Jump to content

Search the Community: Showing results for tags 'OSX'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • InsanelyMac Lounge
    • Front Page News and Rumors
    • Reader News and Reviews
    • Forum Information and Feedback
  • OSx86 Project
    • New Releases and Updates
    • New Users Lounge
    • Developers Corner
    • Tutorials (The Genius Bar)
    • Technical FAQ
    • Installation
    • Post-Installation
    • DSDT and SSDT
    • Hardware Components and Drivers
    • Desktops
    • Notebooks
    • Netbooks
    • Tablets
    • MacMod of the Month
    • Multi-booting and Virtualisation
  • International
    • Your Language
    • Deutsch
    • Español
    • Français
    • Italiano
    • Português
    • Русский
  • Apple World
    • Mac OS X
    • Apple Computers and Hardware
    • iOS Devices
    • Mac Applications
    • Mac Programming and Development
    • iOS Programming and Development
    • Mac Gaming
    • Mac Accessories
  • Discuss and Learn
    • Windows Discussion
    • *nix
    • Apple Opinions and Discussion
    • The Great Debates
    • Internet(s), Servers, and Networks
    • Buying Thoughts, Reviews, and Recommendations
    • Mods and Overclocking
    • The Big Issues [Real Life]
  • Everything Else
    • Creativity
    • Thunderdome (Random Stuff)
    • Laughs
    • The Marketplace

Categories

  • Kexts
    • Graphics Cards
    • Audio
    • LAN and Wireless
    • Other
  • Kernels
  • Bootloaders
  • DSDTs
    • Patches
  • Pandora
  • Apps
  • Miscellaneous
  • Customization

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests

Found 79 results

  1. Installation Guide : Hey there and welcome to the ultimate guide how to install Yosemite (10.10) or El Capitan (10.11) on the Lenovo ThinkPad "T410". Before you begin make sure that you are owning the NVIDIA model. (NVS 3100m 256mb / NVS 3100m 512mb) This guide may work for other models like T510, T410s or the T410 with Intel HD but theres no support for them. NO ONE IN THIS FORUM (INCLUDING ME) IS RESPONSIBLE FOR ANY LOSS (DATA, MATERIAL, EQUIPMENT…) OCCURRED TO YOU, YOU ARE THE ONLY ONE RESPONSIBLE, AND BY FOLLOWING THESE INSTRUCTIONS YOU AGREE TO TAKE ALL THE RISKS AND RESPONSIBILITIES. THIS INSTALLATION ISN'T WITHOUT RISKS SO TAKE ALL THE PRECAUTIONS BEFORE DOING ANY FOOLISH ACTION, BACKUP YOUR DATA! AND FEED YOUR CAT! Photos here are only examples, use your brain! First of all you should know the basics of hackintoshing. (GIYF) You will need Windows on your T410 for the WIFI patch and a working Mac / Hackintosh (running 10.6.8+) to prepare the installation media. Also a 8GB+ USB drive. El Capitan (10.11): Yosemite (10.10):
  2. Hello I aqm somewhat of a n00b can someone please tell me a detailed explanation on how to use Iatkos s3 v2 correctly to boot up Snow Leopard with my model? thanks
  3. Hello !. I was following http://www.insanelym...-for-beginners/ to install osx with Windows 7, OS X bootable usb created on VM. When I'm trying to boot from usb screen becomes gray with notiffication which tells me to restart. After restart used -v and that is resoult: https://www.dropbox.com/s/4li62yn6hk7tbe9/2013-03-03%2000.51.00.jpg?m Another restart and command -f. I saw apple logo but freezed after few seconds. Another restart then UseKernelCache=NO and again logo + freeze. Did that tutorial 2 times. 1st time with ,,files for dual boot", 2nd without. The same resoult. My config: Intel Core i3 - 2310m 4gb RAM http://img96.imagesh...<!--NoParse3--> I know that WiFi card is not supported. Have already bought USB. I'm totally green in that.
  4. [Assim que conseguir resolver o problema vou transformar em um tópico guia para ajudar quem tem o mesmo notebook que eu] Olá a todos! Estou tentando instalar o Mac OS no meu Dell Inspiron 5457, seguem as especificações dele: Estou utilizando esse tutorial como base para a instalação: Esse até agora foi o mais longe que eu consegui ir nessa instalação, em anexo tem uma imagem com o erro que acontece quando eu inicio a instalação. Tentei procurar sobre compatibilidade com o meu computador e não achei nada, achei apenas um tópico em um fórum que tem uma pessoa com o mesmo problema que eu mas não apresentaram nenhuma resolução. Agradeço a todos desde já! EFI Folder.rar
  5. Hi Forum, Basically I have spare computer which is a HP Pavilion t124a and I'm thinking of possibly turning it into a hackintosh. I do not know which type of distro of either 10.5 of 10.4 I should use. I have had success with the iPC 10.5.6 Public Beta, well... I mean I was able to boot the Install disk straight up from the Disk Drive without using a 'booter' (##### etc). The problem is... is that I don't know what kexts to use. I kinda based the kexts on what my computer hardware has, then I install it then come to the Darwin/x86 screen (Asking me to press any key to continue or to press F8 for boot flags) I choose the Boot flag option and type -f and -v as iPC recommends to. It then starts up with Apple Logo then loads the kexts for about 30 seconds then It loads up the first time set up then has a kernel Panic when I was up to putting my Registration Information in. while in -v mode it does come up with errors regarding com.superhai.GenericCPUPowerManagement or something like that. I don't know what kexts to use with this machine If possible, could someone tell me what kexts I use from my system ( My System Specs are... - 2.53GHz Intel Pentium 4 - 1GB RAM PC2700 (2x512 DIMM) DDR - Samsung SV076AH 60GB IDE - HP cd-writer/dvd-rom combo drive (I'm writing like a noob) - Gigabyte Geforce 6500 256MB AGP - Intel ICH4 Chipset - Realtek ALC650 Audio (AC'97) - Realtek RTL8101L I want know what kexts I should use regarding to the... - Kernel - Video Drivers (The motherboard uses AGP, do have the AGPGart 2.7.1 along with the NVinject 256MB or either one. OS X detects the Graphics card is on AGP thanks to AGPGart 2.7.1, but need drivers for the Geforce 6500/6200LE!!! - Power Management (GenericCPUPowerManagement by superhai wasa giving me a Kernal Panic) - Fixes and Patches - DSDT Patches (Which one do I choose that works?) - AppleSMBIOS (Do I need one? If I do, which one best works for my system) - Alternate Bootloaders (Do I need one? If I do, which one best works for my system) Thanks.
  6. Hi! I recently had to upgrade my computer, after my motherboard went bang a couple of weeks ago. As you can see in my sig, I'm now a proud owner of an Asus Z97 Gryphon m-ATX board. One of the nicest features of it is the possibility of thunderbolt expansion via the Asus Thunderboltex II PCI-e card, for a smaller total cost than Gigabyte's competing solution, the Z97-UD7-TH. On the other hand, the UD7-TH thunderbolt port works more or less OOB under OSX - like everything Gigabyte usually does - and didn't even know the Asus card existed until very recently. So I'm now curious - did I make a good choice going Gryphon for a future thunderbolt capability without the UD7-TH's price tag? Have anyone actually tried this card with a hackintosh? If so, does it work fine, or work at all? All the best!
  7. Johannes van Beeck

    Run mac OSX on Acer Predator G7760

    Hallo, I have a Acer Predator G7760 wich i want to use with OSX. I tried to find some information about the compatibility of the hardware on this forum and the internet but didn't find any. So my question is, did anyone tried to instal OSX on a Acer Predator G7760 before? And how did it work out? Some technical specifications wich might be help full: Intel Core i7 3.4GHz 16GB RAM Nvidia GeForce GTX 580 The main board is a Foxconn n15235 If anyone could help me it would be great! Thanks in advance Greets Johannes
  8. theconnactic

    AMD - Geekbench scores

    Because there's no better way to measure our degree of success than seeing what the numbers say. Well, maybe not: real life user experience cannot be reduced to numbers only, but surely they matter. Post here your results. Let's show our fellow Intel hackintoshers how good an AMD machine can be! This one is not mine, but from Gilles:
  9. Apple released a final update of the OS X Yosemite, 10.10.2 Click here to view the article
  10. Thestral

    Sierra su Asus X54C-NS92

    Salve, da qualche anno sono possessore di un ASUS X54C-NS92 e mi piacerebbe provare OS X, sono alle primissime armi quindi vi chiedo aiuto per eseguire questa cosa, il mio PC ha un Intel Pentium B960(so che non è nativamente compatibile ma spero che si possa fare qualcosa), 6GB di ram DDR3, come scheda wifi ho una chiavetta esterna compatibile con OS X, per il touchpad non mi interessa dal momento che è rotto fisicamente. Cosa ho a disposizione: OS X su VMWare, quindi vorrei sapere con quali settaggi fare la chiavetta (Bios legacy) e come far andare il processore. Grazie in anticipo
  11. Hey guys, I have a problem with backlight on WAKE. Sleep works perfectly as it should. It goes to sleep, the sleep icon on the lid flashes and goes solid, then I get a bios beep. PERFECT. HERE'S the problem, when I wake the laptop. Whether by lifting the lid or Pressing the power button, the computer fully wakes! EXCEPT the display backlight. I can shine a flashlight on it and everything is working just fine and as it should. So I just shut it down and power it back up. I've given more than a few days on this. I'm sure it's something simple at this point that I am missing. I've done a few of my own edits to this DSDT. Here's my hardware. Lenovo x201 (i5-530m /2.53 Ghz) HERE. Intel 320 SSD Working OSX 10.9 Mavericks Atheros Ar5b95 wireless WORKING (Standard intel card is not compatible) All parts are fully functional thanks to Leon's posts and the OSXlatitude EDP. (Which is amazing btw) I just need some serious help and this laptop will qualify itself to be my daily use OSX machine! Hopefully someone can point me in the right direction on this please. I'm attaching my Extra folder with DSDT as well if someone wants to take a look. I know my Graphics BAR1 Register is 0xF000004 I've grabbed the system logs at the time of sleep and wake just in case they are requested. Clicked sleep from the apple menu at 14:32:00. Pressed the power button to wake at 14:34:00. The unknown locale errors are from the atheros wifi card and I'm sure that's not a problem. It literally wakes the instant you press the button. (SSD) But still no backlight. Nov 4 14:32:01 jonathans-mbp.company.local WindowServer[85]: _CGXSetWindowBackgroundBlurRadius: Invalid window 0xffffffff Nov 4 14:32:01 jonathans-mbp.company.local loginwindow[57]: find_shared_window: WID -1 Nov 4 14:32:01 jonathans-mbp.company.local loginwindow[57]: CGSGetWindowTags: Invalid window 0xffffffff Nov 4 14:32:01 jonathans-mbp.company.local loginwindow[57]: find_shared_window: WID -1 Nov 4 14:32:01 jonathans-mbp.company.local loginwindow[57]: CGSSetWindowTags: Invalid window 0xffffffff Nov 4 14:32:01 jonathans-mbp.company.local WindowServer[85]: device_generate_desktop_screenshot: authw 0x7fd8d4d5edf0(2000), shield 0x7fd8d4d23e80(2001) Nov 4 14:32:01 jonathans-mbp.company.local WindowServer[85]: device_generate_lock_screen_screenshot: authw 0x7fd8d4d5edf0(2000), shield 0x7fd8d4d23e80(2001) Nov 4 14:32:10 jonathans-mbp.company.local loginwindow[57]: CoreAnimation: warning, deleted thread with uncommitted CATransaction; set CA_DEBUG_TRANSACTIONS=1 in environment to log backtraces. Nov 4 14:32:20 jonathans-mbp kernel[0]: 3392.025317: performCountryCodeOperation: Not connected, scan in progress[0] Nov 4 14:32:20 jonathans-mbp kernel[0]: hibernate image path: /var/vm/sleepimage Nov 4 14:32:20 jonathans-mbp kernel[0]: efi pagecount 304 Nov 4 14:32:20 jonathans-mbp kernel[0]: hibernate_page_list_setall(preflight 1) start 0xffffff8067897000, 0xffffff80678b6000 Nov 4 14:32:20 jonathans-mbp kernel[0]: hibernate_page_list_setall time: 206 ms Nov 4 14:32:20 jonathans-mbp kernel[0]: pages 644120, wire 146988, act 222614, inact 8054, cleaned 0 spec 203, zf 5429, throt 0, compr 0, xpmapped 0 Nov 4 14:32:20 jonathans-mbp kernel[0]: could discard act 53418 inact 54256 purgeable 10355 spec 142803 cleaned 0 Nov 4 14:32:20 jonathans-mbp kernel[0]: hibernate_page_list_setall preflight pageCount 383288 est comp 50 setfile 828442440 min 2147483648 Nov 4 14:32:20 jonathans-mbp kernel[0]: [0x36481a000, 0x40000000] Nov 4 14:32:20 jonathans-mbp kernel[0]: [0x3a481a000, 0x40000000] Nov 4 14:32:20 jonathans-mbp kernel[0]: [0x0, 0x0] Nov 4 14:32:20 jonathans-mbp kernel[0]: kern_open_file_for_direct_io(0) took 1 ms Nov 4 14:32:20 jonathans-mbp kernel[0]: Opened file /var/vm/sleepimage, size 2147483648, partition base 0x0, maxio 2000000 ssd 1 Nov 4 14:32:20 jonathans-mbp kernel[0]: hibernate image major 1, minor 0, blocksize 4096, pollers 5 Nov 4 14:32:20 jonathans-mbp kernel[0]: hibernate_alloc_pages act 286387, inact 67739, anon 7094, throt 0, spec 143009, wire 165432, wireinit 49534 Nov 4 14:32:20 jonathans-mbp kernel[0]: hibernate_setup(0) took 10 ms Nov 4 14:32:20 jonathans-mbp kernel[0]: 3392.301477: setDISASSOC from ATH_INTERFACE_CLASS disconnectVap Nov 4 14:34:02 jonathans-mbp kernel[0]: hibernate_page_list_setall(preflight 0) start 0xffffff8067897000, 0xffffff80678b6000 Nov 4 14:34:02 jonathans-mbp kernel[0]: hibernate_page_list_setall time: 216 ms Nov 4 14:34:02 jonathans-mbp kernel[0]: pages 643507, wire 146317, act 222669, inact 8054, cleaned 0 spec 207, zf 5437, throt 0, compr 0, xpmapped 34300 Nov 4 14:34:02 jonathans-mbp kernel[0]: could discard act 53418 inact 54248 purgeable 10355 spec 142802 cleaned 0 Nov 4 14:34:02 jonathans-mbp kernel[0]: hibernate_page_list_setall found pageCount 382684 Nov 4 14:34:02 jonathans-mbp kernel[0]: IOHibernatePollerOpen, ml_get_interrupts_enabled 0 Nov 4 14:34:02 jonathans-mbp kernel[0]: IOHibernatePollerOpen(0) Nov 4 14:34:02 jonathans-mbp kernel[0]: encryptStart 14010 Nov 4 14:34:02 jonathans-mbp kernel[0]: bitmap_size 0x1e748, previewSize 0x7afd68, writing 380570 pages @ 0x7e24c0 Nov 4 14:34:02 jonathans-mbp kernel[0]: encryptEnd 821dc00 Nov 4 14:34:02 jonathans-mbp kernel[0]: image1Size 0xb5fc000, encryptStart1 0x14010, End1 0x821dc00 Nov 4 14:34:02 jonathans-mbp kernel[0]: encryptStart b5fc000 Nov 4 14:34:02 jonathans-mbp kernel[0]: encryptEnd 28f76a00 Nov 4 14:34:02 jonathans-mbp kernel[0]: PMStats: Hibernate write took 7285 ms Nov 4 14:34:02 jonathans-mbp kernel[0]: all time: 7285 ms, comp bytes: 1558814720 time: 1727 ms 860 Mb/s, crypt bytes: 632833520 time: 1091 ms 552 Mb/s, Nov 4 14:34:02 jonathans-mbp kernel[0]: image 687304704 (32%), uncompressed 1558814720 (380570), compressed 676191856 (43%), sum1 43c82014, sum2 4ec78a85 Nov 4 14:34:02 jonathans-mbp kernel[0]: zeroPageCount 39391, wiredPagesEncrypted 106195, wiredPagesClear 38008, dirtyPagesEncrypted 236367 Nov 4 14:34:02 jonathans-mbp kernel[0]: hibernate_write_image done(0) Nov 4 14:34:02 jonathans-mbp kernel[0]: sleep Nov 4 14:34:02 jonathans-mbp kernel[0]: Wake reason = power-button Nov 4 14:34:02 jonathans-mbp kernel[0]: 3400.074762: performCountryCodeOperation: Not connected, scan in progress[0] Nov 4 14:34:02 jonathans-mbp kernel[0]: RTC: PowerByCalendarDate setting ignored Nov 4 14:34:02 jonathans-mbp kernel[0]: No interval found for . Using 8000000 Nov 4 14:34:02 jonathans-mbp kernel[0]: Previous Sleep Cause: 5 Nov 4 14:34:02 jonathans-mbp kernel[0]: USBF: 3400.106 AppleUSBEHCI: setPowerState - PCI device still has PME status bit set. PMCSR is 0x8000 Nov 4 14:34:02 jonathans-mbp kernel[0]: The USB device HubDevice (Port 1 of Hub at 0x1d000000) may have caused a wake by issuing a remote wakeup (2) Nov 4 14:34:02 jonathans-mbp kernel[0]: 3400.205242: ATHR: unknown locale: 69 Nov 4 14:34:02 jonathans-mbp.company.local WindowServer[85]: CGXDisplayDidWakeNotification [3400226562240]: posting kCGSDisplayDidWake Nov 4 14:34:02 jonathans-mbp.company.local WindowServer[85]: handle_will_sleep_auth_and_shield_windows: Reordering authw 0x7fd8d4d5edf0(2004) (lock state: 3) Nov 4 14:34:02 jonathans-mbp.company.local WindowServer[85]: handle_will_sleep_auth_and_shield_windows: err 0x0 Nov 4 14:34:02 jonathans-mbp kernel[0]: en1: 802.11d country code set to 'US '. Nov 4 14:34:02 jonathans-mbp kernel[0]: 3400.251988: ATHR: unknown locale: 69 Nov 4 14:34:02 jonathans-mbp kernel[0]: en1: Supported channels 1 2 3 4 5 6 7 8 9 10 11 Nov 4 14:34:02 jonathans-mbp kernel[0]: 3400.270883: ATHR: unknown locale: 69 Nov 4 14:34:02 jonathans-mbp kernel[0]: No interval found for . Using 8000000 Nov 4 14:34:02 --- last message repeated 1 time --- Nov 4 14:34:02 jonathans-mbp kernel[0]: 3400.870240: ATHR: unknown locale: 69 Nov 4 14:34:03 jonathans-mbp kernel[0]: 3401.572801: ATHR: unknown locale: 69 Nov 4 14:34:04 jonathans-mbp kernel[0]: 3402.202371: ATHR: unknown locale: 69 Nov 4 14:34:05 jonathans-mbp kernel[0]: AppleIntelE1000e(Info): Link is Up 1000 Mbps Full Duplex, Flow Control: Rx Nov 4 14:34:05 jonathans-mbp.company.local configd[19]: LINKLOCAL en0: parent has no IP Nov 4 14:34:05 Jonathans-MacBook-Pro.local configd[19]: setting hostname to "Jonathans-MacBook-Pro.local" Nov 4 14:34:05 Jonathans-MacBook-Pro.local configd[19]: network changed: v4(en0-:10.1.0.124) DNS- Proxy- SMB- Nov 4 14:34:05 Jonathans-MacBook-Pro.local netbiosd[136]: network_reachability_changed : network is not reachable, netbiosd is shutting down Nov 4 14:34:06 Jonathans-MacBook-Pro.local configd[19]: network changed: v4(en0+:10.1.0.124) DNS+ Proxy+ SMB+ Nov 4 14:34:06 jonathans-mbp.company.local configd[19]: setting hostname to "jonathans-mbp.company.local" Nov 4 14:34:08 jonathans-mbp kernel[0]: 3406.350216: ATHR: unknown locale: 69 Nov 4 14:34:09 jonathans-mbp kernel[0]: 3407.842584: ATHR: unknown locale: 69 Nov 4 14:34:09 jonathans-mbp kernel[0]: 3407.861601: ATHR: unknown locale: 69 Nov 4 14:34:10 jonathans-mbp kernel[0]: 3408.505227: ATHR: unknown locale: 69 Nov 4 14:34:11 jonathans-mbp kernel[0]: 3409.138247: ATHR: unknown locale: 69 Nov 4 14:34:11 jonathans-mbp kernel[0]: 3409.152295: ATHR: unknown locale: 69 Nov 4 14:34:11 jonathans-mbp kernel[0]: 3409.793538: ATHR: unknown locale: 69 Nov 4 14:34:12 jonathans-mbp kernel[0]: 3410.427117: ATHR: unknown locale: 69 Nov 4 14:34:12 jonathans-mbp kernel[0]: 3411.059274: ATHR: unknown locale: 69 Nov 4 14:34:19 jonathans-mbp kernel[0]: 3417.487304: ATHR: unknown locale: 69 Nov 4 14:34:19 jonathans-mbp kernel[0]: 3417.502641: ATHR: unknown locale: 69 Nov 4 14:34:20 jonathans-mbp kernel[0]: 3418.133893: ATHR: unknown locale: 69 Nov 4 14:34:20 jonathans-mbp kernel[0]: 3418.766054: ATHR: unknown locale: 69 Nov 4 14:34:20 jonathans-mbp kernel[0]: 3418.779146: ATHR: unknown locale: 69 Nov 4 14:34:32 jonathans-mbp.company.local WindowServer[85]: device_generate_desktop_screenshot: authw 0x7fd8d4d5edf0(2000), shield 0x7fd8d4d23e80(2001) Nov 4 14:34:32 jonathans-mbp.company.local WindowServer[85]: device_generate_lock_screen_screenshot: authw 0x7fd8d4d5edf0(2000), shield 0x7fd8d4d23e80(2001) Nov 4 14:34:46 jonathans-mbp.company.local loginwindow[57]: CoreAnimation: warning, deleted thread with uncommitted CATransaction; set CA_DEBUG_TRANSACTIONS=1 in environment to log backtraces. Nov 4 14:34:53 jonathans-mbp.company.local loginwindow[57]: ERROR | -[LWBuiltInScreenLockAuthLion askForPasswordBuiltIn:] | Attempted to add an observer when already observing Nov 4 14:34:53 jonathans-mbp.company.local WindowServer[85]: CGXDisplayDidWakeNotification [3452061928414]: posting kCGSDisplayDidWake Nov 4 14:34:53 jonathans-mbp.company.local WindowServer[85]: handle_will_sleep_auth_and_shield_windows: Deferring. Nov 4 14:35:02 jonathans-mbp com.apple.launchd.peruser.501[145] (com.apple.PackageKit.InstallStatus): Throttling respawn: Will start in 9 seconds Extra.zip
  12. Public release OS X 10.11.6 available at App Store Update Combo
  13. Is there a guide anywhere on how to install Yosemite on ESXI 6? If so can someone point me in the right direction? Thanks
  14. From http://developer.app...063/_index.html When the kernel crashes on Mac OS X, the system displays a panic message. At this point the system will have to be restarted. But before hitting the power button, how can one find out what caused the crash? This technote addresses kernel panics: what they are and how to debug the code that caused the panic. The foundation of Mac OS X is an operating system core commonly known as Darwin. This technote contains links to source files available from the Darwin open source site. Access to these files requires a username and password obtained by agreeing to the Apple Public Source License. What is a Kernel Panic? In UNIX, a panic is an unrecoverable system error detected by the kernel as opposed to similar errors detected by user space code. It is possible for kernel code to indicate such a condition by calling the panic function located in the Kernel.framework header file sys/systm.h. However, most panics are the result of unhandled processor exceptions in kernel code, such as references to invalid memory addresses. These are typically indicative of a bug somewhere in the call chain leading up to the panic. What Does a Panic Look Like? A panic is typically indicated by the multi-lingual panic alert shown in Figure 1. After restarting the system, a log file named with the date and time of the panic should be present in/Library/Logs/PanicReporter. (Prior to Mac OS X 10.5 Leopard, this log is/Library/Logs/panic.log.) The panic log contains information about the state of the machine at the time of the panic. Starting with Mac OS X 10.4 Tiger, after restarting the system, the user will be given an opportunity to send this panic log to Apple. To protect a user’s privacy, the only information transmitted to Apple are the panic log, a simple hardware description without identifying IP address, and any user comments. Figure 1 Mac OS X panic alert. Other behaviors can be specified by setting flags in the debug boot argument passed to the kernel when it starts up. These boot arguments can be set via the boot-args firmware variable using the nvram command-line tool. A list of flags affecting remote debugging is given in Table 19-1 of Kernel Programming Guide and Kernel Core Dumps. The most common use of boot-args is to enable remote (two-machine) kernel debugging. This causes the system to wait for a connection from a remote GDB debugger session after either the panic alert or textual panic dump has been displayed. For more details on remote kernel debugging, please refer to Kernel Extension Programming Topics. Note: Prior to Mac OS X 10.5 Leopard, a panic log is not written to disk if remote kernel debugging has been enabled. In this case, you can attach to the panicked machine with GDB and use the paniclog kernel debugging macro to retrieve the log. Note: The panic alert is not displayed if verbose booting has been enabled, either by setting the -v option in boot-args or by holding down the command and V keys at boot time. Basics of Processor Exception Handling in the Mac OS X Kernel An exception is a condition encountered by the processor that requires special processing. Intel Processor Exception Handling On Intel IA-32 and Intel 64 architecture processors, each architecturally-defined exception is assigned a unique identification number called a vector. The processor uses the vector assigned to an exception as an index into the interrupt descriptor table (IDT). The IDT provides the entry point to the exception handler. Some of the processor registers are stored on the stack before control is transferred to the exception handler. Exceptions are classified as faults, traps, and aborts depending on the way they are reported and whether the instruction that caused the exception can be restarted without loss of program continuity. The most common exceptions are: Page faults, caused by an attempt to access data at an invalid memory address, such as dereferencing a NULL pointer. Invalid/undefined opcode exceptions, caused by an attempt to execute an instruction with an invalid opcode. General protection faults, caused by any of a number of conditions, including transferring execution to a non-executable code segment or writing to either a code segment or read-only data segment. Details on exception handling on Intel processors can be found in Chapter 5 "Interrupt and Exception Handling" of the document Intel 64 and IA-32 Architectures Software Developer’s Manual, Volume 3A: System Programming Guide, Part 1. The processor registers that are shown in a panic log are: Control Register 0 (CR0). Contains flags that control the processor's operating mode and indicate the state of the processor. Control Register 2 (CR2). Contains the address that caused a page fault. Control Register 3 (CR3). Contains the physical address of the base of the page directory. Control Register 4 (CR4). Contains a group of flags that enable several architectural extensions and indicate operating system support for specific processor capabilities. EAX. General-purpose register, also used as an accumulator for operands and results data. EBX. General-purpose register, also used as a pointer to data in the DS segment. ECX. General-purpose register, also used as a counter for string and loop operations. EDX. General-purpose register, also used as an I/O pointer. EBP. General-purpose register mainly used as a pointer to data on the stack (stack frame). ESI. General-purpose register, used as a pointer to data in the segment pointed to by the DS register and as a source pointer for string operations. EDI. General-purpose register, used as a pointer to data (or destination) in the segment pointed to by the ES register and as a destination pointer for string operations. EFLAGS. Program status and control register. Contains status, control, and system flags. Status flags are set as the result of compare and arithmetic operations. This register is displayed in panics as EFL. Instruction Pointer (EIP). Contains the address of the next instruction to be executed. Depending on the exception, this may be the address of the instruction which caused the exception or the next instruction in the program flow. CS. Segment register pointing to the code segment. DS. Segment register pointing to the data segment. Details on the Intel 64 and IA-32 register sets can be found in Chapter 3 "Basic Execution Environment" of the document Intel 64 and IA-32 Architectures Software Developer’s Manual, Volume 1: Basic Architecture. The Mac OS X kernel follows this execution flow when handling an Intel 64 or IA-32 exception: xnu/osfmk/i386/idt64.s: master_idt (xnu/osfmk/i386/idt.s: master_idt on Core Duo processors) xnu/osfmk/i386/locore.s: lo_alltraps Each exception handler in the IDT eventually branches to lo_alltraps xnu/osfmk/i386/locore.s: trap_from_kernel xnu/osfmk/i386/trap.c: kernel_trap xnu/osfmk/i386/trap.c: panic_trap xnu/osfmk/kern/debug.c: panic xnu/osfmk/i386/AT386/model_dep.c: Debugger xnu/osfmk/i386/AT386/model_dep.c: panic_i386_backtrace The functions panic_trap and panic_i386_backtrace produce the panic log. Note: The symbol panic_trap is visible in the source only. It does not appear in the kernel binary because of tail call optimization done by the compiler when the kernel is built. Panic Logs How to Read the Panic Log from an Intel-Based Mac Listing 1 is a typical panic display from an Intel-based Macintosh computer running Mac OS X 10.5.4. panic(cpu 0 caller 0x001A8CD4): Kernel trap at 0x223ab275, type 14=page fault, registers: 2 CR0: 0x8001003b, CR2: 0xdeadbeef, CR3: 0x01251000, CR4: 0x00000660 3 EAX: 0xdeadbeef, EBX: 0x0049be30, ECX: 0x0050d444, EDX: 0x00534da0 4 CR2: 0xdeadbeef, EBP: 0x220dbe48, ESI: 0x06d59600, EDI: 0x02cecd00 5 EFL: 0x00010206, EIP: 0x223ab275, CS: 0x00000008, DS: 0x032f0010 6 Error code: 0x00000002 7 8 Backtrace, Format - Frame : Return Address (4 potential args on stack) 9 0x220dbc48 : 0x12b0fa (0x4592a4 0x220dbc7c 0x133243 0x0) 10 0x220dbc98 : 0x1a8cd4 (0x46280c 0x223ab275 0xe 0x461fbc) 11 0x220dbd78 : 0x19ede5 (0x220dbd90 0x2cecd00 0x220dbe48 0x223ab275) 12 0x220dbd88 : 0x223ab275 (0xe 0x48 0x61330010 0x31340010) 13 0x220dbe48 : 0x410db2 (0x6d59600 0x2cecd00 0x13315e 0x1331fa) 14 0x220dbea8 : 0x412c47 (0x2cecd00 0x6d59600 0x49be30 0x1) 15 0x220dbf28 : 0x4124ab (0x2cecd00 0x3312740 0x0 0x3f05c9) 16 0x220dbf78 : 0x411127 (0x2cecd00 0x8 0x220dbfac 0x1) 17 0x220dbfc8 : 0x19ebdc (0x30db910 0x0 0x1a20b5 0x3b3e5d0) 18 Backtrace terminated-invalid frame pointer 0 19 Kernel loadable modules in backtrace (with dependencies): 20 com.apple.dts.driver.PanicDriver(1.1)@0x223aa000->0x223abfff 21 22 BSD process name corresponding to current thread: kernel_task 23 24 Mac OS version: 25 9E17 26 27 Kernel version: 28 Darwin Kernel Version 9.4.0: Mon Jun 9 19:30:53 PDT 2008; root:xnu-1228.5.20~1/RELEASE_I386 29 System model name: MacPro1,1 (Mac-F4208DC8) 30 ethernet MAC address: 00:17:f2:00:00:00 31 ip address: 192.0.2.1 32 33 Waiting for remote debugger connection. Line numbers have been added for ease of reference. Intel 64 and IA-32 Architectures Software Developer’s Manual, Volume 3A: System Programming Guide, Part 1 Chapter 5. Back to Listing 1 Line 2: xnu/osfmk/i386/trap.c: panic_trap Contents of registers CR0, CR2, CR3, and CR4 at the time the panic log is generated. Back to Listing 1 Line 3: xnu/osfmk/i386/trap.c: panic_trap Contents of registers EAX, EBX, ECX, and EDX from the exception handler. Back to Listing 1 Line 4: xnu/osfmk/i386/trap.c: panic_trap Contents of registers CR2, EBP, ESI, and EDI from the exception handler. Back to Listing 1 Line 5: xnu/osfmk/i386/trap.c: panic_trap Contents of registers EFLAGS, EIP, CS, and DS from the exception handler. Back to Listing 1 Line 6: xnu/osfmk/i386/trap.c: panic_trap Error code: 0x00000002: An error code is reported for each exception related to a specific segment. The format of the error code for a page fault (exception vector 14) is different from that for other exceptions. The page fault error code reports if the fault was caused by a not-present page or some other reason and whether the memory access was a read or a write. See Intel 64 and IA-32 Architectures Software Developer’s Manual, Volume 3A: System Programming Guide, Part 1 Section 5.3 for details. Common error code values for exception vector 14 are 0x00000000 indicating a read from a non-present page, and 0x00000002 indicating a write to a non-present page. Back to Listing 1 Line 7: xnu/osfmk/kern/debug.c: panic Line 8: xnu/osfmk/i386/AT386/model_dep.c: panic_i386_backtrace This is the actual stack backtrace. Each line shows the address of the stack frame, a colon ":", the return address saved in that frame, then four potential arguments in the stack frame enclosed in parentheses. The first stack frame is located using the value of the stack pointer (EBP) at the time the backtrace is captured. The next stack frame is located using the value of EBP saved in the stack frame. Up to 16 stack frames will be shown, fewer than that if a zero stack pointer is encountered. Details on how the stack is used by Mac OS X can be found in the document OS X ABI Function Call Guide. The backtrace is typically the most useful information in a panic log because it can be used to reconstruct the call chain that led to the exception. This is discussed in the next section Isolating the Crash. Back to Listing 1 Lines 9 through 18: xnu/osfmk/i386/AT386/model_dep.c: panic_i386_backtrace Back to Listing 1 Line 19: xnu/osfmk/kern/kmod.c: kmod_dump_to This looks at the addresses in the backtrace and prints out the module name, version, and the starting and ending addresses of each kernel loadable module in the backtrace. (A kernel loadable module is simply the executable portion of a kernel extension, or KEXT.) It also prints out the same information for the dependencies of each kernel extension. The module name and version is the same as that shown by the kextstat command and is the value of MODULE_NAME andMODULE_VERSION in the Xcode build settings. The dependencies are those specified in theOSBundleLibraries property in the KEXT's Info.plist property list. Back to Listing 1 Line 20: xnu/osfmk/kern/kmod.c: kmod_dump_to Back to Listing 1 Line 21: xnu/osfmk/kern/debug.c: panic_display_process_name Line 22: xnu/osfmk/kern/debug.c: panic_display_process_name If the current thread originated from within the kernel, the task name shown is kernel_task. Back to Listing 1 Line 23: xnu/osfmk/kern/debug.c: panic_display_system_configuration Line 24: xnu/osfmk/kern/debug.c: panic_display_system_configuration Line 25: xnu/osfmk/kern/debug.c: panic_display_system_configuration The build number is obtained from the kernel global variable osversion. Back to Listing 1 Line 26: xnu/osfmk/kern/debug.c: panic_display_system_configuration Back to Listing 1 Line 27: xnu/osfmk/kern/debug.c: panic_display_system_configuration Line 28: xnu/osfmk/kern/debug.c: panic_display_system_configuration This is the value of the kernel global variable version, set at the time the kernel is built. The string Mon Jun 9 19:30:53 PDT 2008 is the date and time the kernel was built. The stringxnu-1228.5.20~1 is the source revision used to build this kernel. This information can be used to locate the source for this kernel version in the Darwin open source. To see the version of a running kernel, use the sysctl command as illustrated in Listing 2. [/url] Listing 2 Displaying the kernel version. $ sysctl kern.version kern.version = Darwin Kernel Version 9.4.0: Mon Jun 9 19:30:53 PDT 2008; root:xnu-1220.5.20~1/RELEASE_I386 The steps to build a custom kernel can be found in the chapter style="color: rgb(0, 51, 102); " target="_self">Building and Debugging Kernels of the document Kernel Programming Guide. Back to Listing 1 Line 29: xnu/osfmk/kern/debug.c: panic_display_model_name The model name gives a high-level description of the panicked system. The first part MacPro1,1contains the product name and version. The second part is only useful if the panic log is sent to Apple. Back to Listing 1 Line 30: xnu/osfmk/kdp/kdp_udp.c: kdp_connection_wait This is the built-in Ethernet MAC address of the panicked machine. This and the IP address (line31) are used to establish a remote debugging session. Note: This line is displayed on the screen only; it is not included in panic log files on disk. Back to Listing 1 Line 31: xnu/osfmk/kdp/kdp_udp.c: kdp_connection_wait This is the IP address of the panicked machine. This and the Ethernet MAC address (line 30) are used to establish a remote debugging session. Note: This line is displayed on the screen only; it is not included in panic log files on disk. Back to Listing 1 Line 32: xnu/osfmk/kdp/kdp_udp.c: kdp_connection_wait Line 33: xnu/osfmk/kdp/kdp_udp.c: kdp_connection_wait At this point the system is waiting for a connection from a remote debugger. Back to Listing 1 Isolating the Crash Assume that one of your customers or testers had your kernel extension installed and experienced a kernel panic. Fortunately they sent you the panic log like the ones shown earlier. How can you go about finding the cause of the crash? The first thing to do is to run the same version of the operating system on a computer with the same processor architecture as the panicked machine. Use the OS, kernel, and KEXT version numbers from the panic log to confirm that you're running the correct versions. Next, take a quick glance at the kind of crash and in which kernel extension the crash occurred. Finally, the backtrace can be used to get a more precise picture of the sequence of calls that led up to the crash. To decipher the backtrace, it's necessary to create relocated symbol files for the kernel and each kernel extension listed in the backtrace. A new set of symbol files must be generated each time a kernel extension is loaded because the load addresses of the KEXT or its dependencies are likely to be different each time. Deciphering a Panic Log from an Intel-based Mac In our example, a page fault exception occurred with the instruction pointer containing0x223ab275. Looking at the list of loaded kernel extensions, the closest match iscom.apple.dts.driver.PanicDriver which is located between addresses 0x223aa000 and0x223abfff. Then, because this is a page fault, CR2 contains the address which could not be accessed, and the error code describes the reason for the page fault. In this case, it was an attempt to write to memory at 0xdeadbeef that triggered the exception. The kernel and kernel extensions on a running Mac OS X system contain just enough symbolic information to resolve dependencies between them. In order to translate all of the return addresses in Mac OS X kernel code, download the Kernel Debug Kit corresponding to the version and build of Mac OS X on the panicked system. Kernel Debug Kits contain symbol-rich versions of the kernel and many I/O Kit families. Mount the Kernel Debug Kit disk image, and you're ready to go. Your own kernel extensions will already have full line number and function name information provided they were built using Xcode's Debug build configuration. On Mac OS X 10.5 and later, be sure the Debug Information Format build setting in your Xcode target settings is set to DWARF with dSYM File. Generating symbol files is done using the kextload command as illustrated in Listing 4. The -soption specifies the directory where to write the symbol files. The -n option causes kextload to prompt for the load address of each kernel extension and its dependencies. Alternatively, you can use the createsymbolfiles script included as part of each Kernel Debug Kit to simplify symbol file generation as shown in Listing 5. Note: While it's possible to perform cross-architecture remote kernel debugging, symbol files can only be generated on a system with the same architecture as the panicked system. Listing 6 Loading the symbol file into GDB. localhost:~ me$ gdb /Volumes/KernelDebugKit/mach_kernel GNU gdb 6.3.50-20050815 (Apple version gdb-960) (Sun May 10 10:38:33 UTC 2008) Copyright 2004 Free Software Foundation, Inc. GDB is free software, covered by the GNU General Public License, and you are welcome to change it and/or distribute copies of it under certain conditions. Type "show copying" to see the conditions. There is absolutely no warranty for GDB. Type "show warranty" for details. This GDB was configured as "i386-apple-darwin"... (gdb) set kext-symbol-file-path /tmp (gdb) add-kext PanicDriver/build/Debug/PanicDriver.kext add symbol table from file "/tmp/com.apple.dts.driver.PanicDriver.sym" (y or n) y Reading symbols from /private/tmp/com.apple.dts.driver.PanicDriver.sym...Reading symbols from PanicDriver/build/Debug/PanicDriver.kext.dSYM/ Contents/Resources/DWARF/PanicDriver...done. done. (gdb) Repeat the add-kext command for each of your KEXT's dependencies as shown in the panic log. If your project is configured to produce stabs debugging information instead of DWARF, use theadd-symbol-file command instead as shown in Listing 7. stabs debugging information was the default on systems older than Mac OS X 10.5 Leopard. Listing 7 Loading the symbol file into GDB when using stabs debugging information. localhost:~ me$ gdb /Volumes/KernelDebugKit/mach_kernel GNU gdb 6.3.50-20050815 (Apple version gdb-573) (Fri Oct 20 15:50:43 GMT 2006) Copyright 2004 Free Software Foundation, Inc. GDB is free software, covered by the GNU General Public License, and you are welcome to change it and/or distribute copies of it under certain conditions. Type "show copying" to see the conditions. There is absolutely no warranty for GDB. Type "show warranty" for details. This GDB was configured as "i386-apple-darwin"... (gdb) add-symbol-file /tmp/com.apple.dts.driver.PanicDriver.sym add symbol table from file "/tmp/com.apple.dts.driver.PanicDriver.sym" at (y or n) y Reading symbols from /tmp/com.apple.dts.driver.PanicDriver.sym...done. (gdb) In the case of I/O Kit C++ function names, you may find it helpful to unmangle the names to make them more readable. The command set print asm-demangle on is a handy way to do this. This command controls the demangling of C++ and Objective-C names in disassembly listings. Display the instruction located at the instruction pointer (EIP) using the "examine memory as instruction" command x/i . Depending on the type of exception, this will either be the instruction that caused the exception or the one immediately following. An example is shown in Listing 8. Listing 8 Disassembling from the instruction pointer. (gdb) set print asm-demangle on (gdb) x/i 0x223ab275 0x223ab275 : movl $0x7fff,(%eax) (gdb) Next, for each return address in the backtrace, disassemble the function containing that address using the command disass . Listing 9 shows the results of disassembling the backtrace shown in Listing 1. Listing 9 Decoding the backtrace. (gdb) disass 0x12b0fa Dump of assembler code for function panic: 0x0012af54 : push %ebp ... 0x0012b0f5 : call 0x1ae39f 0x0012b0fa : mov 0x4d5278,%eax ... (gdb) disass 0x1a8cd4 Dump of assembler code for function kernel_trap: 0x001a872a : push %ebp ... 0x001a8ccf : call 0x12af54 0x001a8cd4 : add $0xcc,%esp ... (gdb) disass 0x19ede5 Dump of assembler code for function trap_from_kernel: 0x0019edcb : mov %esp,%eax ... 0x0019ede0 : call 0x1a872a 0x0019ede5 : mov %edi,%esp ... (gdb) disass 0x223ab275 Dump of assembler code for function _ZN32com_apple_dts_driver_PanicDriver5startEP9IOService: 0x223ab228 : push %ebp ... 0x223ab272 : mov -0xc(%ebp),%eax 0x223ab275 : movl $0x7fff,(%eax) ... (gdb) disass 0x410db2 Dump of assembler code for function _ZN9IOService14startCandidateEPS_: 0x00410d3c : push %ebp ... 0x00410dac : call *0x2cc(%eax) 0x00410db2 : xor %edx,%edx ... (gdb) disass 0x412c47 Dump of assembler code for function _ZN9IOService15probeCandidatesEP12OSOrderedSet: 0x004125a8 : push %ebp ... 0x00412c41 : call *0x3c4(%eax) 0x00412c47 : mov %al,-0x3a(%ebp) ... (gdb) disass 0x4124ab Dump of assembler code for function _ZN9IOService14doServiceMatchEm: 0x00412334 : push %ebp ... 0x004124a5 : call *0x3c0(%eax) 0x004124ab : mov (%ebx),%eax ... (gdb) disass 0x411127 Dump of assembler code for function _ZN15_IOConfigThread4mainEPS_: 0x00411016 : push %ebp ... 0x00411121 : call *0x3d4(%edx) 0x00411127 : jmp 0x411142 ... (gdb) disass 0x19ebdc Dump of assembler code for function call_continuation: 0x0019ebc0 : mov 0x4(%esp),%eax ... 0x0019ebda : call *%eax 0x0019ebdc : add $0x10,%esp ... (gdb) Then locate the function containing the instruction pointed to by the instruction pointer. In this example, this is the function com_apple_dts_driver_PanicDriver::start beginning at the address 0x223ab228. Since the saved instruction pointer from a page fault generally points to the instruction that generated the exception, the movl instruction at 0x223ab275 is the suspect. The instruction attempts to write the value 0x7fff to the address pointed to by EAX. The panic log shows EAX contains the invalid pointer value 0xdeadbeef, which explains the cause of the page fault exception. This diagnosis is consistent with the earlier result from disassembling the single instruction located at the instruction pointer. Also examine the other disassembled functions, looking for the instruction immediately before the address from the backtrace. Note that this instruction should be some form of branch instruction. To understand why, recall that the backtrace is a listing of the return addresses saved prior to executing a function call. If the disassembly shows something other than a branch instruction, this is a clue that you may not have generated your symbol file correctly, or that the operating system or Kernel Debug Kit version does not match the panicked machine. (This guideline does not apply to the leaf function which contains the instruction that generated an exception.) Another handy technique is to use the "examine memory as instruction" command to disassemble instructions near the address from the backtrace as in Listing 10. Listing 10 Disassembling a block of instructions. (gdb) x/16i 0x19ebdc-32 0x19ebbc : add %eax,(%eax) 0x19ebbe : add %dl,0x424448b(%eax) 0x19ebc4 : mov 0x8(%esp),%edx 0x19ebc8 : mov 0xc(%esp),%ecx ... 0x19ebd9 : push %edx 0x19ebda : call *%eax 0x19ebdc : add $0x10,%esp 0x19ebdf : mov %gs:0x4,%eax ... One thing to be aware of when using this technique is that the first few instructions may not be correct because the disassembly is likely to begin in the middle of an instruction. Summary Using the techniques discussed in this technote, it is possible to perform an effective post-mortem analysis of a kernel panic. While the information in a panic dump may have been cryptic at first, it should now be just another debugging tool available to the Mac OS X developer. References The Design and Implementation of the 4.4BSD Operating System, McKusick et al., Addison-Wesley, 1996. Kernel Extension Programming Topics Intel 64 and IA-32 Architectures Software Developer’s Manual, Volume 1: Basic Architecture, Intel Order Number 253665-027US, revised April 2008. Intel 64 and IA-32 Architectures Software Developer’s Manual, Volume 3A: System Programming Guide, Part 1, Intel Order Number 253668-027US, revised July 2008. PowerPC Microprocessor Family: The Programming Environments For 32-Bit Microprocessors, IBM document G522-0290-01 revised 02/21/2000. Programming Environments Manual For 32-Bit Implementations of the PowerPC Architecture, Freescale Semiconductor document MPCFPE32B, revision 3, 9/2005.
  15. Hey guys, I'm new here and have very little experience playing with OSx86. I've been trying to find the best way (if possible) to install any version of OSX on my laptop, but to no avail. I cant find anything in regards to my specific laptop model. So I was wondering if you folks could give me hand (even if its to point me into the right direction). My current setup: HP Pavilion DV6-7063sa Intel® Core™ i7- 2670QM Processor [4x 2,2 GHz] NVIDIA GeForce GT 630M [DDR3 2GB] 8 GB DDR3 1TB HardDisk [5400 rpm] Windows 7 + Ubuntu 12.10 If you need any more information just ask. Thanks in advance, Aarron
  16. Hey everyone, I'm pretty new to hackintoshing. I'm running a triple core AMD Anthlon 3.1 GHZ Proccesor with a 785G chipset. I have a 1TB internal HDD and a 120 GB External. Currently, I have a hackintosh running on the external BUT Where can I find a kext for my ATI Radeon 4200 Video Card? Seriosuly I looked everywhere but couldn't find one. Also I am running my hackintosh on an external. Should I partition my internal and dualboot since I want to make it my daily driver. Where can I find a wifi kext. I have an 802.11n card on this computer but I was unable to find a kext for it. Thanks everyone, -Momin
  17. Dashboard If the Yosemite installer sees that you've never used OS X's Dashboard feature, it will automatically delete it to save you space. iCloud everywhere Yosemite lets users log into their Mac user account using their iCloud password instead of using the existing User account password system. Currency conversion Spotlight will convert currency for you. Batch rename Yosemite's Finder brings the ability to rename multiple selected items using right-click. Near networking Apple's move to open Multipeer Connectivity means Macs and iOS devices will be far easier to network together over Wi-Fi or Bluetooth. Cloud control You can already see what pages you have open on all your Macs and devices using iCloud Tabs: In Yosemite, you can remotely close those pages. New sounds Apple has added a bunch of new alert tones to Messages. Energy Saver A small design feature -- the Energy Saver icon in System Preferences now depicts an LED bulb, rather than the fluorescent one used in Mavericks. Where's that file? Click on a file and hold the command key and you'll still see where that file is located at the bottom of the window. Continuity Apple's Continuity features promise an amazingly integrated experience between Mac and iOS devices. However, it looks like only the following. Macs will support Continuity, because the feature requires Bluetooth LE support: MacBook Air (mid-2011 and above) MacBook Pro (mid-2012 and above) Retina MacBook Pro (mid-2012 and above) iMac (late 2012 and above) Mac mini (mid-2011 and above) Mac Pro (2013 and above) It is theoretically possible that a Mac-compatible Bluetooth 4.0 dongle may enable Continuity on unsupported Macs, though this is not guaranteed -- don't invest until it's tested. Create Yosemite boot drive Erase and then create a Mac OS Extended (Journaled) partition on a USB 3.0 flash drive using Disk Utility. Launch the Yosemite installer and click the 'Show All Disks' button. Select your USB drive and install the system on there. You'll need to enter a little more info. Now you have an emergency boot drive for your Mac. Message sync When your Mac and iOS devices are on the same network, the SMS and iMessage messages on your device will automatically sync to your Mac -- this will be invaluable for those who need to get copies of messages. Photos Apple's iOS/OS X Photos app will give users more granular controls over some of the app's built-in image editing choices. Transparency control If you don't like the new transparency effects in Yosemite apps, you can disable the feature in System Preferences>Accessibility>Display. Control Center It's possible Macs will gain a swipeable Control Center app, similar to iOS 8. Green button As reported before, the green maximize button will now put supporting apps into full-screen mode -- logical. If you don't want to enter that mode and just want to make the window bigger (as in Mavericks), just press 'Option' when you click the green button. Signature move You can already take a photo of your signature to place in PDF documents using Preview. In Yosemite, you will also be able to sign your name using your finger on your Trackpad. Source: Computerworld
  18. Centinho

    Post-Installazione Sierra

    Salve a tutti ragazzi, sono riuscito ad installare Sierra sul portatile in firma. ✓ Bluetooth ✓ Scheda Grafica Intel Integrata ✓ Audio con AppleHDA ✓ Ethernet X Scheda Grafica NVIDIA GeForce 920MX X Wi-Fi X USB 3.0 X Gestione Batteria X TouchPad Potete aiutarmi a sistemare queste ultime cose e configurare l' SMBIOS?
  19. AlvinGenius

    [ How To ] Install OSX on " HP 15-P150ne "

    Like the Topic Title i want to install OSX ( Lion .... till Yosemite ) any OS from this Laptop Model : HP 15-P150NE this is a support link from HP site : http://support.hp.com/us-en/drivers/selfservice/HP-Pavilion-15-Notebook-PC-series/7234915/model/7467816 And Specs is : CPU : AMD A10-5745M Chipset : AMD A76M FCH RAM : 4 GB VGA : AMD Radeon R7 M260 / AMD Radeon HD 8610G - 2GB Wireless : RTL 8723BE Ethernet : RTL8101E/RTL8102E Sound : Realtek High-Definition(HD) Audio i tried to search for this laptop and i can't find any topic for it Thx in advance
  20. We believe that this malware family heralds a new era in malware attacking Apple’s desktop and mobile platforms based on the following characteristics: Of known malware families distributed through trojanized / repackaged OS X applications, it is the biggest in scale we have ever seen It is only the second known malware family that attacks iOS devices through OS X via USB It is the first malware to automate generation of malicious iOS applications, through binary file replacement It is the first known malware that can infect installed iOS applications similar to a traditional virus It is the first in-the-wild malware to install third-party applications on non-jailbroken iOS devices through enterprise provisioning WireLurker was used to trojanize 467 OS X applications on the Maiyadi App Store, a third-party Mac application store in China. In the past six months, these 467 infected applications were downloaded over 356,104 times and may have impacted hundreds of thousands of users.
  21. I am trying to get OSX on my Asus Ultrabook but if I cant what would be a good laptop to install OSX Lion and or Mountain Lion on that's under or at $600? I was looking at the new HP DM4-3170se Beats edition refurb but Im not sure if that's OSX compatible yet
  22. 2016 is here, and what we can expect about Apple's WWDC of this year? Well, research and expectations about the new Apple OS X are already growing. The web public call OS X 10.12 of "Fuji", hmmm, maybe there is something wrong, because since Mavericks, Apple choose California locations for nominate their systems. Beyond the new name, perhaps we have in OS X the following new features: Siri - We expected this since El Capitan A native Swift app for devs New filesystem, a replacement for the HFS+ More integration with others Apple's systems, e.g: Apple Watch, iOS and Apple TV Well this is what we know per hour. But and you guys? What do you know and want to see in this new OS X? Please share with us
  23. Hey guys, I upgraded my Yosemite VM to El Capitan, which made it slow, and I cannot upgrade VMWare Tools using Fusion 7.1.1 darwin.iso... And BeamTools.iso hack no longer works. My question is, and I know that 10.11 is still in beta and all. But I do have a dev account so it's for legit curiosity that am doing this. But is there a way to make EC faster ? I do have latest VMWare installed and VM has 16gb RAM and 4 cores allocated to it. I am on Windows 8.1 Pro x64... Thanks
  24. Puro_Sangue

    [Aiuto] Applicazione Mail

    Salve Ragazzi, Ho uno strano comportamento dell'applicazione Mail. Essa infatti, se tenuta in modalità fullscreen, dopo che il pc va in stop, al suo ritorno l'applicazione nn risponde....funziona perfettamente, cioè le mail arrivano ma l'applicazione nn risponde ai click, l'unica soluzione è uscire dal fullscreen e chiudere l'applicazione. Alla sua riapertura tutto funziona...sapete darmi una soluzione?
  25. Hi guys Hope can help me I have some big troubles with my hackintosh, the computer doesn't respond it's freeze for seconds and i can't find the reason. I use this computer for 3 things Download files with utorrent (torrent stable version 1.8.4 (29971)) Convert movies with handbreak version 0.9.9 x86_64 (2013051800) And organize and stream movies on local network with Plex (lester version of Plex Media Server for 64bits) This computer have 6 HDD 2 of 3 TB 3 of 2 TB 1 of 1 TB (all HDD al green technology ) The case is an NZXT H2 Classic The power supply 650 Wats No DVD/Blu-ray Video ATI radeon HD 6xxx 1024MB RAM 8GB All SATA , and all with GUID Partition Table, the motherboard is an GA-EP43T-UD3L with 6 SATA ports i use this computer since OS 10.7 with the same function, and now i have this troubles, especially with Handbrake I don't have enabled any power save option. The monitor is power off all the time i use screen sharing from the imac to use this computer I don't have windows PC sharing the network Can you help me ???? Any ideas ???? Thanks in advance I don't have much software installed on this mac , the rest of the software is: Logmein (for remote management lasted version) Aperture, lasted version, this program is just for plex to allow plex to read a aperture library about 3 GB (i don't use aperture in this mac) VLC, lasted 64bits version subbler for metada download lasted version for browser i use SAFARI because i found several's problem with chrome so i decided to back to the basic. I remove the antivirus to test the CPU usage and appcleaner (free) to remove software, thats all In the finder i remove the preview option for files I have this KText i don't now if are ok AHCI_3rdParty_SATA.kext AHCI_Extended_Injector.kext AHCIPortInjector.kext IOAHCIFamily.kext I have also a ATA drive, just for temp files , this drive will be replace in a few days I don't use mail on this computer I experience a real slow performance if i saw a video with VLC from my iMac (the connection is wired no WIFI) I don't now if the ktext for
×