mirror of
https://github.com/CloverHackyColor/CloverBootloader.git
synced 2024-11-26 12:05:36 +01:00
6e94e88437
Signed-off-by: SergeySlice <sergey.slice@gmail.com>
650 lines
25 KiB
C++
650 lines
25 KiB
C++
//
|
|
/// @file rEFIt_UEFI/Platform/DataHubCpu.c
|
|
///
|
|
/// VirtualBox CPU descriptors
|
|
///
|
|
/// VirtualBox CPU descriptors also used to set OS X-used NVRAM variables and DataHub data
|
|
///
|
|
|
|
// Copyright(C) 2009-2010 Oracle Corporation
|
|
//
|
|
// This file is part of VirtualBox Open Source Edition(OSE), as
|
|
// available from http://www.virtualbox.org. This file is free software;
|
|
// you can redistribute it and/or modify it under the terms of the GNU
|
|
// General Public License(GPL) as published by the Free Software
|
|
// Foundation, in version 2 as it comes in the "COPYING" file of the
|
|
// VirtualBox OSE distribution. VirtualBox OSE is distributed in the
|
|
// hope that it will be useful, but WITHOUT ANY WARRANTY of any kind.
|
|
|
|
//
|
|
// CHANGELOG:
|
|
//
|
|
// 2019/06/08
|
|
// vector sigma
|
|
// don't inject REV, RBr and EPCI keys if gSettings.Smbios.REV is zeroed
|
|
//
|
|
|
|
#ifndef DEBUG_ALL
|
|
#define DEBUG_DH 1
|
|
#else
|
|
#define DEBUG_DH DEBUG_ALL
|
|
#endif
|
|
|
|
#if DEBUG_DH == 0
|
|
#define DBG(...)
|
|
#else
|
|
#define DBG(...) DebugLog(DEBUG_DH, __VA_ARGS__)
|
|
#endif
|
|
|
|
|
|
#include <Platform.h> // Only use angled for Platform, else, xcode project won't compile
|
|
#include "../include/OSTypes.h"
|
|
#include "Nvram.h"
|
|
#include "platformdata.h"
|
|
#include "smbios.h"
|
|
#include "cpu.h"
|
|
#include "DataHubCpu.h"
|
|
#include "../Platform/CloverVersion.h"
|
|
|
|
#include <Guid/DataHubRecords.h>
|
|
#include <Protocol/AppleSystemInfo.h>
|
|
#include <Protocol/AppleImageCodecProtocol.h>
|
|
|
|
#define EFI_CPU_DATA_MAXIMUM_LENGTH 0x100
|
|
//const char CDM[16] = "sha2-384";
|
|
//const char HW[16] = "x86legacyap";
|
|
|
|
// gDataHub
|
|
/// A pointer to the DataHubProtocol
|
|
EFI_DATA_HUB_PROTOCOL *gDataHub;
|
|
|
|
EFI_SUBCLASS_TYPE1_HEADER mCpuDataRecordHeader = {
|
|
EFI_PROCESSOR_SUBCLASS_VERSION, // Version
|
|
sizeof(EFI_SUBCLASS_TYPE1_HEADER), // Header Size
|
|
0, // Instance (initialize later)
|
|
EFI_SUBCLASS_INSTANCE_NON_APPLICABLE, // SubInstance
|
|
0 // RecordType (initialize later)
|
|
};
|
|
|
|
// gDataHubPlatformGuid
|
|
/// The EFI_GUID of the DataHubProtocol
|
|
constexpr const EFI_GUID gDataHubPlatformGuid = {
|
|
0x64517cc8, 0x6561, 0x4051, { 0xb0, 0x3c, 0x59, 0x64, 0xb6, 0x0f, 0x4c, 0x7a }
|
|
};
|
|
|
|
extern APPLE_SMC_IO_PROTOCOL *gAppleSmc;
|
|
extern UINT32 mCurrentColor;
|
|
extern APPLE_IMAGE_CODEC_PROTOCOL gAppleImageCodec;
|
|
|
|
|
|
typedef union {
|
|
EFI_CPU_DATA_RECORD *DataRecord;
|
|
UINT8 *Raw;
|
|
} EFI_CPU_DATA_RECORD_BUFFER;
|
|
|
|
// PLATFORM_DATA
|
|
/// The struct passed to "LogDataHub" holing key and value to be added
|
|
#pragma pack(1)
|
|
typedef struct {
|
|
EFI_SUBCLASS_TYPE1_HEADER Hdr; /// 0x48
|
|
UINT32 NameLen; /// 0x58 (in bytes)
|
|
UINT32 ValLen; /// 0x5c
|
|
UINT8 Data[1]; /// 0x60 Name Value
|
|
} PLATFORM_DATA_RECORD;
|
|
#pragma pack()
|
|
|
|
// CopyRecord
|
|
/// Copy the data provided in arguments into a PLATFORM_DATA buffer
|
|
///
|
|
/// @param Rec The buffer the data should be copied into
|
|
/// @param Name The value for the member "name"
|
|
/// @param Val The data the object should have
|
|
/// @param ValLen The length of the parameter "Val"
|
|
///
|
|
/// @return The size of the new PLATFORM_DATA object is returned
|
|
UINT32 EFIAPI
|
|
CopyRecord(IN PLATFORM_DATA_RECORD *Rec,
|
|
IN CONST CHAR16 *Name,
|
|
IN const void *Val,
|
|
IN UINT32 ValLen)
|
|
{
|
|
CopyMem(&Rec->Hdr, &mCpuDataRecordHeader, sizeof(EFI_SUBCLASS_TYPE1_HEADER));
|
|
Rec->NameLen = (UINT32)StrLen(Name) * sizeof(CHAR16);
|
|
Rec->ValLen = ValLen;
|
|
CopyMem(Rec->Data, Name, Rec->NameLen);
|
|
CopyMem(Rec->Data + Rec->NameLen, Val, ValLen);
|
|
|
|
return (sizeof(EFI_SUBCLASS_TYPE1_HEADER) + 8 + Rec->NameLen + Rec->ValLen);
|
|
}
|
|
|
|
// LogDataHub
|
|
/// Adds a key-value-pair to the DataHubProtocol
|
|
EFI_STATUS EFIAPI
|
|
LogDataHub(const EFI_GUID& TypeGuid,
|
|
IN CONST CHAR16 *Name,
|
|
IN const void *Data,
|
|
IN UINT32 DataSize)
|
|
{
|
|
UINT32 RecordSize;
|
|
EFI_STATUS Status;
|
|
PLATFORM_DATA_RECORD *platform_data_record;
|
|
|
|
platform_data_record = (PLATFORM_DATA_RECORD*)AllocatePool(sizeof(PLATFORM_DATA_RECORD) + DataSize + EFI_CPU_DATA_MAXIMUM_LENGTH);
|
|
if (platform_data_record == NULL) {
|
|
return EFI_OUT_OF_RESOURCES;
|
|
}
|
|
|
|
RecordSize = CopyRecord(platform_data_record, Name, Data, DataSize);
|
|
Status = gDataHub->LogData(gDataHub,
|
|
TypeGuid, // DataRecordGuid
|
|
gDataHubPlatformGuid, // ProducerName (always)
|
|
EFI_DATA_RECORD_CLASS_DATA,
|
|
platform_data_record,
|
|
RecordSize);
|
|
|
|
FreePool(platform_data_record);
|
|
return Status;
|
|
}
|
|
|
|
EFI_STATUS EFIAPI
|
|
LogDataHubXString8(const EFI_GUID& TypeGuid,
|
|
IN CONST CHAR16 *Name,
|
|
const XString8& s)
|
|
{
|
|
#ifdef JIEF_DEBUG
|
|
if ( s.sizeInBytesIncludingTerminator() > MAX_UINT32 ) panic("LogDataHub s.length > MAX_UINT32");
|
|
#else
|
|
if ( s.sizeInBytesIncludingTerminator() > MAX_UINT32 ) return EFI_OUT_OF_RESOURCES;
|
|
#endif
|
|
return LogDataHub(TypeGuid, Name, (void*)s.c_str(), (UINT32)s.sizeInBytesIncludingTerminator());
|
|
}
|
|
|
|
EFI_STATUS EFIAPI
|
|
LogDataHubXStringW(const EFI_GUID& TypeGuid,
|
|
IN CONST CHAR16 *Name,
|
|
const XStringW& s)
|
|
{
|
|
#ifdef JIEF_DEBUG
|
|
if ( s.sizeInBytesIncludingTerminator() > MAX_UINT32 ) panic("LogDataHub s.length > MAX_UINT32");
|
|
#else
|
|
if ( s.sizeInBytesIncludingTerminator() > MAX_UINT32 ) return EFI_OUT_OF_RESOURCES;
|
|
#endif
|
|
return LogDataHub(TypeGuid, Name, (void*)s.wc_str(), (UINT32)s.sizeInBytesIncludingTerminator());
|
|
}
|
|
|
|
|
|
// SetVariablesForOSX
|
|
/** Installs our runtime services overrides. */
|
|
/** Original runtime services. */
|
|
EFI_RUNTIME_SERVICES gOrgRS;
|
|
|
|
EFI_STATUS EFIAPI
|
|
OvrSetVariable(
|
|
IN CHAR16 *VariableName,
|
|
const EFI_GUID& VendorGuid,
|
|
IN UINT32 Attributes,
|
|
IN UINTN DataSize,
|
|
IN void *Data
|
|
)
|
|
{
|
|
EFI_STATUS Status;
|
|
UINTN i;
|
|
|
|
for (i = 0; i < gSettings.RtVariables.BlockRtVariableArray.size(); i++) {
|
|
if ( gSettings.RtVariables.BlockRtVariableArray[i].Disabled ) {
|
|
continue;
|
|
}
|
|
if ( gSettings.RtVariables.BlockRtVariableArray[i].Guid != VendorGuid ) {
|
|
continue;
|
|
}
|
|
if (gSettings.RtVariables.BlockRtVariableArray[i].Name.isEmpty() || gSettings.RtVariables.BlockRtVariableArray[i].Name[0] == L'*' || gSettings.RtVariables.BlockRtVariableArray[i].Name == LStringW(VariableName) ) {
|
|
return EFI_SUCCESS;
|
|
}
|
|
}
|
|
Status = gOrgRS.SetVariable(VariableName, VendorGuid, Attributes, DataSize, Data);
|
|
return Status;
|
|
}
|
|
|
|
EFI_STATUS EFIAPI
|
|
OvrRuntimeServices(EFI_RUNTIME_SERVICES *RS)
|
|
{
|
|
EFI_STATUS Status;
|
|
CopyMem(&gOrgRS, RS, sizeof(EFI_RUNTIME_SERVICES));
|
|
RS->SetVariable = (EFI_SET_VARIABLE)OvrSetVariable;
|
|
RS->Hdr.CRC32 = 0;
|
|
Status = gBS->CalculateCrc32(RS, RS->Hdr.HeaderSize, &RS->Hdr.CRC32);
|
|
return Status;
|
|
}
|
|
|
|
/// Sets the volatile and non-volatile variables used by OS X
|
|
EFI_STATUS EFIAPI
|
|
SetVariablesForOSX(LOADER_ENTRY *Entry)
|
|
{
|
|
// The variable names used should be made global constants to prevent them being allocated multiple times
|
|
UINT32 Attributes;
|
|
UINT32 Color;
|
|
CONST CHAR8 *None;
|
|
CONST CHAR8 *NvidiaWebValue;
|
|
|
|
CONST CHAR16 *KbdPrevLang;
|
|
UINTN LangLen;
|
|
void *OldData;
|
|
// UINT64 os_version = AsciiOSVersionToUint64(Entry->OSVersion);
|
|
CHAR8 *PlatformLang;
|
|
|
|
EFI_GUID uuid = gSettings.getUUID();
|
|
|
|
//
|
|
// firmware Variables
|
|
//
|
|
if (gSettings.RtVariables.BlockRtVariableArray.size() > 0) {
|
|
OvrRuntimeServices(gRT);
|
|
}
|
|
|
|
// As found on a real Mac, the system-id variable solely has the BS flag
|
|
SetNvramVariable(L"system-id",
|
|
gEfiAppleNvramGuid,
|
|
EFI_VARIABLE_BOOTSERVICE_ACCESS,
|
|
sizeof(uuid),
|
|
&uuid);
|
|
|
|
Attributes = EFI_VARIABLE_BOOTSERVICE_ACCESS | EFI_VARIABLE_RUNTIME_ACCESS;
|
|
|
|
if (GlobalConfig.RtMLB.notEmpty()) {
|
|
if ( GlobalConfig.RtMLB.length() != 17 ) {
|
|
DBG("** Warning: Your MLB is not suitable for iMessage(must be 17 chars long) !\n");
|
|
}
|
|
|
|
SetNvramXString8(L"MLB",
|
|
gEfiAppleNvramGuid,
|
|
Attributes,
|
|
GlobalConfig.RtMLB);
|
|
}
|
|
|
|
if (GlobalConfig.RtROM.notEmpty()) {
|
|
SetNvramVariable(L"ROM",
|
|
gEfiAppleNvramGuid,
|
|
Attributes,
|
|
GlobalConfig.RtROM.size(),
|
|
GlobalConfig.RtROM.vdata());
|
|
}
|
|
|
|
SetNvramVariable(L"FirmwareFeatures",
|
|
gEfiAppleNvramGuid,
|
|
Attributes,
|
|
sizeof(gSettings.Smbios.FirmwareFeatures),
|
|
&gSettings.Smbios.FirmwareFeatures);
|
|
|
|
SetNvramVariable(L"FirmwareFeaturesMask",
|
|
gEfiAppleNvramGuid,
|
|
Attributes,
|
|
sizeof(gSettings.Smbios.FirmwareFeaturesMask),
|
|
&gSettings.Smbios.FirmwareFeaturesMask);
|
|
|
|
SetNvramVariable(L"ExtendedFirmwareFeatures",
|
|
gEfiAppleNvramGuid,
|
|
Attributes,
|
|
sizeof(gSettings.Smbios.ExtendedFirmwareFeatures),
|
|
&gSettings.Smbios.ExtendedFirmwareFeatures);
|
|
|
|
SetNvramVariable(L"ExtendedFirmwareFeaturesMask",
|
|
gEfiAppleNvramGuid,
|
|
Attributes,
|
|
sizeof(gSettings.Smbios.ExtendedFirmwareFeaturesMask),
|
|
&gSettings.Smbios.ExtendedFirmwareFeaturesMask);
|
|
|
|
// HW_MLB and HW_ROM are also around on some Macs with the same values as MLB and ROM
|
|
AddNvramXString8(L"HW_BID", gEfiAppleNvramGuid, Attributes, gSettings.Smbios.BoardNumber);
|
|
|
|
|
|
//
|
|
// OS X non-volatile Variables
|
|
//
|
|
|
|
// note: some gEfiAppleBootGuid vars present in nvram.plist are already set by PutNvramPlistToRtVars()
|
|
// we should think how to handle those vars from nvram.plist and ones set here from gSettings
|
|
|
|
if ((gFirmwareClover && gDriversFlags.EmuVariableLoaded) || gSettings.GUI.KbdPrevLang) {
|
|
// using AddNvramVariable content instead of calling the function to do LangLen calculation only when necessary
|
|
// Do not mess with prev-lang:kbd on UEFI systems without NVRAM emulation; it's OS X's business
|
|
KbdPrevLang = L"prev-lang:kbd";
|
|
OldData = (__typeof__(OldData))GetNvramVariable(KbdPrevLang, gEfiAppleBootGuid, NULL, NULL);
|
|
if (OldData == NULL) {
|
|
gSettings.GUI.Language.trim();
|
|
SetNvramXString8(KbdPrevLang, gEfiAppleBootGuid, Attributes, gSettings.GUI.Language);
|
|
} else {
|
|
FreePool(OldData);
|
|
}
|
|
} else {
|
|
Attributes |= EFI_VARIABLE_NON_VOLATILE;
|
|
}
|
|
|
|
//#define EFI_PLATFORM_LANG_VARIABLE_NAME L"PlatformLang"
|
|
PlatformLang = (__typeof__(PlatformLang))GetNvramVariable(EFI_PLATFORM_LANG_VARIABLE_NAME, gEfiGlobalVariableGuid, NULL, NULL);
|
|
//
|
|
// On some platforms with missing gEfiUnicodeCollation2ProtocolGuid EFI_PLATFORM_LANG_VARIABLE_NAME is set
|
|
// to the value different from "en-...". This is not going to work with our driver UEFI Shell load failures.
|
|
// We did not overwrite EFI_PLATFORM_LANG_VARIABLE_NAME, but it uses some other language.
|
|
//
|
|
// if (!PlatformLang || AsciiStrnCmp (PlatformLang, "en-", 3)) {
|
|
if (!PlatformLang) {
|
|
SetNvramVariable(EFI_PLATFORM_LANG_VARIABLE_NAME, gEfiGlobalVariableGuid,
|
|
Attributes,
|
|
6, "en-US");
|
|
}
|
|
if (PlatformLang) {
|
|
FreePool(PlatformLang);
|
|
}
|
|
|
|
None = "none";
|
|
AddNvramVariable(L"security-mode", gEfiAppleBootGuid, Attributes, 5, (void*)None);
|
|
|
|
// we should have two UUID: platform and system
|
|
// NO! Only Platform is the best solution
|
|
if (!gSettings.ShouldInjectSystemID()) {
|
|
if (gSettings.Smbios.SmUUID.notNull()) {
|
|
SetNvramVariable(L"platform-uuid", gEfiAppleBootGuid, Attributes, sizeof(uuid), &uuid);
|
|
} else {
|
|
AddNvramVariable(L"platform-uuid", gEfiAppleBootGuid, Attributes, sizeof(uuid), &uuid);
|
|
}
|
|
}
|
|
|
|
// Download-Fritz: Do not mess with BacklightLevel; it's OS X's business
|
|
if (gMobile) {
|
|
if (gSettings.SystemParameters.BacklightLevelConfig) {
|
|
SetNvramVariable(L"backlight-level", gEfiAppleBootGuid, Attributes, sizeof(gSettings.SystemParameters.BacklightLevel), &gSettings.SystemParameters.BacklightLevel);
|
|
} else {
|
|
AddNvramVariable(L"backlight-level", gEfiAppleBootGuid, Attributes, sizeof(gSettings.SystemParameters.BacklightLevel), &gSettings.SystemParameters.BacklightLevel);
|
|
}
|
|
}
|
|
|
|
if (gSettings.BootGraphics.DefaultBackgroundColor == 0x80000000) {
|
|
DeleteNvramVariable(L"DefaultBackgroundColor", gEfiAppleNvramGuid);
|
|
} else {
|
|
UINT16 ActualDensity = 0xE1;
|
|
UINT16 DensityThreshold = 0x96;
|
|
UINT64 ConfigStatus = 0;
|
|
Color = gSettings.BootGraphics.DefaultBackgroundColor;
|
|
mCurrentColor = Color;
|
|
DBG("set DefaultBackgroundColor=0x%x\n", Color);
|
|
SetNvramVariable(L"DefaultBackgroundColor", gEfiAppleNvramGuid, Attributes, 4, &Color);
|
|
// add some UI variables
|
|
SetNvramVariable(L"ActualDensity", gEfiAppleBootGuid, Attributes, 2, &ActualDensity);
|
|
SetNvramVariable(L"DensityThreshold", gEfiAppleBootGuid, Attributes, 2, &DensityThreshold);
|
|
SetNvramVariable(L"gfx-saved-config-restore-status", gEfiAppleNvramGuid, Attributes, 8, &ConfigStatus);
|
|
}
|
|
|
|
if (gSettings.BootGraphics.UIScale == 0x80000000) {
|
|
DeleteNvramVariable(L"UIScale", gEfiAppleNvramGuid);
|
|
} else {
|
|
SetNvramVariable(L"UIScale", gEfiAppleNvramGuid, Attributes, 1, &gSettings.BootGraphics.UIScale);
|
|
}
|
|
|
|
if (gSettings.BootGraphics.EFILoginHiDPI == 0x80000000) {
|
|
DeleteNvramVariable(L"EFILoginHiDPI", gEfiAppleBootGuid);
|
|
} else {
|
|
SetNvramVariable(L"EFILoginHiDPI", gEfiAppleBootGuid, Attributes, 4, &gSettings.BootGraphics.EFILoginHiDPI);
|
|
}
|
|
|
|
// ->GetVariable(flagstate, gEfiAppleBootGuid, 0/0, 20, 10FE110) = Not Found
|
|
if (GlobalConfig.flagstate[3] == 0x80) {
|
|
DeleteNvramVariable(L"flagstate", gEfiAppleBootGuid);
|
|
} else {
|
|
SetNvramVariable(L"flagstate", gEfiAppleBootGuid, Attributes, 32, &GlobalConfig.flagstate);
|
|
}
|
|
|
|
if (gSettings.RtVariables.CsrActiveConfig != 0xFFFF) {
|
|
SetNvramVariable(L"csr-active-config", gEfiAppleBootGuid, Attributes, sizeof(gSettings.RtVariables.CsrActiveConfig), &gSettings.RtVariables.CsrActiveConfig);
|
|
}
|
|
|
|
if (gSettings.RtVariables.HWTarget.isEmpty()) {
|
|
// if (Entry->macOSVersion >= MacOsVersion("13"_XS8)) {
|
|
//test legacy model
|
|
// GlobalConfig.CurrentModel = iMac183;
|
|
// }
|
|
gSettings.RtVariables.HWTarget = GetHWTarget(GlobalConfig.CurrentModel);
|
|
}
|
|
|
|
extern APPLE_SYSTEM_INFO_PROTOCOL mSystemInfo;
|
|
if (gSettings.RtVariables.HWTarget.notEmpty()) {
|
|
//install gibraltar
|
|
/*Status=*/gBS->InstallProtocolInterface (&gImageHandle,
|
|
&gAppleSystemInfoProtocolGuid,
|
|
EFI_NATIVE_INTERFACE,
|
|
&mSystemInfo);
|
|
}
|
|
|
|
|
|
if (gSettings.RtVariables.HWTarget.notEmpty() && (Entry->LoaderType != OSTYPE_OSX_INSTALLER) &&
|
|
(Entry->macOSVersion < MacOsVersion("13"_XS8)) ) { //test legacy model
|
|
SetNvramXString8(L"BridgeOSHardwareModel", gEfiAppleNvramGuid, Attributes, gSettings.RtVariables.HWTarget);
|
|
// SetNvramVariable(L"BridgeOSBootSessionUUID", gEfiAppleBootGuid, Attributes, sizeof(uuid), &uuid);
|
|
} else {
|
|
DeleteNvramVariable(L"BridgeOSHardwareModel", gEfiAppleNvramGuid);
|
|
// DeleteNvramVariable(L"BridgeOSBootSessionUUID", gEfiAppleBootGuid);
|
|
}
|
|
|
|
if ( gSettings.RtVariables.BooterCfgStr.notEmpty() ) {
|
|
SetNvramXString8(L"bootercfg", gEfiAppleBootGuid, Attributes, gSettings.RtVariables.BooterCfgStr);
|
|
} else {
|
|
DeleteNvramVariable(L"bootercfg", gEfiAppleBootGuid);
|
|
}
|
|
if (gSettings.SystemParameters.NvidiaWeb) {
|
|
NvidiaWebValue = "1";
|
|
SetNvramVariable(L"nvda_drv", gEfiAppleBootGuid, Attributes, 2, (void*)NvidiaWebValue);
|
|
} else {
|
|
DeleteNvramVariable(L"nvda_drv", gEfiAppleBootGuid);
|
|
}
|
|
|
|
if (!gDriversFlags.AptioMemFixLoaded) {
|
|
DeleteNvramVariable(L"recovery-boot-mode", gEfiAppleBootGuid);
|
|
}
|
|
/*
|
|
// Check for AptioFix2Drv loaded to store efi-boot-device for special boot
|
|
if (gDriversFlags.AptioFix2Loaded || gDriversFlags.AptioFixLoaded ||
|
|
gDriversFlags.AptioFix3Loaded || gDriversFlags.AptioMemFixLoaded) {
|
|
EFI_STATUS Status;
|
|
REFIT_VOLUME *Volume = Entry->Volume;
|
|
const EFI_DEVICE_PATH_PROTOCOL *DevicePath = Volume->DevicePath;
|
|
// We need to remember from which device we boot, to make silence boot while special recovery boot
|
|
Status = gRT->SetVariable(L"specialbootdevice", gEfiAppleBootGuid,
|
|
EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_BOOTSERVICE_ACCESS | EFI_VARIABLE_RUNTIME_ACCESS,
|
|
GetDevicePathSize(DevicePath), (UINT8 *)DevicePath);
|
|
if (EFI_ERROR(Status)) {
|
|
DBG("can't set specialbootdevice!\n");
|
|
}
|
|
}
|
|
*/
|
|
// Sherlocks: to fix "OSInstall.mpkg appears to be missing or damaged" in 10.13+, we should remove this variables.
|
|
if (Entry->LoaderType == OSTYPE_OSX_INSTALLER) {
|
|
if (Entry->macOSVersion.isEmpty() || Entry->macOSVersion > MacOsVersion("10.12"_XS8)) {
|
|
DeleteNvramVariable(L"install-product-url", gEfiAppleBootGuid);
|
|
DeleteNvramVariable(L"previous-system-uuid", gEfiAppleBootGuid);
|
|
}
|
|
}
|
|
|
|
//one more variable can be set for 10.15.4
|
|
//sudo nvram wake-failure=%00%00%00%00%00
|
|
LangLen = 0;
|
|
AddNvramVariable(L"wake-failure", gEfiAppleBootGuid, Attributes, 5, &LangLen);
|
|
|
|
//clear OC garbage
|
|
DeleteNvramVariable(L"opencore-version", gEfiAppleBootGuid);
|
|
DeleteNvramVariable(L"ApBoardID", gAppleSecureBootVariableGuid);
|
|
DeleteNvramVariable(L"ApSecurityDomain", gAppleSecureBootVariableGuid);
|
|
DeleteNvramVariable(L"ApProductionStatus", gAppleSecureBootVariableGuid);
|
|
DeleteNvramVariable(L"ApSecurityMode", gAppleSecureBootVariableGuid);
|
|
DeleteNvramVariable(L"EffectiveProductionStatus", gAppleSecureBootVariableGuid);
|
|
DeleteNvramVariable(L"EffectiveSecurityMode", gAppleSecureBootVariableGuid);
|
|
DeleteNvramVariable(L"CertificateEpoch", gAppleSecureBootVariableGuid);
|
|
DeleteNvramVariable(L"MixNMatchPreventionStatus", gAppleSecureBootVariableGuid);
|
|
DeleteNvramVariable(L"CryptoDigestMethod", gAppleSecureBootVariableGuid);
|
|
DeleteNvramVariable(L"InternalUseOnlyUnit", gAppleSecureBootVariableGuid);
|
|
DeleteNvramVariable(L"ApECID", gAppleSecureBootVariableGuid);
|
|
DeleteNvramVariable(L"HardwareModel", gAppleSecureBootVariableGuid);
|
|
|
|
|
|
//Now we want manually install some SecureBoot Variables while boot.efi do this automatically.
|
|
//set same values
|
|
//test legacy model
|
|
// UINT64 ecid = 0;
|
|
// CopyMem(&ecid, &uuid, 8);
|
|
// SetNvramVariable(L"ApECID", gAppleSecureBootVariableGuid, Attributes, 8, &ecid);
|
|
// SetNvramVariable(L"HardwareModel", gAppleSecureBootVariableGuid, Attributes, 16, HW);
|
|
|
|
return EFI_SUCCESS;
|
|
}
|
|
|
|
void
|
|
AddSMCkey(SMC_KEY Key, SMC_DATA_SIZE Size, SMC_KEY_TYPE Type, SMC_DATA *Data)
|
|
{
|
|
if (gAppleSmc && (gAppleSmc->Signature == NON_APPLE_SMC_SIGNATURE)) {
|
|
gAppleSmc->SmcAddKey(gAppleSmc, Key, Size, Type, 0xC0);
|
|
gAppleSmc->SmcWriteValue(gAppleSmc, Key, Size, Data);
|
|
}
|
|
}
|
|
|
|
// SetupDataForOSX
|
|
/// Sets the DataHub data used by OS X
|
|
void EFIAPI
|
|
SetupDataForOSX(XBool Hibernate)
|
|
{
|
|
EFI_STATUS Status;
|
|
|
|
UINT32 DevPathSupportedVal;
|
|
UINT64 FrontSideBus;
|
|
UINT64 CpuSpeed;
|
|
UINT64 TscFrequency;
|
|
UINT64 ARTFrequency;
|
|
UINTN Revision;
|
|
UINT16 Zero = 0;
|
|
XBool isRevLess = (ApplePlatformDataArray[GlobalConfig.CurrentModel].smcRevision[0] == 0 &&
|
|
ApplePlatformDataArray[GlobalConfig.CurrentModel].smcRevision[1] == 0 &&
|
|
ApplePlatformDataArray[GlobalConfig.CurrentModel].smcRevision[2] == 0 &&
|
|
ApplePlatformDataArray[GlobalConfig.CurrentModel].smcRevision[3] == 0 &&
|
|
ApplePlatformDataArray[GlobalConfig.CurrentModel].smcRevision[4] == 0 &&
|
|
ApplePlatformDataArray[GlobalConfig.CurrentModel].smcRevision[5] == 0);
|
|
|
|
Revision = StrDecimalToUintn(gFirmwareRevision);
|
|
|
|
// fool proof
|
|
FrontSideBus = gCPUStructure.FSBFrequency;
|
|
if ((FrontSideBus < (50 * Mega)) || (FrontSideBus > (1000 * Mega))) {
|
|
DBG("Wrong FrontSideBus=%llu, set to 100MHz\n", FrontSideBus);
|
|
FrontSideBus = 100 * Mega;
|
|
}
|
|
|
|
if (gSettings.CPU.QEMU) {
|
|
FrontSideBus = gCPUStructure.TSCFrequency;
|
|
switch (gCPUStructure.Model) {
|
|
case CPU_MODEL_DOTHAN:
|
|
case CPU_MODEL_YONAH:
|
|
case CPU_MODEL_MEROM:
|
|
case CPU_MODEL_PENRYN:
|
|
FrontSideBus = DivU64x32(FrontSideBus, 4);
|
|
break;
|
|
default:
|
|
break;
|
|
}
|
|
DBG("Using QEMU FrontSideBus=%llull\n", FrontSideBus);
|
|
}
|
|
|
|
// Save values into gSettings for the genconfig aim
|
|
gSettings.CPU.BusSpeed = (UINT32)DivU64x32(FrontSideBus, Kilo);
|
|
|
|
CpuSpeed = gCPUStructure.CPUFrequency;
|
|
gSettings.CPU.CpuFreqMHz = (UINT32)DivU64x32(CpuSpeed, Mega);
|
|
|
|
char RBr[8];
|
|
getRBr(GlobalConfig.CurrentModel, gCPUStructure.Model, gSettings.Smbios.Mobile, RBr);
|
|
char RPlt[8];
|
|
getRPlt(GlobalConfig.CurrentModel, gCPUStructure.Model, gSettings.Smbios.Mobile, RPlt);
|
|
|
|
// Locate DataHub Protocol
|
|
Status = gBS->LocateProtocol(gEfiDataHubProtocolGuid, NULL, (void**)&gDataHub);
|
|
if (!EFI_ERROR(Status)) {
|
|
XStringW ProductName;
|
|
ProductName.takeValueFrom(gSettings.Smbios.ProductName);
|
|
|
|
XStringW SerialNumber;
|
|
SerialNumber.takeValueFrom(gSettings.Smbios.SerialNr);
|
|
|
|
LogDataHub(gEfiProcessorSubClassGuid, L"FSBFrequency", &FrontSideBus, sizeof(UINT64));
|
|
|
|
if (gCPUStructure.ARTFrequency && gSettings.CPU.UseARTFreq) {
|
|
ARTFrequency = gCPUStructure.ARTFrequency;
|
|
LogDataHub(gEfiProcessorSubClassGuid, L"ARTFrequency", &ARTFrequency, sizeof(UINT64));
|
|
}
|
|
|
|
TscFrequency = 0; //gCPUStructure.TSCFrequency;
|
|
LogDataHub(gEfiProcessorSubClassGuid, L"InitialTSC", &TscFrequency, sizeof(UINT64));
|
|
LogDataHub(gEfiProcessorSubClassGuid, L"CPUFrequency", &CpuSpeed, sizeof(UINT64));
|
|
|
|
//gSettings.Smbios.BoardNumber
|
|
LogDataHubXString8(gEfiMiscSubClassGuid, L"board-id", gSettings.Smbios.BoardNumber);
|
|
TscFrequency++;
|
|
LogDataHub(gEfiProcessorSubClassGuid, L"board-rev", &TscFrequency, 1);
|
|
|
|
DevPathSupportedVal = 1;
|
|
LogDataHub(gEfiMiscSubClassGuid, L"DevicePathsSupported", &DevPathSupportedVal, sizeof(UINT32));
|
|
LogDataHubXStringW(gEfiMiscSubClassGuid, L"Model", ProductName);
|
|
LogDataHubXStringW(gEfiMiscSubClassGuid, L"SystemSerialNumber", SerialNumber);
|
|
|
|
if (gSettings.ShouldInjectSystemID()) {
|
|
EFI_GUID uuid = gSettings.getUUID();
|
|
LogDataHub(gEfiMiscSubClassGuid, L"system-id", &uuid, sizeof(uuid));
|
|
}
|
|
|
|
LogDataHub(gEfiProcessorSubClassGuid, L"clovergui-revision", &Revision, sizeof(UINT32));
|
|
|
|
// collect info about real hardware
|
|
LogDataHubXString8(gEfiMiscSubClassGuid, L"OEMVendor", GlobalConfig.OEMVendorFromSmbios);
|
|
LogDataHubXString8(gEfiMiscSubClassGuid, L"OEMProduct", GlobalConfig.OEMProductFromSmbios);
|
|
LogDataHubXString8(gEfiMiscSubClassGuid, L"OEMBoard", GlobalConfig.OEMBoardFromSmbios);
|
|
|
|
// SMC helper
|
|
if (!isRevLess) {
|
|
LogDataHub(gEfiMiscSubClassGuid, L"RBr", &RBr, 8);
|
|
LogDataHub(gEfiMiscSubClassGuid, L"EPCI", &ApplePlatformDataArray[GlobalConfig.CurrentModel].smcConfig, 4);
|
|
LogDataHub(gEfiMiscSubClassGuid, L"REV", &ApplePlatformDataArray[GlobalConfig.CurrentModel].smcRevision, 6);
|
|
LogDataHub(gEfiMiscSubClassGuid, L"RVBF", &ApplePlatformDataArray[GlobalConfig.CurrentModel].smcRevision, 6);
|
|
}
|
|
LogDataHub(gEfiMiscSubClassGuid, L"RPlt", RPlt, 8);
|
|
LogDataHub(gEfiMiscSubClassGuid, L"BEMB", &gSettings.Smbios.Mobile, 1);
|
|
|
|
// all current settings
|
|
// XBuffer<UINT8> xb = gSettings.serialize();
|
|
// LogDataHub(&gEfiMiscSubClassGuid, L"Settings", xb.data(), (UINT32)xb.size());
|
|
}else{
|
|
MsgLog("DataHub protocol not located. Smbios not send to datahub\n");
|
|
}
|
|
if (!gAppleSmc) {
|
|
return;
|
|
}
|
|
if (!isRevLess) {
|
|
AddSMCkey(SMC_MAKE_KEY('R','B','r',' '), 8, SmcKeyTypeCh8, (SMC_DATA *)&RBr);
|
|
AddSMCkey(SMC_MAKE_KEY('E','P','C','I'), 4, SmcKeyTypeUint32, (SMC_DATA *)&ApplePlatformDataArray[GlobalConfig.CurrentModel].smcConfig);
|
|
AddSMCkey(SMC_MAKE_KEY('R','E','V',' '), 6, SmcKeyTypeCh8, (SMC_DATA *)&ApplePlatformDataArray[GlobalConfig.CurrentModel].smcRevision);
|
|
AddSMCkey(SMC_MAKE_KEY('R','V','B','F'), 6, SmcKeyTypeCh8, (SMC_DATA *)&ApplePlatformDataArray[GlobalConfig.CurrentModel].smcRevision);
|
|
}
|
|
AddSMCkey(SMC_MAKE_KEY('R','P','l','t'), 8, SmcKeyTypeCh8, (SMC_DATA *)&RPlt);
|
|
AddSMCkey(SMC_MAKE_KEY('B','E','M','B'), 1, SmcKeyTypeFlag, (SMC_DATA *)&gSettings.Smbios.Mobile);
|
|
//laptop battery keys will be better to import from nvram.plist or read from ACPI(?)
|
|
//they are needed for FileVault2 who want to draw battery status
|
|
AddSMCkey(SMC_MAKE_KEY('B','A','T','P'), 1, SmcKeyTypeFlag, (SMC_DATA *)&Zero); //isBatteryPowered
|
|
AddSMCkey(SMC_MAKE_KEY('B','N','u','m'), 1, SmcKeyTypeUint8, (SMC_DATA *)&gSettings.Smbios.Mobile); // Num Batteries
|
|
if (gSettings.Smbios.Mobile) {
|
|
AddSMCkey(SMC_MAKE_KEY('B','B','I','N'), 1, SmcKeyTypeUint8, (SMC_DATA *)&gSettings.Smbios.Mobile); //Battery inserted
|
|
}
|
|
AddSMCkey(SMC_MAKE_KEY('M','S','T','c'), 1, SmcKeyTypeUint8, (SMC_DATA *)&Zero); // CPU Plimit
|
|
AddSMCkey(SMC_MAKE_KEY('M','S','A','c'), 2, SmcKeyTypeUint16, (SMC_DATA *)&Zero);// GPU Plimit
|
|
// AddSMCkey(SMC_MAKE_KEY('M','S','L','D'), 1, SmcKeyTypeUint8, (SMC_DATA *)&Zero); //isLidClosed
|
|
Zero = Hibernate?((ResumeFromCoreStorage||gSettings.Boot.HibernationFixup)?25:29):0;
|
|
|
|
AddSMCkey(SMC_MAKE_KEY('M','S','W','r'), 1, SmcKeyTypeUint8, (SMC_DATA *)&Zero);
|
|
Zero = 1;
|
|
AddSMCkey(SMC_MAKE_KEY('M','S','F','W'), 2, SmcKeyTypeUint8, (SMC_DATA *)&Zero);
|
|
Zero = 0x300;
|
|
AddSMCkey(SMC_MAKE_KEY('M','S','P','S'), 2, SmcKeyTypeUint16, (SMC_DATA *)&Zero);
|
|
}
|