Home

Awesome

Acer Aspire VX15 Hackintosh

I no longer use hackintosh so this repo will not be maintained!
Just update OpenCore and kexts and you'll be fine 😉

Specs

My Specs

SpecsDetails
ModelAcer Aspire VX15 (VX5-591G)
Operating SystemmacOS Monterey && Windows 11
ProcessorIntel Core i5 7300HQ
MemoryMicron & G.Skill 2x8GB DDR4 2400MHz
M.2 Hard DriveKingston A1000 240GB
2.5" Hard DriveTOSHIBA MQ01ABD100 1TB
Integrated GraphicsIntel HD Graphics 630
Dedicated GraphicsNVIDIA GeForce GTX 1050M
Sound CardRealtek ALC255
Wireless CardIntel Wireless-AC 7265
TrackpadELAN 0501

Tested and working

Not working

Guide

BIOS Settings (Version 1.08)

OpenCore config

Install MacOS

Fix Audio

Fix iServices

Fix Dual Boot

UEFI Secure Boot

I will not give detailed instructions here. See details at here.
You will need linux. However for simplicity I will use CloudShell.

user@cloudshell:~$ sudo apt-get install -y gnu-efi help2man sbsigntool uuid-runtime libfile-slurp-unicode-perl
user@cloudshell:~$ mkdir sign && cd sign
user@cloudshell:~$ git clone https://github.com/vathpela/efitools.git && cd efitools && make
user@cloudshell:~$ cp cert-to-efi-sig-list sign-efi-sig-list KeyTool.efi .. && cd ..
user@cloudshell:~$ openssl req -new -x509 -newkey rsa:4096 -sha256 -days 365 -subj "/C=VN/O=DongDev/CN=Platform Key" -keyout PK.key -out PK.pem
Generating a RSA private key
........................................................................................++++
....................................................................................................................................................................++++
writing new private key to 'PK.key'
Enter PEM pass phrase:
Verifying - Enter PEM pass phrase:
-----
user@cloudshell:~$ openssl req -new -x509 -newkey rsa:4096 -sha256 -days 365 -subj "/C=VN/O=DongDev/CN=Key Exchange Key" -keyout KEK.key -out KEK.pem
Generating a RSA private key
....................................................................................................................................................................................................................................................................................................................................................................++++
...........................................................................................................................................................................................................++++
writing new private key to 'KEK.key'
Enter PEM pass phrase:
Verifying - Enter PEM pass phrase:
-----
user@cloudshell:~$ openssl req -new -x509 -newkey rsa:4096 -sha256 -days 365 -subj "/C=VN/O=DongDev/CN=Image Signing Key" -keyout ISK.key -out ISK.pem
Generating a RSA private key
........................................................++++
...........++++
writing new private key to 'ISK.key'
Enter PEM pass phrase:
Verifying - Enter PEM pass phrase:
-----
user@cloudshell:~$ ./cert-to-efi-sig-list -g "$(uuidgen)" PK.pem PK.esl
user@cloudshell:~$ ./cert-to-efi-sig-list -g "$(uuidgen)" KEK.pem KEK.esl
user@cloudshell:~$ ./cert-to-efi-sig-list -g "$(uuidgen)" ISK.pem ISK.esl
user@cloudshell:~$ wget https://www.dropbox.com/s/un9q4ryu9il0ynd/MicWinProPCA2011_2011-10-19.crt?dl=1 -O MicWinProPCA2011_2011-10-19.crt
user@cloudshell:~$ wget https://www.dropbox.com/s/qwbi3gk7h9qc716/MicCorUEFCA2011_2011-06-27.crt?dl=1 -O MicCorUEFCA2011_2011-06-27.crt
user@cloudshell:~$ openssl x509 -in MicWinProPCA2011_2011-10-19.crt -inform DER -out MsWin.pem -outform PEM
user@cloudshell:~$ openssl x509 -in MicCorUEFCA2011_2011-06-27.crt -inform DER -out UEFI.pem -outform PEM
user@cloudshell:~$ ./cert-to-efi-sig-list -g "$(uuidgen)" MsWin.pem MsWin.esl
user@cloudshell:~$ ./cert-to-efi-sig-list -g "$(uuidgen)" UEFI.pem UEFI.esl
user@cloudshell:~$ cat ISK.esl MsWin.esl UEFI.esl > db.esl
user@cloudshell:~$ ./sign-efi-sig-list -k PK.key -c PK.pem PK PK.esl PK.auth
Timestamp is 2021-7-8 13:02:52
Authentication Payload size 1445
Enter PEM pass phrase:
Signature of size 2058
Signature at: 40
user@cloudshell:~$ ./sign-efi-sig-list -k PK.key -c PK.pem KEK KEK.esl KEK.auth
Timestamp is 2021-7-8 13:03:30
Authentication Payload size 1455
Enter PEM pass phrase:
Signature of size 2058
Signature at: 40
user@cloudshell:~$ ./sign-efi-sig-list -k KEK.key -c KEK.pem db db.esl db.auth
Timestamp is 2021-7-8 13:03:59
Authentication Payload size 4598
Enter PEM pass phrase:
Signature of size 2070
Signature at: 40
user@cloudshell:~$ mkdir OC
user@cloudshell:~$ git clone https://github.com/dongcodebmt/VX5-591G-OpenCore.git && cd VX5-591G-OpenCore
user@cloudshell:~$ cp Drivers/* OpenCore.efi ../OC && cd ..
user@cloudshell:~$ sbsign --key ISK.key --cert ISK.pem HfsPlus.efi
warning: data remaining[33792 vs 33796]: gaps between PE/COFF sections?
warning: data remaining[33792 vs 33800]: gaps between PE/COFF sections?
Enter PEM pass phrase:
Signing Unsigned original image
user@cloudshell:~$ sbsign --key ISK.key --cert ISK.pem OpenCanopy.efi
warning: gap in section table:
    .data   : 0x00015000 - 0x00016000,
    .reloc  : 0x00017000 - 0x00018000,
gaps in the section table may result in different checksums
warning: data remaining[94208 vs 98304]: gaps between PE/COFF sections?
Enter PEM pass phrase:
Signing Unsigned original image
user@cloudshell:~$ sbsign --key ISK.key --cert ISK.pem OpenCore.efi
warning: gap in section table:
    .data   : 0x0006b000 - 0x0007b000,
    .reloc  : 0x00082000 - 0x00084000,
gaps in the section table may result in different checksums
warning: data remaining[512000 vs 540672]: gaps between PE/COFF sections?
Enter PEM pass phrase:
Signing Unsigned original image
user@cloudshell:~$ sbsign --key ISK.key --cert ISK.pem OpenRuntime.efi
warning: data remaining[20480 vs 20484]: gaps between PE/COFF sections?
warning: data remaining[20480 vs 20488]: gaps between PE/COFF sections?
Enter PEM pass phrase:
Signing Unsigned original image
user@cloudshell:~$ rm -rf *.efi && cd .. && mv OC .. && cd .. &&  zip -r OC.zip OC
user@cloudshell:~$ cloudshell download OC.zip

You now have the necessary files. Let's continue here.
Note:

Credits

Thanks to Acidanthera, RehabMan, dortania, alexandred, daliansky, OpenIntelWireless

Enjoy