- Posts: 153
- Karma: 6
- Thank you received: 39
Please Log in or Create an account to join the conversation.
Please Log in or Create an account to join the conversation.
Please Log in or Create an account to join the conversation.
Please Log in or Create an account to join the conversation.
./rom_scan_patcher.pl <firmware_dump_filename>
flashrom -p linux_spi:dev=/dev/spidev0.0 -c 'IF_IT_NECESSARY' <generated arguments>
$ ./rom_scan_patcher.pl ./Example.bin
System byteorder: Little Endian
Mode: Only scanning = 0, Silent = 0
ROM: ./Example.bin
Intel BIOS signature found
Apple Specific Data block start found at: 0x00610000
Scanner should find first var within 2048 bytes of data...
'PchInit' usually... or 'Setup'
Variable at: 0x00610060 RFT: 2, Sizes (Key: 12 Value: 176)
GUID: abbafb4d9213de4fabb8c41cc5ad7d5d at: 0x00610070 (6357104)
Key: Setup Value: 0000000000000000010000000000010001000001000001010201010301010001020000000000000101010101010101010100000000000000000000000000000000010100000001010000000000000000000000000000000000000001010a01010100030000000000000101010101000000010101010100000000000000000000000101010101000000030303030303030301010101010101010000000000000000000000000000000000000000000000
====
File size: 0x007fffff (8388608) bytes. Record format type 2 detected
Image for 8 Mbytes flash chip
= Calculated SVS start offset: 0x00632050 (6496336)=
SVS: 24535653b01f00005afefe0100000000
== Match stamp type: 2
= Calculated SVS end offset: 0x00634050 (6504528)=
SVS: 24535653b01f00005afefe0100000000
== Match stamp type: 2
Password area looks fine... Password is set or was set.
Password record parsing...
GUID: 5ea78df6551b704eb41ba7b7a5b758ea offset: 0x00632070 (6496368)
State: 7f00, Key: 3E6D568B, Value Size: 4
Value: 02000500
GUID: 5ea78df6551b704eb41ba7b7a5b758ea offset: 0x006320aa (6496426)
State: 7c00, Key: , Value Size: 8
Value: 0000000000000000
GUID: 5ea78df6551b704eb41ba7b7a5b758ea offset: 0x006320e8 (6496488)
State: 7f00, Key: CBF2CC32, Value Size: 69
Value: ff23804e9aa7d147a3427524cfc96dc400bbaf9026106a5df38337d05c2cb94848721666440e723638a7cc5d5ca59a6a674fcd20e61b63da409ff200003ee5010001000000
GUID: 5ea78df6551b704eb41ba7b7a5b758ea offset: 0x00632163 (6496611)
State: 7f00, Key: BC9772C5, Value Size: 8
Value: deac04db76a2a8e2
==
RFT: 2, SVS offset: 0x00632050, password set 1 time(s) and ACTIVE
Ready for pathing... [confirm]
Ready for pathing... [confirm]
FireUp
Output to: ./Example.bin.modified
SVS area cleaner: SVS_Type2.bin at offset: 0x00632050
Layout file for 'flashrom':
00000000:0063204f UpperZone
00632050:0063404f SVS
00634050:007fffff LowerZone
UpperZone end at: 0x0063204f, 6496335 bytes
LowerZone end at: 0x007fffff, 1884080 bytes
Copy original file... done.
Setup pointer to: 0x00632050 returned: 0x00632050 patching... done.
Created files:
Modified ROM: ./Example.bin.modified
Flashrom Layout: ./flashrom.layout
===
Arguments for 'flashrom': --layout ./flashrom.layout --image SVS -w ./Example.bin.modified
===
flashrom -p linux_spi:dev=/dev/spidev0.0 -c "MX25L6406E/MX25L6408E" --layout ./flashrom.layout --image SVS -w ./Example.bin.modified
Please Log in or Create an account to join the conversation.
Please Log in or Create an account to join the conversation.
We have 352 guests and no members online
This website uses cookies to manage authentication, navigation, and other functions. By using our website, you agree that we can place these types of cookies on your device.
You have declined cookies. This decision can be reversed.
You have allowed cookies to be placed on your computer. This decision can be reversed.
This website uses cookies to manage authentication, navigation, and other functions. By using our website, you agree that we can place these types of cookies on your device.