mirror of
https://github.com/CloverHackyColor/CloverBootloader.git
synced 2024-12-26 16:47:40 +01:00
abc8d3cab3
Signed-off-by: SergeySlice <sergey.slice@gmail.com>
145 lines
5.3 KiB
C
145 lines
5.3 KiB
C
/** @file
|
|
Copyright (C) 2019, vit9696. All rights reserved.
|
|
|
|
All rights reserved.
|
|
|
|
This program and the accompanying materials
|
|
are licensed and made available under the terms and conditions of the BSD License
|
|
which accompanies this distribution. The full text of the license may be found at
|
|
http://opensource.org/licenses/bsd-license.php
|
|
|
|
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
|
|
**/
|
|
|
|
#ifndef OC_AFTER_BOOT_COMPAT_LIB_H
|
|
#define OC_AFTER_BOOT_COMPAT_LIB_H
|
|
|
|
/**
|
|
Apple Boot Compatibility layer configuration.
|
|
**/
|
|
typedef struct OC_ABC_SETTINGS_ {
|
|
///
|
|
/// Protect from boot.efi from defragmenting runtime memory. This fixes UEFI runtime services
|
|
/// (date and time, NVRAM, power control, etc.) support on many firmwares.
|
|
/// Needed basically by everyone that uses SMM implementation of variable services.
|
|
///
|
|
BOOLEAN AvoidRuntimeDefrag; //1
|
|
///
|
|
/// Setup virtual memory mapping after SetVirtualAddresses call. This fixes crashes in many
|
|
/// firmwares at early boot as they accidentally access virtual addresses after ExitBootServices.
|
|
///
|
|
BOOLEAN SetupVirtualMap; //1
|
|
///
|
|
/// Provide custom Apple KASLR slide calculation for firmwares with polluted low memory ranges.
|
|
/// This also ensures that slide= argument is never passed to the operating system.
|
|
///
|
|
BOOLEAN ProvideCustomSlide; //1
|
|
///
|
|
/// Provide max KASLR slide for firmwares with polluted higher memory ranges.
|
|
///
|
|
UINT8 ProvideMaxSlide; //0
|
|
///
|
|
/// Remove runtime flag from MMIO areas and prevent virtual address assignment for known
|
|
/// MMIO regions. This may improve the amount of slides available, but may not work on
|
|
/// unknown configurations.
|
|
///
|
|
BOOLEAN DevirtualiseMmio; //0
|
|
///
|
|
/// Disable passing -s to operating system through key presses, to simulate T2 Mac behaviour.
|
|
/// Ref: https://support.apple.com/HT201573
|
|
///
|
|
BOOLEAN DisableSingleUser; //0
|
|
///
|
|
/// Discard UEFI memory map after waking from hibernation and preserve the original mapping.
|
|
///
|
|
BOOLEAN DiscardHibernateMap; //0
|
|
///
|
|
/// Try to patch Apple bootloader to have KASLR enabled even in SafeMode.
|
|
///
|
|
BOOLEAN EnableSafeModeSlide; //1
|
|
///
|
|
/// Attempt to protect certain memory regions from being incorrectly mapped:
|
|
/// - CSM region could get used by the kernel due to being BS data,
|
|
/// which caused caused wake issues on older firmwares.
|
|
/// - MMIO regions can be marked as reserved memory and be thus unmapped,
|
|
/// which caused boot failures when accessing NVRAM.
|
|
///
|
|
BOOLEAN ProtectMemoryRegions; //0
|
|
///
|
|
/// Rebuild memory map to be compatible with Apple kernel.
|
|
/// - Apply memory attributes and split RT entries into code and data.
|
|
/// - Reduce memory map entries through grouping to fit into 4KB.
|
|
///
|
|
BOOLEAN RebuildAppleMemoryMap; //0
|
|
///
|
|
/// Ensure that ExitBootServices call succeeds even with outdated MemoryMap key.
|
|
///
|
|
BOOLEAN ForceExitBootServices; //0
|
|
///
|
|
/// Disable NVRAM variable write support to protect from malware or to prevent
|
|
/// buggy NVRAM implementations cause system issues.
|
|
///
|
|
BOOLEAN DisableVariableWrite; //0
|
|
///
|
|
/// Protect secure boot variables.
|
|
///
|
|
BOOLEAN ProtectSecureBoot; //0
|
|
///
|
|
/// Permit writing to executable memory in UEFI runtime services. Fixes crashes
|
|
/// on many APTIO V firmwares.
|
|
///
|
|
BOOLEAN EnableWriteUnprotector; //1
|
|
///
|
|
/// Signal OSInfo protocol that every loaded non-macOS OS is macOS.
|
|
/// Works around disabled IGPU in Windows and Linux on Apple laptops.
|
|
///
|
|
BOOLEAN SignalAppleOS; //0
|
|
///
|
|
/// CoreImage may update and restore GetMemoryMap during loading (see InsertImageRecord)
|
|
/// as it needs this for segment splitting. Unfortunately it assumes nobody else
|
|
/// changes GetMemoryMap, and thus restores to its own CoreGetMemoryMap instead of
|
|
/// the previous value. Fix it here.
|
|
/// To make it worse VMware also replaces GetMemoryMap pointer in MacMisc, which CoreDxe
|
|
/// effectively trashes when we load drivers. As a result without this hack VMware Fusion
|
|
/// may show "Your Mac OS guest might run unreliably with more than one virtual core."
|
|
/// message when running OpenCore.
|
|
///
|
|
BOOLEAN ProtectUefiServices; //0
|
|
///
|
|
/// Fix OpenRuntime permissions in the memory map and memory attributes.
|
|
///
|
|
BOOLEAN SyncRuntimePermissions; //1
|
|
///
|
|
/// List of physical addresses to not be devirtualised by DevirtualiseMmio.
|
|
///
|
|
EFI_PHYSICAL_ADDRESS *MmioWhitelist; //null
|
|
///
|
|
/// Size of list of physical addresses to not be devirtualised by DevirtualiseMmio.
|
|
///
|
|
UINTN MmioWhitelistSize; //0
|
|
///
|
|
/// List of NULL-terminated handlers for TPL_APPLICATION execution within ExitBootServices.
|
|
///
|
|
EFI_EVENT_NOTIFY *ExitBootServicesHandlers; //null
|
|
///
|
|
/// List of handler contexts for ExitBootServicesHandlers.
|
|
///
|
|
VOID **ExitBootServicesHandlerContexts; //null
|
|
} OC_ABC_SETTINGS;
|
|
|
|
/**
|
|
Initialize Apple Boot Compatibility layer. This layer is needed on partially
|
|
incompatible firmwares to prevent boot failure and UEFI services breakage.
|
|
|
|
@param[in] Settings Compatibility layer configuration.
|
|
|
|
@retval EFI_SUCCESS on success.
|
|
**/
|
|
EFI_STATUS
|
|
OcAbcInitialize (
|
|
IN OC_ABC_SETTINGS *Settings
|
|
);
|
|
|
|
#endif // OC_AFTER_BOOT_COMPAT_LIB_H
|