-
Posts
201 -
Joined
-
Last visited
-
Days Won
1
Content Type
Profiles
Forums
Downloads
Posts posted by deadsmiley
-
-
Hey, Prema! First off, just wanted to say I think it's awesome what you're doing by making these BIOS mods and giving them to the community ! It's really impressive, to say the least.
So, VT-d actually does appear to work in the core logic, but VT-x for virtualization is what isn't working. The option shows up in your BIOS, which I have enabled, but it doesn't do anything in Windows. So, not to say that your BIOS isn't a /massive/ step up from Clevo/Sager's complete piece of ****, (I love all the features you have in Prema Mod), but I"m just wondering if you've seen this issue before, or if you have any tips. I assembled a custom BIOS based off Clevo's stock (symcmos dumped and disassembled theirs), except I attempted to permanently set Vt-x to enable. I'm wondering what methodology you've used, or if there might be something interesting about this particular laptop model. Basically, I looked at --> http://www.intel.com/content/dam/www/public/us/en/documents/manuals/64-ia-32-architectures-software-developer-vol-3c-part-3-manual.pdf, and it appears as though IA32_VMX_PROCBASED_CTLS2 MSR (register 48BH) bit 63 needs to be set to 1, although I compiled and flashed this, and it still didn't work for me T.T, although at least I didn't brick anything. So, I flashed your mod back on this machine, because it's way superior to Clevo's stock, but yea just wondering if you have more insight into getting VT-x enabled.
Thank again for providing this mod to the community =)
I think the root cause of why your mod didn't work is because you were flipping the wrong bits. You should be looking at IA32_FEATURE_CONTROL as described on this page.
Activating the Intel VT Virtualization Feature - Thomas Krenn Wiki
This got me interested in sharing your quest. I must freely admit that I have never attempted to alter a BIOS. I don't even know where to start, but I read tech manuals every day in my line of work. Perhaps I should start?
Here is another link to enabling virtualization that I am still trying to digest. Maybe our fine friend Prema can be convinced to look into this problem for us?
-
Eeewww... I would like to know the answer to this as well. I am very close to pulling the trigger on this laptop and I use VMWare quite a bit.
Oh, and this is my first post to this forum.
Clevo P370SM3
in Clevo
Posted
I think the control you are looking for is IA32_FEATURE_CONTROL on page 5.
23.7 ENABLING AND ENTERING VMX OPERATION
Before system software can enter VMX operation, it enables VMX by setting CR4.VMXE[bit 13] = 1. VMX operation
is then entered by executing the VMXON instruction. VMXON causes an invalid-opcode exception (#UD) if executed
with CR4.VMXE = 0. Once in VMX operation, it is not possible to clear CR4.VMXE (see Section 23.8). System soft-
ware leaves VMX operation by executing the VMXOFF instruction. CR4.VMXE can be cleared outside of VMX opera-
tion after executing of VMXOFF.
VMXON is also controlled by the IA32_FEATURE_CONTROL MSR (MSR address 3AH). This MSR is cleared to zero
when a logical processor is reset. The relevant bits of the MSR are:
• Bit 0 is the lock bit. If this bit is clear, VMXON causes a general-protection exception. If the lock bit is set,
WRMSR to this MSR causes a general-protection exception; the MSR cannot be modified until a power-up reset
condition. System BIOS can use this bit to provide a setup option for BIOS to disable support for VMX. To
enable VMX support in a platform, BIOS must set bit 1, bit 2, or both (see below), as well as the lock bit.
• Bit 1 enables VMXON in SMX operation. If this bit is clear, execution of VMXON in SMX operation causes a
general-protection exception. Attempts to set this bit on logical processors that do not support both VMX
operation (see Section 23.6) and SMX operation (see Chapter 6, “Safer Mode Extensions Reference,” in Intel®
64 and IA-32 Architectures Software Developer’s Manual, Volume 2B) cause general-protection exceptions.
• Bit 2 enables VMXON outside SMX operation. If this bit is clear, execution of VMXON outside SMX
operation causes a general-protection exception. Attempts to set this bit on logical processors that do not
support VMX operation (see Section 23.6) cause general-protection exceptions.