su...ll-10.html if you care to read (same username, ArthurianX).

My question now is, could someone (someone who's got OSX working) possibly upload and document all the files and modifications he or she did to make OSX work for our XP15z's? I'm willing to help, and to make tutorial/howto for others to make our laptops run OSX.

Thank you for reading, and even greater thanks for future answers and problem solving,
Arthur
find
quote
What i know for sure is that with classic locked bios you can't boot anything of off GPT-formated HDD/USB flashdrive. Since 15Z and Vostro 3450 share almost identical Phoenix SecureCore Tiano one can assume that everything below will be common for these series of machines:

With UEFI Boot unlocked we are now able to install EFI windows 7/8 or UEFI Clover onto a GPT disk .. however according to dmazar - one of the coders for Clover who is responsible for most of the UEFI fixes... even though our memory map looks cleaner than any other UEFI version out there and in theory wouldn't need any fixes to boot OSX... theres is a problem with runtime services and NVRAM implementation, so the system boots and hangs for about 10 minutes, you cant click on anything, but everything is active.. it's sort of like a transparent layer that prevents you from clicking on things. After 8 to 10 minutes it magically unfreezes and you are able to use the system just fine. According to dmazar it's not fixable yet.. and theres no ETA, because the reason is unknown. I can access third-party shell to set up an additional bcfg entry which points to cloverx64.efi in /EFI/BOOT folder but it's unusable at this point of time.. as you can't do much without with a OS that does not support runtime and NVRAM ...

I believe you are still unable to boot something like Chimera/Chameleon/XPC of off GPT disk because it wil say "No Operation System Found" as only thing UEFI Boot does is looks for the bootx64.efi file in /EFI/BOOT those allowing you to boot with OEM efi modules/drivers.
P.S. You are welcome here
find
quote
ok, took me a while, but I made a list of all the modules inside l502x a11 bios.

here is it if someone want to check it (it is as file attachment to this post)


oh, just wondering someone got the uefi shell unlocked on their bios


Attached Files
.txt   modules.txt (Size: 24.25 KB / Downloads: 22)
find
quote
The uefi shell isn't part of the bios, you need to load it from an usb drive, should work fine.

find
quote
It actually IS a part of the bios of you look closely. There's even an option to access it which is hidden.
Shell.efi C57AD6B7-0515-40A8-9D21-551652854E37_1_967.ROM
Also using a third party UEFI shell through /EFI/BOOT/bootx64.efi with UEFI Boot enabled can get you somewhere .. just don't know where ..

Also I just thought of something ... would it be possible to rename SystemCrisisRecoveryPei.efi as bootx64.efi and place it into /EFI/BOOT/bootx64.efi with UEFI boot enabled to be able to initiate the recovery .. I think you can extract the module using MMTOOL .. Technically if the module starts with MZ it will be called if dependencies are satisfied. Of course to access it we would have to have a somewhat bootable machine. If It doesn't start with MZ we would have to delete the header part until MZ is the initial offset, because we are unable to call for defined offset by booting in this manner.

P.S. Stumbled upon this abstract description over at mydigitallife forums:
Quote:Phoenix UEFI SHELL Flash Utility 1.5.2.0 (PFlash.efi)

1) Download latest bios for Dell Vostro 3450 (assuming XPS shares the same BIOS it would apply as well)
2) Open with 7zip -> Vostro_3450_AXX.exe -> .rsrc -> 1024 -> RCDATA -> 7000 (this is the BIOS.cap) file.
3) PFlash.efi lives inside.

This might help with the Phoenix UEFI Crisis Recovery process previously documented.

Also this:
Quote:To create the Crisis Recovery disk:
1 Prepare a removable USB storage device with a capacity size greater than 10 MB.
Note that all data on the USB storage device will be cleared during the creation of the crisis disk.
2 Set up a computer running the Windows OS and plug in the USB storage device into an available USB port.
3 Use the text editor to create a file named startup.nsh with the following contents.
fs0TongueFlash.efi/bb1/silent/sv/sd xxxxxxxx.fd (where xxxxxxxx.fd is the new BIOS image file)
4 Copy the startup.nsh file and the following folder and files to the USB storage device.
– EFI folder
– BIOS.cap
– PFlash.efi
– CrisisRecovery.efi
– BIOS image file
5 Eject and reconnect the USB storage device, and make sure the files are saved to the device.
source: http://forums.mydigitallife.info/threads...res/page82

The last method seems legit. Having Shell named as bootx64.efi in /EFI/BOOT on your usb stick would execute shell as soon as you boot of off the USB flash drive (with UEFI boot enabled) the startup script startup.nsh (placed nearby bootx64.efi) would be executed right away (I have tried it already to do UEFI dump) which in hand would run CrisisRecovery.efi from filesystem0 (same diskXs1) that would fash the image ..
find
quote
Hey guys - good to see some progress made since I've last been here. I have a couple of questions:

1) I haven't yet tried to patch the Security dxe module with the suppress efi module. Has anyone done so, and if so, to what effect?

2) @TimeWalker - I think your method could possibly work. If you do manage to do this let me know so I'll try and replicate it on a non-battery removable device such as the xps 15z.

3) Something else crossed my mind as well - there's the fvrecovery.fd file which is extracted during each bios flash. Surely this contains some form of recovery module?
find
quote
(10-03-2012, 11:56 AM)jkbuha Wrote: Hey guys - good to see some progress made since I've last been here. I have a couple of questions:

1) I haven't yet tried to patch the Security dxe module with the suppress efi module. Has anyone done so, and if so, to what effect?

2) @TimeWalker - I think your method could possibly work. If you do manage to do this let me know so I'll try and replicate it on a non-battery removable device such as the xps 15z.

3) Something else crossed my mind as well - there's the fvrecovery.fd file which is extracted during each bios flash. Surely this contains some form of recovery module?


1)
I replaced both 0A 82 45 8A (00) 00 00 00 00 00 00 00 45 0A strings at the SystemSetupSecurityDxe.efi module with 0A 82 45 8A (01) 00 00 00 00 00 00 00 45 0A

I am going to flash it and will report any change, I supose I have to expect extra stuff at the security tab inside the setup, right?


3)
yeah, I though about that several times, but I have no idea about how to access that file.

edit: I found that it can be also opened via PhoenixTool app, it also extracted several modules, I think that is worth of a deeper analysis Smile
find
quote
keep us posted, kasar!

Well, in a nutshell ... this is what's crawling my mind right now.

1. startup.nsh with fs0TongueFlash.efi/bb1/silent/sv/sd xxxxxxxx.fd <- this is clear so far, of course if the arguments are universal for all the Phoenix Tiano machines. fs0: defines working directory for the file system .. specifying PFlash.efi and arguments runs the respective efi module much like a terminal program .. which shell is .. in a way.
2. xxxxxxxx.fd is the new BIOS image file <- ok. we can get this *.fd file after every fw extraction. if it's indeed the BIOS image file then it's check.
3. BIOS.cap <- according to a ost regarding Vostro 3450 this can be obtained from the official updater
4. PFlash.efi <- BIOS.cap (or *.scap to be precise) are the files (firmware containers) that are being used by Apple to hold the firmware, you can extract the modules neatly using MMTOOL .. I have done it previously. So PFlash.efi should be there its the module that is executed when you run the official updater from within WinFlash. The blue interface thingy that beeps like crazy Big Grin
5. CrisisRecovery.efi <- this can probably be extracted the same way.. if no, then backup plan like I said previously .. we know the GUID, if it starts with MZ -> cool, if not -> we trim it Smile
6. BIOS image file <- that's already taken care of ...

We just have to gather everything together then .. I have a somewhat important test on Friday, so I'm not really willing to tamper with this at this point of time, but I will take a look tomorrow wether I can gather all the stuff for my Vostro to test the method.

P.S. wtf, this has been documented by Acer for ages (Packard Bell subdivision):
http://puu.sh/1b3se
http://puu.sh/1b3ti
find
quote
@all

as promised I flashed the new bios.

here you can see the security tab with stock bios:

[Image: bios3p.jpg]



and here with the modded bios

[Image: dsc0069isv.jpg]

as you can see two new options apeared, min and max password lenght.

not a big enchancement, but well, every new option is welcome Smile

conclusion, yes, it worked and unlocked more features ^^

computrace option still grey out and cant be changed since I disabled it.

maybe we can do a trick to that? Big Grin

waiting for more hex strings to change, every hex string I tried from this topic it worked flawesly! Smile
find
quote


Forum Jump:


Users browsing this thread: 37 Guest(s)