Announcement

Collapse
No announcement yet.

SR2ZU To SR2F1 CPU replacement

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

    SR2ZU To SR2F1 CPU replacement

    Hello friends.

    Has anyone ever try and succeed replacing a consumer grade CPU with something removed from a corporate one?

    I have plenty of sr2f1 cpus that are %100 in working condition , ID like to use them in consumer laptops as replacements


    Is it possible-compatible / bios-wise ?
    Attached Files

    #2
    I've tried this on two completely different motherboards , no luck. Updated CPU microcode, transferred ME Region from one to other. Looks like i'm missing something.

    Comment


      #3
      Intel Boot Guard
      OpenBoardView — https://github.com/OpenBoardView/OpenBoardView

      Comment


        #4
        Originally posted by piernov View Post
        Intel Boot Guard
        Thanks for the reply. Can you suggest any workaround for this spesific issue?
        If you're referring cleaning the me region with factory me firmware , i've already done that.
        Last edited by wacd; 01-19-2024, 01:01 PM.

        Comment


          #5
          Boot Guard cant be removed by cleaning me firmware.However, i dont have the knowhow to remove bootguard so far.

          Comment


            #6
            Originally posted by mcplslg123 View Post
            Boot Guard cant be removed by cleaning me firmware.However, i dont have the knowhow to remove bootguard so far.
            Thats bad. I have 55 of SR2F1 they're perfectly fine. Does that mean that i can not use them on consumer boards 😞

            Comment


              #7
              Boot Guard public key hash is fused into the PCH by the laptop manufacturer, it cannot be removed. BIOS must be signed with the laptop manufacturer's private key. If Verified Boot is enabled, it won't run the BIOS if it is unsigned or signed with a different key. UEFITool NE can be used to check if BIOS is signed and what is the public key. On a running system, MEInfo (from Intel System Tools) can be used to check what is fused into the PCH.
              If private key has leaked it might be possible to sign any BIOS but I haven't seen it done yet.
              OpenBoardView — https://github.com/OpenBoardView/OpenBoardView

              Comment


                #8
                Originally posted by piernov View Post
                Boot Guard public key hash is fused into the PCH by the laptop manufacturer, it cannot be removed. BIOS must be signed with the laptop manufacturer's private key. If Verified Boot is enabled, it won't run the BIOS if it is unsigned or signed with a different key. UEFITool NE can be used to check if BIOS is signed and what is the public key. On a running system, MEInfo (from Intel System Tools) can be used to check what is fused into the PCH.
                If private key has leaked it might be possible to sign any BIOS but I haven't seen it done yet.
                Thats pretty much sums it up what i gathered researching all night.


                AMI v2 protected ranges hash file found at base 00F2BF40h
                Protected ranges:
                Address: FF871000h, Size: 39D600h
                Hash (SHA256): B1900E38E0BFD0F3B0FAA7502D1C81414DF56B36026C005BC7DCA4E411BAE828
                Address: 00000000h, Size: 0h
                Hash (SHA256): FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
                Computed IBB Hash (SHA1): 75F00BFEBD435236F5A0BF012DD5014B4EB3B53F
                Computed IBB Hash (SHA256): 2AD9CC8B21C71F3CA4EEC6864F33E0A5C96FAF6B80B3B8B02AFFF7E753297E8B
                Computed IBB Hash (SHA384): D9E2C4FF07BC3D4A79819012A4850C2E3913E9789E7BFE2DD39A7E7D171ABD223953BD4AFD36C0E07BC58062BD8B1788
                Computed IBB Hash (SHA512): 44279A30EBCBE25D425DCDD99E09488EF82A8B5A17FD5C977837311F2DFF3AC1817B1C421BF7360D0DA72836F54329C504AC529DD19C0E71CD14DB209829A3ED
                Computed IBB Hash (SM3): 2731FCB242D68E946A3A34FE9A2EDEB0E109DC417CC9C6521CBE4608E59769C4




                BootGuard ACM found at base F70000h
                ModuleType: 0002h
                ModuleSubtype: 0003h
                HeaderSize: 00000284h
                HeaderVersion: 00000000h
                ChipsetId: 0000h
                Flags: 0000h

                ModuleVendor: 8086h
                Date: 07.02.2016
                ModuleSize: 00008000h
                AcmSvn: 0002h
                SeSvn: 0001h
                CodeControlFlags: 00000000h
                ErrorEntryPoint: 00000000h
                GdtMax: 00000020h
                GdtBase: 00000598h
                SegmentSel: 00000008h

                EntryPoint: 00003BB1h
                KeySize: 00000100h
                ScratchSpaceSize: 0000023Ch
                ACM RSA Public Key Exponent: 11h
                ACM RSA Public Key:

                C71AC1E2A457E7FCAA585572AFE2BAABFCFC17BAFBC5EED971E12883A268F7EA
                6E2C9738F493D7F597144B1AF3F187156839783C503392C92088F89C75BDBC43
                0E9BA63DE6890CAC5F22177909D7C2CFCDA313F0C7E299932558B7403BD1D2DF
                B4874F4FC7DCE34524D896404B64FA1E88AF6349439827F139243F4BD63AE297
                E2353A5837F0ED05701F057E39BAF3BD8007F1A1AD52BAE40964465E1D04304B
                63221DC2FB5FD2A62D2AE7DB2FD47F62C993F490F5C7F43EABC6B45DB20ECC69
                863550D48BB390FD5EBF45AFC3A7AF051396121732CAF1328F79CBBD0C96FCEE
                819CDEB2E0E5B1E89A3B3BB79D7167DDEF31F663959564905EDD6A7FA7F75AEE

                ACM RSA Signature:
                96E7D5DBAFF4DBC6F7F0C6A858AEB39E541A0FB25F151C0E44ED2CC409C23DCA
                3593BF39B9B645BDCA08EC0CD824713B3E3C7AB95ACB057DDDC838BC9BD5BF2C
                3A5862208BD1CC9F1834105D1BDAB10D2E198613A063EF012354B59EE2FF9FC6
                0FAA5A82E946E911D6650B34B4CBBCE7F412113858352C29490F97CF077C2CAC
                1D62796A78A4C7868DA1F9FF8531A424A3BDFCC5017B3DB4E3F08123E87A56F1
                A1264E885757D6E7F8AC064ACC23C20F2A2A9411DE273C3F708EBAC0DC58B547
                C365CD75CA3431D44856DC831A9C2FBEA1C839E2302F4E34001CBBE33C71241C
                8F792730795EE5BE77CBC9AEE2B6746F6150D1C6D8DAF1FD27B03D8FB03F0A92




                Intel BootGuard Key manifest found at base F66980h
                Tag: '__KEYM__'
                Version: 10h
                KmVersion: 10h
                KmSvn: 00h
                KmId: 0Fh
                KM Hash (SHA256): 509C0E275FA0FF47EA1F9F1DDE676DF8FA1D2FCC3D38C4BEAF432FCF775A2AAD
                Key Manifest Key Signature:
                Version: 10h
                KeyId: 0001h
                SigScheme: 0014h
                Key Manifest Public Key Exponent: 10001h

                Key Manifest Public Key:

                E3427BA7B579CF63A95BB40E47ED9CBF6211CE713A1F467F187A6F08ED918A66
                B860078709C318D91B7E7B0E782FF1F461363DCE9FBB600104663E8C76BDFAA5
                5F3CA06E76E453D7C2EB43AC17B97A310E276551195F8EA8A487F3F64169A1F5
                A85D598C72FD79F981AA66CD92667CB00C019FCFB1B74052E18DB8126A414A17
                7C7CBD2F77FF2D81F229C27804E76C6A356A60DE29CE4D3F4E5F44B5FE7D96A2
                44ED322231E7FBDD996DBE8FC05D5E5438EE0196CB3553AAB5F86CB23AC86BAA
                2E69FFF71398335C4C4E44CEAFD38AA454EEC2B6EC613D26E3F09EF60EC52C01
                2955CA97B4E951FBCD619FE7F549203634436030076431931875395551A21CBD

                Key Manifest Public Key Hash (Modulus Only, SHA256): 963847BF4FA55A02B326C561C56BCE68820041CAC285B43AE1F1B1FEB3FED4A4
                Key Manifest Public Key Hash (Modulus Only, SHA384): 77C3F6BBC87382B1C86ABB1F8C061DF4D4A6D2657E6BBD922ABCB331E3FA5102D401FF00C57840F1ABA1B4BC4A77B0EA
                Key Manifest Public Key Hash (Modulus+Exponent, SHA256): F77CB484C5B2E2510FFE8B8B071ADE844524AC36E86F8EFB53A84EAB5987DBFC
                Key Manifest Public Key Hash (Modulus+Exponent, SHA384): 5A5312AE255B2B93C1F96222D19C10274CD9EFD9E59D031B72EFA2A58623CF0ADD6343B9EF9CF2A50388495F8ED9647B

                Key Manifest Signature:

                B1E26750CA35B4C99D8292161CEAB668B4BCB6677EE81FD3AEC62DD4EDB956F0
                93EDDC8E26270E536E54BA4A641668C85A002537E5E83C68FCF209E70073D868
                FD22874FEB4B9A5E52A93DC16A9B659429BAFB1DF967A35D511B59EA1DB8D1A2
                F34CA1260848D2E26D3854CD8D2D5AA3F36507C2ECC572D8CF3BE5FCED7BBFA5
                3B3592CDA0504D2D1EF753C9AA524D584FB866DEBD2CA6B50D4F9AD398AAA145
                3F392F02930A0A0542DE9B88D6606CD385B012EB024A023C415289EFB607DB54
                9B33F6EE23FFF283919DACB0D917E36E18433DBD2749A3BDECBD11A4619639A8
                F6ADB9CE0AA3806AC03BB1B9BC6577AA2444C2F7D820EA8E26CF7F391D6AB5F6




                Intel BootGuard Boot Policy Manifest found at base F65900h

                StructureId: '__ACBP__'
                Version: 10h
                BPMRevision: 10h
                BPSVN: 00h
                ACMSVN: 02h
                NEMDataSize: 0010h
                Boot Policy Elements:
                StructureId: '__IBBS__'
                Version: 10h
                Flags: 00000000h
                MchBar: 00000000FED10000h
                VtdBar: 00000000FED90000h
                DmaProtectionBase0: 00100000h
                DmaProtectionLimit0: 00F00000h
                DmaProtectionBase1: 0000000100000000h
                DmaProtectionLimit1: 0000000F00000000h
                IbbEntryPoint: FFFFFFF0h
                IbbSegmentsCount: 04h
                PostIBB Hash: N/A
                IBB Hash (SHA256): 2AD9CC8B21C71F3CA4EEC6864F33E0A5C96FAF6B80B3B8B02AFFF7E753297E8B
                IBB Segments:
                Flags: 0000h, Address: FFE90000h, Size: 000D5900h
                Flags: 0000h, Address: FFF66900h, Size: 00000080h
                Flags: 0000h, Address: FFF67980h, Size: 00008680h
                Flags: 0000h, Address: FFF78000h, Size: 00088000h
                StructureId: '__PMSG__'
                Version: 10h
                Boot Policy Key Signature:
                Version: 10h
                KeyId: 0001h
                SigScheme: 0014h
                Boot Policy Public Key Exponent: 10001h

                Boot Policy Public Key:
                F9D79DAC0C1783BAC9A512D77CDB12CFF3E80202BF4C11CD21F46A1328DE80F7
                3977675639FC49E6C44FEA132926C983C4FC1B6C397F1BAB0471681091FC9BD9
                35A2C97AA0E46418A491F11235E168A2A65A6F4F17F1C250B17A644D6B54F2B4
                7BABD032169D149B3D1EC5831BC1C3C7297E77E8AD0D232F61FA0E866D957220
                7E7426688E9389CC7382F6538E2060A722AB349B2C992DEFC58B2F446861C743
                C566A85C9B73E19BABE861661E3F08F33BCCB7796792FA46B3A0342FC0BE05F6
                9741A1A7FF583901471CBE801D86BF0FAF7FD08A243D4D669DE282006CE1DAB2
                8E7040574C773FC1FEF39C9F7AE48A78C510D5C55453D27991C8B6EEA09DA7B7

                Boot Policy Public Key Hash (SHA256): 509C0E275FA0FF47EA1F9F1DDE676DF8FA1D2FCC3D38C4BEAF432FCF775A2AAD
                Boot Policy Public Key Hash (SHA384): 537DA246F035D1DB6686A07EB699DE1DD3A2AFE75EE54D5F21E13F216F3B386892C079081D6FDA15995578128E4D9FBB

                Boot Policy Signature:
                0F0AA99ACB24D29E72A2DD0502797021853817B1476AD96956BC20EEFDD71828
                F45081568BE5B0FDB0EA55AA3A6946035C73E7E749F77BD3A67E9233902932CF
                74E350074B0519C31B8BD419A01F748775434010FD25526D2636699AA946C9CC
                B65B16BA61000BFBF0D940405B9277ADB449310D9A10AFC98A8275D7EB285CE5
                73E8C55C19A5154657E79DF14DC90C4F2DF22A04E6589D0E5CA6B079C3F313CE
                A8E805D108B1849814895E1AF02A48B1363CAB9FBF7B797D6CF8567D5BB6891F
                2CE5228C357441607A04974E03D27B97C1BC09CF25D4E4A67AE3354BA4FEE133
                6E61334A33088D5C0B9B709EA01BE02167D27EB2F018BD9BCC6931F63EFA065E



                This is what i get from the dump file that i got from the board which i removed the CPU. SR2F1 - LA-E131P

                Click image for larger version  Name:	image.png Views:	0 Size:	32.3 KB ID:	3182485
                Last edited by wacd; 01-20-2024, 07:55 AM.

                Comment

                Working...
                X