Ok i will...Also the backup as well.
[automerge]1572907402[/automerge]
do you mind Zip the ROM, and send them to me via PM?
Ok i will...Also the backup as well.
[automerge]1572907402[/automerge]
do you mind Zip the ROM, and send them to me via PM?
I am on the phone and can't find where to send you a pm...Ok i will...
Thanks for keep testing even though you know the risk.
Hopefully that won’t happen again, but if really brick again, please remember to hardware dump the corrupted ROM image.
Anyway, my config file is more complicated than that. To mix 5,1 and 7,1’s info “correctly”, I use manual mode, but not auto mode.
That’s why I didn’t post it yet, awant to do that with a proper keyboard.
Even may be you only want the config file. I
still prefer to explain what I changed and why.
My config file only work for my hardware setup. Definitely won’t work for everyone automatically.
I may also need to explain more about how to edit that config to fit your own hardware.
Sorry well this time i lost everything my dumped rom, i had to reinstall everything from scratch as my nvme got somehow corrupted too.You tried all the ports on the graphic card?
There should be only one port works with that config file.
@h9826790 This is the time that we need to stop and take some steps back. You provided enough info to reproduce your findings and we confirmed it. Now people without the necessary knowledge are trying to the same and consequently more people will brick backplanes.
Like I said before, #673, #678, #680 I'm inclined to say that spoofing another Mac is not safe and for sure is a blunt solution to achieve HEVC hardware encoding.
We now need to work in two different ways, the first one is to determine what is triggering the binary blobs inside the NVRAM and work with OpenCore developers to prevent it since we still need OC for the VMM flag spoofing, the second one is to investigate what Apple test inside AppleGVA for HEVC to be activated and implement it without SMBIOS spoofing.
SMBIOS spoofing is a Pandora’s box. It’s very useful for investigate and develop, but I bet that now people will use it as a easy way to fake 2012 Mac Pros, for example.
[/QUOTE
i think that i can still go on with the testing as i now have a bed testing machine, so i really don't mind testing with the files H9826790 has and report . I also think its up to me to decide wether or not i want to brick my own machine and do testing to also contribute with this, with all my due respect. As far i know i did not complain but rather even laugh about. So i asked him if it could share the files so we could see where the problem would be eventually or reproduce if problem there is with OC or SMBIOS ...
I want to say thank you for the hard work and i am confident we together can do great.
That is why i asked the files, with i can try to reproduce. And it could happen again. I was going to give the corrupted one when my nvme ssd got corrupted or something i could not access the ssd and lost everything that was on. Sorry.@205Maxi For sure, you are free to do as you please, but you are not helping since you didn’t save the bricked dump and for some weird motive you can’t provide the backup/dump it again for us to check if you already had problems that could cause the brick.
Anyway, I already told what I had to say about SMBIOS spoofing and I’m going back to investigate the binary blobs.
If you really want to help, stop what you are doing and dump your BootROM immediately and let @h9826790 check it before anything (since Martin is out of town, I can check it when I have free time).That is why i asked the files, with i can try to reproduce. And it could happen again. I was going to give the corrupted one when my nvme ssd got corrupted or something i could not access the ssd and lost everything that was on. Sorry.
You can disable the startup chime by turning down the Internal Speakers volume before restarting (might need to disconnect headphones and line out to see the Internal Speakers option).Anyway, brick means won’t POST. You can’t hear the “Don”.
You can disable the startup chime by turning down the Internal Speakers volume before restarting (might need to disconnect headphones and line out to see the Internal Speakers option).
That is why i asked the files, with i can try to reproduce. And it could happen again. I was going to give the corrupted one when my nvme ssd got corrupted or something i could not access the ssd and lost everything that was on. Sorry.
Boot from recovery and you should be able to bless the partition or disable SIP if you want to execute it from within macOS
Edit: Another option is to bless the BOOTx64.efi file:
Code:sudo bless --mount /Volumes/EFI --setBoot --file /Volumes/EFI/EFI/BOOT/BOOTx64.efi
I keep getting the following error with or without following your suggestion. I don't get it I have followed the guide in post one implicitly I don't know what I am missing
I get this error as follows.
Can't load /Volumes/EFI/usr/standalone/i386/apfs.efi
Could not load apfs.efi data from /Volumes/EFI/usr/standalone/i386/apfs.efi
You can disable the startup chime by turning down the Internal Speakers volume before restarting (might need to disconnect headphones and line out to see the Internal Speakers option).
I stopped the chime on my Mac mini 3.1 with NVRAM variable.I know that speaker volume thing, but still that’s for eliminating some possible unnecessary confusion.
Anyway, line out or headphone won’t stop that chime. I tested it on my cMP.
I am using 0.5.2 version. On the top of my head the second field for the cpuid equal to 0 in hex removes the VMM flag. I believe this is how the config file in the post is because I had to make second field the same as the first one using the config file.does your config file works too if using the latest OpenCore 0.5.2 and AppleSupportPkg 2.1.2 ?
@cdf does your config file works too if using the latest OpenCore 0.5.2 and AppleSupportPkg 2.1.2 ?
To revert to a non-VMM-flag , without a PRAM reset, is suffice to remove that entire XML "Emulate" string <dict></dict> , or the cpuid1mask entry should be reverted first to its default value to "A*==" rebooting from OC bootloader ?
This may be a solution to prevent NVRAM write:@h9826790 This is the time that we need to stop and take some steps back. You provided enough info to reproduce your findings and we confirmed it. Now people without the necessary knowledge are trying to the same and consequently more people will brick backplanes.
Like I said before, #673, #678, #680 I'm inclined to say that spoofing another Mac is not safe and for sure is a blunt solution to achieve HEVC hardware encoding.
We now need to work in two different ways, the first one is to determine what is triggering the binary blobs inside the NVRAM and work with OpenCore developers to prevent it since we still need OC for the VMM flag spoofing, the second one is to investigate what Apple test inside AppleGVA for HEVC to be activated and implement it without SMBIOS spoofing.
SMBIOS spoofing is a Pandora’s box. It’s very useful for investigate and develop, but I bet that now people will use it as a easy way to fake 2012 Mac Pros, for example.
I too suggested this path, but ideally we want to keep it as non-hackintosh as possible, was the essential answer.This may be a solution to prevent NVRAM write:
Emulated NVRAM | Opencore Vanilla Desktop Guide
khronokernel-2.gitbook.io
The end goal is to enable hardware encoding and the less we hackintosh our MP5,1s, the better. Maybe we will need to enable NVRAM emulation for investigating what is needed in a safe way for people that don't have MATT cards or a way to easily reflash the SPI, so I'll take a look at it.I too suggested this path, but ideally we want to keep it as non-hackintosh as possible, was the essential answer.
4D1FDA02-38C7-4A6A-9CC6-4BCCA8B30102:opencore-version REL-052-2019-10-30
machdep.cpu.features: FPU VME DE PSE TSC MSR PAE MCE CX8 APIC SEP MTRR PGE MCA CMOV PAT PSE36 CLFSH DS ACPI MMX FXSR SSE SSE2 SS HTT TM PBE SSE3 DTES64 MON DSCPL VMX SMX EST TM2 SSSE3 CX16 TPR PDCM SSE4.1 XSAVE
I can't notice the VMM flag, maybe the "cpuidmask" for "mobile cpus" is different ?
sysctl kern.hv_support
Out of curiosity: can you check the output of the following command?
Code:sysctl kern.hv_support
kern.hv_support: 0