Forum RSS Feed Follow @ Twitter Follow On Facebook

Thread Rating:
  • 2 Vote(s) - 3 Average
  • 1
  • 2
  • 3
  • 4
  • 5
[-]
Welcome
You have to register before you can post on our site.

Username:


Password:





[-]
Latest Threads
[REQUEST] HP Pavilion G42-272BR Whitelis...
Last Post: eepromm
Today 01:55 AM
» Replies: 0
» Views: 21
[REQUEST] Lenovo G710 BIOS Whitelist Rem...
Last Post: voyageur
Yesterday 04:33 PM
» Replies: 475
» Views: 167095
[REQUEST] Acer Aspire 5738(G,Z): CPU Upg...
Last Post: DeathBringer
Yesterday 03:44 PM
» Replies: 49
» Views: 32832
[REQUEST] HP Mini 110-4100 BIOS Unlock
Last Post: DSI INF
Yesterday 09:24 AM
» Replies: 7
» Views: 210
[REQUEST] Lenovo IdeaPad U310 & U410 (65...
Last Post: Dudu2002
Yesterday 03:11 AM
» Replies: 1780
» Views: 493989
Lenovo ThinkCentre M715q 2nd Gen & AMD R...
Last Post: Elmurley
11-20-2024 09:37 PM
» Replies: 2
» Views: 1277
[REQUEST] Lenovo Y50-70 (9ECNxxWW) White...
Last Post: SWZSSR
11-20-2024 09:34 PM
» Replies: 1775
» Views: 553297
[REQUEST] Lenovo Thinkpad X240 (GIETxxWW...
Last Post: Dudu2002
11-20-2024 04:58 PM
» Replies: 337
» Views: 142906
Unlock bios insyde
Last Post: Matox3140
11-19-2024 03:40 PM
» Replies: 0
» Views: 176
Whitelist WIFI card removal Lenovo Yoga ...
Last Post: Dudu2002
11-19-2024 12:58 PM
» Replies: 1
» Views: 187
[REQUEST] H310 MSI Gaming Infinite S (MS...
Last Post: awittyusername
11-19-2024 09:21 AM
» Replies: 10
» Views: 110
[REQUEST] Gigabyte GA-B85M-HD3 Rev 2.0 u...
Last Post: Maduli
11-19-2024 02:22 AM
» Replies: 0
» Views: 130
[REQUEST] Lenovo Ideapad 330-15ICH BIOS ...
Last Post: Dudu2002
11-18-2024 01:25 PM
» Replies: 8
» Views: 1896
[REQUEST] Lenovo ThinkPad Edge E330 (H3E...
Last Post: Dudu2002
11-18-2024 01:23 PM
» Replies: 640
» Views: 220771
[Request] Unlocked Bios for Asus TUF FX5...
Last Post: FlT4ever
11-18-2024 01:05 PM
» Replies: 1
» Views: 414
[REQUEST] Lenovo ThinkPad Edge E125(v1.1...
Last Post: kamome74
11-18-2024 10:43 AM
» Replies: 0
» Views: 169
[REQUEST] Xpg 15g 4070 2023ver InsydeH20...
Last Post: MireVelli
11-18-2024 07:26 AM
» Replies: 2
» Views: 176
Please help me recover my bios
Last Post: FuryOP
11-17-2024 12:37 PM
» Replies: 0
» Views: 193
[Request-Camilo] Sony Vaio SA/SB/SC/SD/S...
Last Post: edit
11-17-2024 12:13 PM
» Replies: 107
» Views: 136930
[REQUEST] Lenovo Thinkpad Edge E440 & E5...
Last Post: Dudu2002
11-17-2024 06:50 AM
» Replies: 196
» Views: 91892

[UNLOCKED] Acer Aspire 5517 bios unlock
#11
Hey forcrz6 I downloaded your zip and tried to run the InsydeFlash.exe but I get this error message

IHISI: get support mode fail SMI !

If anyone knows what is going on please help me out. I might add that I have upgraded the CPU and Ram on this laptop as well as the HDD. Also I fried my board a while ago when replacing the CPU and bought a new one I remember the borads being physically different will the newer on having more chips n such on it but it was still labeled as a Acer Aspire 5517 Mobo. Anyway if any one can help thanks.
find
quote
#12
Confirming I ran the Insideflash posted by forcrz6 in post #7 on my Acer 5532, and it worked perfectly. I was already on the most current 1.11 factory/oe bios, and the one posted here on bios-mods.com successfully unlocked a few areas including an advanced CPU management setting, including the ability to enable "c1e" and "svm".

I'm not overclocked, and dare not to run without these energy saving settings on this older machine, especially with a very weakly designed heatsink. But this custom bios is really nice to have.

Is there any possibility to unlock the virtualization capabilities of my upgraded processor via the bios? Most Turion S1G1 upgrades (which DO support virtualization) from the standard TF-20 processors that came with the computer (which do not support virtualization), are severely limited on these machines. I can tell virtualization is still disabled in my Windows settings, and unless I'm able to unlock it via the bios, I'm not sure what else I can do to unlock this much needed capability.

The goal is to run Mac OS on a virtual machine efficiently to utilize applications that I use which are not supported by Windows.

Thank you for the help and support bios-mods, if anyone can assist with my request for the ability to enable virtualization, I would appreciate it.
find
quote
#13
Is there any chance someone can come through with a bios that allows a user to enable virtualization on these machines? Confirmed in a post above that the Insideflash zip posed by forcrz6, also works on the acer 5532 laptop and allows for some additional modifications not previously available in the manufacturer bios.

Please help if you can.
find
quote
#14
Would anyone be willing to help with modifying this bios to allow for the virtualization setting to be enabled?
find
quote
#15
Information 
The Virtualization is olny shown in the BIOS, if the cpu supports it. Doesn't? The TF-20 CPU doesn't supports virtualization...
find
quote
#16
I've performed the upgrade in post #7 to flash the modified BIOS and have confirmed that the C1E and SVM options are now displayed in the processor settings tab. However, when I run the Microsoft hardware-assisted virtualization detection tool (located at https://www.microsoft.com/en-us/download...spx?id=592), it reports that virtualization support isn't enabled.

I suspect that the modification to the BIOS code in that post changes an unconditional jump instruction to one that doesn't bypass the code for the additional menu functionality. Quite obviously, the modified menu sets the motherboard's nonvolatile memory properly and thus appears to work at first glance, but the appropriate flags in the CPU machine state register aren't being updated to reflect the NVRAM setting for enabled virtualization support.

I think what remains missing is the module that sets the SVM flag in the MSR on POST. It may have been bypassed in a manner not unlike the hidden menu settings. Some casual browsing of CPU programming manuals (which are freely available on the manufacturers' websites) suggest that setting the SVM flag and its lock bit is a fairly easy task to accomplish.

While I don't have the necessary knowledge of assembly language along with the tools to build a fully functional fix, I hope someone else is inspired to do so. Like software, hardware too should be free; the end user should be freely able to do as he wishes with the components he purchased—including adding nonstandard extras.
find
quote
#17
Thanks for the response sdub.  Unfortunate that there isn't a way to unlock virtualization on the 5516, 5517, 5532 Acer notebooks.

e_favero, you are correct, the TF-20 does not support virtualization, however on the 5516, 5517, and 5532 notebooks, you can upgrade to a dual core Turion TL-XX model CPU that does support virtualization.  The issue is, that the BIOS will not allow you to enable that functionality.
find
quote
#18
Only to get a sense for how much effort making a proper, fully-functional modification would take, I downloaded a copy of the appropriate manuals for my processor family (I have the AMD Turion TL-64) and perused it for steps to enable virtualization. These are:

Page 447 (499 in Acrobat Reader) of Volume 2 contains a C snippet illustrating how to detect whether or not SVM can be enabled. I emulated the steps using Crystal CPUID to access the model-specific register and the feature flags.

For the step:
Code:
if (CPUID Fn8000_0001_ECX[SVM] == 0)

I have the values in the CPUID Information box:
Code:
CPUID -- EAX ---- EBX ---- ECX ---- EDX ----
80000001 00060f81 000005a3 0000011f ebd3fbff

0000011f is the value of ECX (100011111 in binary), and this shows a value of 1 for the SVM bit. The table is in Volume 3, page 607 (643).

For the step (skipping the second step because we know no software is currently using SVM):
Code:
if (CPUID Fn8000_000A_EDX[SVML] == 0)

I have the values:
Code:
CPUID -- EAX ---- EBX ---- ECX ---- EDX ----
8000000a 00000001 00000040 00000000 00000002

00000002 is the value of EDX (10 in binary), and this shows a value of 0 for the SVML bit. This table is in Volume 3, page 617 (653). I understand this to mean that the Turion doesn't support unlocking SVM after the lock bit has been set. According to Volume 2, some architectures do support unlocking after the lock has been set by writing a 64-bit key into a register in the next segment or two prior to resetting the lock and SVM enable/disable bits.

The MSR address c0010114 is responsible for these states, and it has a value of 00000018 (11000 in binary). Volume 2, page 525 (577) shows what these bits are for; the bits SVMDIS and LOCK both being set confirms that the BIOS explicitly disables this feature in all cases and can't be altered by the MSR Editor or any other software.

I used the Phoenix BIOS Tool 2.5.6 to disassemble the NCWxx111.FD file into individual modules and examine the overall structure of the BIOS in an easy-to-read format. I've noted the layout of the driver modules and the various executables within, including one for the POST. While I haven't examined enough BIOSes to know whether or not I'm missing a large driver, I have a hunch that simply changing the data that is written into c0010114 to all zeroes would be sufficient to enable virtualization. It isn't as professional a hack as would be a full integration with the appropriate menu, but it provides the needed feature, and editing data is far less risky than altering any of the actual code.

I'm willing to continue poking around with this if any of the experienced members of this forum are willing guide me in this undertaking.
find
quote
#19
(02-09-2017, 05:36 AM)s⚡dub Wrote: Only to get a sense for how much effort making a proper, fully-functional modification would take, I downloaded a copy of the appropriate manuals for my processor family (I have the AMD Turion TL-64) and perused it for steps to enable virtualization. These are:

Page 447 (499 in Acrobat Reader) of Volume 2 contains a C snippet illustrating how to detect whether or not SVM can be enabled. I emulated the steps using Crystal CPUID to access the model-specific register and the feature flags.

For the step:
Code:
if (CPUID Fn8000_0001_ECX[SVM] == 0)

I have the values in the CPUID Information box:
Code:
CPUID -- EAX ---- EBX ---- ECX ---- EDX ----
80000001 00060f81 000005a3 0000011f ebd3fbff

0000011f is the value of ECX (100011111 in binary), and this shows a value of 1 for the SVM bit. The table is in Volume 3, page 607 (643).

For the step (skipping the second step because we know no software is currently using SVM):
Code:
if (CPUID Fn8000_000A_EDX[SVML] == 0)

I have the values:
Code:
CPUID -- EAX ---- EBX ---- ECX ---- EDX ----
8000000a 00000001 00000040 00000000 00000002

00000002 is the value of EDX (10 in binary), and this shows a value of 0 for the SVML bit. This table is in Volume 3, page 617 (653). I understand this to mean that the Turion doesn't support unlocking SVM after the lock bit has been set. According to Volume 2, some architectures do support unlocking after the lock has been set by writing a 64-bit key into a register in the next segment or two prior to resetting the lock and SVM enable/disable bits.

The MSR address c0010114 is responsible for these states, and it has a value of 00000018 (11000 in binary). Volume 2, page 525 (577) shows what these bits are for; the bits SVMDIS and LOCK both being set confirms that the BIOS explicitly disables this feature in all cases and can't be altered by the MSR Editor or any other software.

I used the Phoenix BIOS Tool 2.5.6 to disassemble the NCWxx111.FD file into individual modules and examine the overall structure of the BIOS in an easy-to-read format. I've noted the layout of the driver modules and the various executables within, including one for the POST. While I haven't examined enough BIOSes to know whether or not I'm missing a large driver, I have a hunch that simply changing the data that is written into c0010114 to all zeroes would be sufficient to enable virtualization. It isn't as professional a hack as would be a full integration with the appropriate menu, but it provides the needed feature, and editing data is far less risky than altering any of the actual code.

I'm willing to continue poking around with this if any of the experienced members of this forum are willing guide me in this undertaking.







can you explain about this in detail please , if possible by snapshots
whatever you said right. i gone through those AMD architectures book.
but setting SVM enable by MSRWR of Crystal CPUID, doesn't allow.
after that i am not able understand yours passage
canyou help this 

"
 Phoenix BIOS Tool 2.5.6 to disassemble the NCWxx111.FD file into individual modules and examine the overall structure of the BIOS in an easy-to-read format. I've noted the layout of the driver modules and the various executables within, including one for the POST. While I haven't examined enough BIOSes to know whether or not I'm missing a large driver, I have a hunch that simply changing the data that is written into c0010114 to all zeroes would be sufficient to enable virtualization. It isn't as professional a hack as would be a full integration with the appropriate menu, but it provides the needed feature, and editing data is far less risky than altering any of the actual code.
"

Thanking you
find
quote
#20
(02-09-2017, 05:36 AM)s⚡dub Wrote: Well, the settings for my Acer Apire E 15
According with the link you posted
I have the values in the CPUID Information box:
Code:
CPUID -- EAX ---- EBX ---- ECX ---- EDX ----
80000001 00660f51 00000000 2FaBBFFF 2FD3FBFF

For the step (skipping the second step because we know no software is currently using SVM):
Code:
if (CPUID Fn8000_000A_EDX[SVML] == 0)

2FaBBFFFf is the value of ECX (0010 1111 1010 1011 1011 1111 1111 1111 in binary), and this shows a value of 1 for the SVM bit. The table is in Volume 3, page 607 (643).

I have the values:
Code:
CPUID -- EAX ---- EBX ---- ECX ---- EDX ----
8000000a 00000001 00008000 00000000 0001BCFF


Bits Field Name Description
2 SVML SVM lock. Indicates support for SVM-Lock. See “Enabling SVM.”

0001BCFFis the value of EDX (0000 0000 0000 0001 1011 1100 1111 1111 in binary), and this shows a value of 0 for the SVML bit. This table is in Volume 3, page 617 (653).

So "F" in EDX register means it does support SVM lock.
So what should I do from here?


Only to get a sense for how much effort making a proper, fully-functional modification would take, I downloaded a copy of the appropriate manuals for my processor family (I have the AMD Turion TL-64) and perused it for steps to enable virtualization. These are:

Page 447 (499 in Acrobat Reader) of Volume 2 contains a C snippet illustrating how to detect whether or not SVM can be enabled. I emulated the steps using Crystal CPUID to access the model-specific register and the feature flags.

For the step:
Code:
if (CPUID Fn8000_0001_ECX[SVM] == 0)

I have the values in the CPUID Information box:
Code:
CPUID -- EAX ---- EBX ---- ECX ---- EDX ----
80000001 00060f81 000005a3 0000011f ebd3fbff

0000011f is the value of ECX (100011111 in binary), and this shows a value of 1 for the SVM bit. The table is in Volume 3, page 607 (643).

For the step (skipping the second step because we know no software is currently using SVM):
Code:
if (CPUID Fn8000_000A_EDX[SVML] == 0)

I have the values:
Code:
CPUID -- EAX ---- EBX ---- ECX ---- EDX ----
8000000a 00000001 00000040 00000000 00000002

00000002 is the value of EDX (10 in binary), and this shows a value of 0 for the SVML bit. This table is in Volume 3, page 617 (653). I understand this to mean that the Turion doesn't support unlocking SVM after the lock bit has been set. According to Volume 2, some architectures do support unlocking after the lock has been set by writing a 64-bit key into a register in the next segment or two prior to resetting the lock and SVM enable/disable bits.

The MSR address c0010114 is responsible for these states, and it has a value of 00000018 (11000 in binary). Volume 2, page 525 (577) shows what these bits are for; the bits SVMDIS and LOCK both being set confirms that the BIOS explicitly disables this feature in all cases and can't be altered by the MSR Editor or any other software.

I used the Phoenix BIOS Tool 2.5.6 to disassemble the NCWxx111.FD file into individual modules and examine the overall structure of the BIOS in an easy-to-read format. I've noted the layout of the driver modules and the various executables within, including one for the POST. While I haven't examined enough BIOSes to know whether or not I'm missing a large driver, I have a hunch that simply changing the data that is written into c0010114 to all zeroes would be sufficient to enable virtualization. It isn't as professional a hack as would be a full integration with the appropriate menu, but it provides the needed feature, and editing data is far less risky than altering any of the actual code.

I'm willing to continue poking around with this if any of the experienced members of this forum are willing guide me in this undertaking.
find
quote


Forum Jump:


Users browsing this thread: 1 Guest(s)