|
@@ -78,14 +78,16 @@ is included in that program's directory, or you can read it online here:
|
|
|
|
|
|
<https://browse.libreboot.org/lbmk.git/plain/util/e6400-flash-unlock/README.md>
|
|
|
|
|
|
-Literally just run that program, and do what it says. You run it once, and
|
|
|
-shut down, and when you do, the system brings itself back up automatically.
|
|
|
-Then you run it and flash it unlocked. Then you run it again. The source code
|
|
|
-is intuitive enough that you can easily get the gist of it; it's writing some
|
|
|
-EC commands. The EC on this machine is hooked up to the `GPIO33` signal,
|
|
|
-sometimes called `HDA_DOCK_EN`, which sets the flash descriptor override
|
|
|
-thus disabling any flash protection by the IFD - Dell's BIOS doesn't set any
|
|
|
-other type of protection either, such as writing to Protected Range registers.
|
|
|
+Literally just run that program, and do what it says. You run it once, and shut
|
|
|
+down, and when you do, the system brings itself back up automatically. Then
|
|
|
+you run it and flash it unlocked. Then you run it again. The source code is
|
|
|
+intuitive enough that you can easily get the gist of it; it's writing some EC
|
|
|
+commands and changing some chipset config bits. The EC on this machine is
|
|
|
+hooked up to the `GPIO33` signal, sometimes called `HDA_DOCK_EN`, which sets
|
|
|
+the flash descriptor override thus disabling any flash protection by the IFD.
|
|
|
+It also bypasses the SMM BIOS lock protection by disabling SMIs, and Dell's
|
|
|
+BIOS doesn't set any other type of protection either such as writing to
|
|
|
+Protected Range registers.
|
|
|
|
|
|
With this method, you can probably flash it within 5 minutes. Again, zero
|
|
|
disassembly required!
|