diff --git a/Chinese, Simplified Localization (zh-Hans)/Internal/Localizable.strings b/Chinese, Simplified Localization (zh-Hans)/Internal/Localizable.strings index 32294201b416907b380e3f7981259d132d8b35da..97723437d109116b16d9a123cf575e8dc2350c9d 100644 --- a/Chinese, Simplified Localization (zh-Hans)/Internal/Localizable.strings +++ b/Chinese, Simplified Localization (zh-Hans)/Internal/Localizable.strings @@ -1293,9 +1293,6 @@ /* cVF-o8-z0z */ "TT_nvram_legacySchemaTables" = "用于分配 NVRAM 变量, 与 LegacyEnable 配合使用\n您可以使用*值来接受所有用于选择GUID的变量.\n警告:由于nvram.plist未被存储,因此请非常谨慎地选择变量. 例如,请勿放入boot-args或csr-active-config,因为这会绕过SIP.\n要从macOS读取NVRAM变量值,可以使用nvram,方法是将变量GUID和名称以:符号分隔. 例如,nvram 7C436110-AB2A-4BBB-A880-FE41995C9F82:boot-args.\n可以在相应的文档:NVRAM变量中找到连续更新的变量列表.\n警告:由于nvram.plist未被存储,因此请非常谨慎地选择变量. 例如,不要放入boot-args或csr-active-config,因为它可以绕过SIP."; -/* 2KJ-kg-wip */ -"TT_LegacyEnable" = "允许从EFI卷根目录加载名为nvram.plist的NVRAM变量文件.\n没有原生NVRAM的设备设置为YES\nmacOS下硬件NVRAM工作不正常的设备设置为YES\nmacOS 下硬件 NVRAM 工作正常的设备设置为 NO\n变量加载发生在“block”(和“add”)阶段之前,并且不会覆盖任何现有变量. 必须在LegacySchema中指定允许设置的变量. 第三方脚本可用于创建nvram.plist文件. 此类脚本的示例可以在“实用工具”中找到. 使用第三方脚本可能需要将ExposeSensitiveData设置为0x3才能为OpenCore EFI分区UUID提供引导路径变量.\n警告:此功能非常危险,因为它将不受保护的数据传递到固件可变服务. 仅当固件未提供硬件NVRAM实现或与固件不兼容时才使用它."; - /* Bqu-cW-189 */ "TT_LegacyOverwrite" = "对模拟nvram用户来说,将nvram.plist写入固件.\n注意:只是覆盖可从操作系统访问的变量,一般不建议开启."; diff --git a/Chinese, Simplified Localization (zh-Hans)/Sections/nvramController.strings b/Chinese, Simplified Localization (zh-Hans)/Sections/nvramController.strings index 682c11ae7d807032854c14fcead7cccac8100fd5..73a6e09832ea9f9c9bea42a068e46fac0e527083 100755 --- a/Chinese, Simplified Localization (zh-Hans)/Sections/nvramController.strings +++ b/Chinese, Simplified Localization (zh-Hans)/Sections/nvramController.strings @@ -23,9 +23,6 @@ /* Class = "NSBox"; title = "Box"; ObjectID = "NoT-Wv-Hn9"; */ "NoT-Wv-Hn9.title" = "Box"; -/* Class = "NSButtonCell"; title = "LegacyEnable"; ObjectID = "ORI-69-MG3"; */ -"ORI-69-MG3.title" = "LegacyEnable"; - /* Class = "NSTabViewItem"; label = "Delete"; ObjectID = "dmH-cD-uzh"; */ "dmH-cD-uzh.label" = "删除"; diff --git a/Chinese, Simplified Localization (zh-Hans)/Sections/uefiController.strings b/Chinese, Simplified Localization (zh-Hans)/Sections/uefiController.strings index 6919093faede5ccd3a77c6fb99db15a83b6d1852..a3a0d18c37f9e42a0a50e4cbb75bd290c7edaa0d 100644 --- a/Chinese, Simplified Localization (zh-Hans)/Sections/uefiController.strings +++ b/Chinese, Simplified Localization (zh-Hans)/Sections/uefiController.strings @@ -56,9 +56,6 @@ /* Class = "NSButtonCell"; title = "PointerSupport"; ObjectID = "Elq-pL-QTD"; */ "Elq-pL-QTD.title" = "PointerSupport"; -/* Class = "NSTextFieldCell"; title = "VolumeAmplifier"; ObjectID = "En7-ww-Uj5"; */ -"En7-ww-Uj5.title" = "VolumeAmplifier"; - /* Class = "NSTextFieldCell"; title = "KeyForgetThreshold"; ObjectID = "ErN-ks-EzO"; */ "ErN-ks-EzO.title" = "KeyForgetThreshold"; @@ -77,6 +74,9 @@ /* Class = "NSTextFieldCell"; title = "KeySubsequentDelay"; ObjectID = "JWy-Kv-Tq6"; */ "JWy-Kv-Tq6.title" = "KeySubsequentDelay"; +/* Class = "NSTableColumn"; headerCell.title = "LoadEarly"; ObjectID = "Jlh-ZM-CXj"; */ +"Jlh-ZM-CXj.headerCell.title" = "LoadEarly"; + /* Class = "NSTableColumn"; headerCell.title = "Arguments"; ObjectID = "Kuw-7J-hNc"; */ "Kuw-7J-hNc.headerCell.title" = "参数\nArguments"; @@ -158,9 +158,6 @@ /* Class = "NSButtonCell"; title = "HideVerbose"; ObjectID = "egr-8J-RIS"; */ "egr-8J-RIS.title" = "HideVerbose"; -/* Class = "NSTextFieldCell"; title = "MinimumVolume"; ObjectID = "ehu-K3-gbY"; */ -"ehu-K3-gbY.title" = "MinimumVolume"; - /* Class = "NSMenuItem"; title = "DEFAULT"; ObjectID = "fZq-zJ-tYW"; */ "fZq-zJ-tYW.title" = "默认"; @@ -182,9 +179,6 @@ /* Class = "NSButtonCell"; title = "Connect Drivers"; ObjectID = "kBk-75-acl"; */ "kBk-75-acl.title" = "连接驱动程序"; -/* Class = "NSTextFieldCell"; title = "AudioOut"; ObjectID = "kM6-tO-pns"; */ -"kM6-tO-pns.title" = "AudioOut"; - /* Class = "NSTableColumn"; headerCell.title = "Address"; ObjectID = "ldi-uY-9wO"; */ "ldi-uY-9wO.headerCell.title" = "地址\nAddress"; diff --git a/Chinese, Traditional Localization (zh-Hant)/Internal/Localizable.strings b/Chinese, Traditional Localization (zh-Hant)/Internal/Localizable.strings index 3870ac5506247b697f36171ce780b9ef41ae246f..4e1dc0d275792bb67de2d2d2194caf0e28690e85 100644 Binary files a/Chinese, Traditional Localization (zh-Hant)/Internal/Localizable.strings and b/Chinese, Traditional Localization (zh-Hant)/Internal/Localizable.strings differ diff --git a/Chinese, Traditional Localization (zh-Hant)/Sections/nvramController.strings b/Chinese, Traditional Localization (zh-Hant)/Sections/nvramController.strings index b3fbbce4c22afcbb2f0264d05900f993d5f36c1b..553de3a0e03d4089a380f8f4a9f98b079f3bc36a 100644 --- a/Chinese, Traditional Localization (zh-Hant)/Sections/nvramController.strings +++ b/Chinese, Traditional Localization (zh-Hant)/Sections/nvramController.strings @@ -23,9 +23,6 @@ /* Class = "NSBox"; title = "Box"; ObjectID = "NoT-Wv-Hn9"; */ "NoT-Wv-Hn9.title" = "Box"; -/* Class = "NSButtonCell"; title = "LegacyEnable"; ObjectID = "ORI-69-MG3"; */ -"ORI-69-MG3.title" = "LegacyEnable"; - /* Class = "NSTabViewItem"; label = "Delete"; ObjectID = "dmH-cD-uzh"; */ "dmH-cD-uzh.label" = "删除"; diff --git a/Chinese, Traditional Localization (zh-Hant)/Sections/uefiController.strings b/Chinese, Traditional Localization (zh-Hant)/Sections/uefiController.strings index 5b8892c5c79c01ea60e20194e25aa82be79971ce..2487607b0da679ddd5fd161d2e110ea03e9ddfdd 100644 --- a/Chinese, Traditional Localization (zh-Hant)/Sections/uefiController.strings +++ b/Chinese, Traditional Localization (zh-Hant)/Sections/uefiController.strings @@ -56,9 +56,6 @@ /* Class = "NSButtonCell"; title = "PointerSupport"; ObjectID = "Elq-pL-QTD"; */ "Elq-pL-QTD.title" = "PointerSupport"; -/* Class = "NSTextFieldCell"; title = "VolumeAmplifier"; ObjectID = "En7-ww-Uj5"; */ -"En7-ww-Uj5.title" = "VolumeAmplifier"; - /* Class = "NSTextFieldCell"; title = "KeyForgetThreshold"; ObjectID = "ErN-ks-EzO"; */ "ErN-ks-EzO.title" = "KeyForgetThreshold"; @@ -77,6 +74,9 @@ /* Class = "NSTextFieldCell"; title = "KeySubsequentDelay"; ObjectID = "JWy-Kv-Tq6"; */ "JWy-Kv-Tq6.title" = "KeySubsequentDelay"; +/* Class = "NSTableColumn"; headerCell.title = "LoadEarly"; ObjectID = "Jlh-ZM-CXj"; */ +"Jlh-ZM-CXj.headerCell.title" = "LoadEarly"; + /* Class = "NSTableColumn"; headerCell.title = "Arguments"; ObjectID = "Kuw-7J-hNc"; */ "Kuw-7J-hNc.headerCell.title" = "Arguments"; @@ -158,9 +158,6 @@ /* Class = "NSButtonCell"; title = "HideVerbose"; ObjectID = "egr-8J-RIS"; */ "egr-8J-RIS.title" = "HideVerbose"; -/* Class = "NSTextFieldCell"; title = "MinimumVolume"; ObjectID = "ehu-K3-gbY"; */ -"ehu-K3-gbY.title" = "MinimumVolume"; - /* Class = "NSMenuItem"; title = "DEFAULT"; ObjectID = "fZq-zJ-tYW"; */ "fZq-zJ-tYW.title" = "DEFAULT"; @@ -182,9 +179,6 @@ /* Class = "NSButtonCell"; title = "Connect Drivers"; ObjectID = "kBk-75-acl"; */ "kBk-75-acl.title" = "連接驅動程式"; -/* Class = "NSTextFieldCell"; title = "AudioOut"; ObjectID = "kM6-tO-pns"; */ -"kM6-tO-pns.title" = "AudioOut"; - /* Class = "NSTableColumn"; headerCell.title = "Address"; ObjectID = "ldi-uY-9wO"; */ "ldi-uY-9wO.headerCell.title" = "地址"; diff --git a/English Localization (en)/Internal/Localizable.strings b/English Localization (en)/Internal/Localizable.strings index 751dde4a68fd9c14141ceb110c746d0b7c24c5c6..9151ebe7391ef2022ab42616de26246310a1c59c 100644 --- a/English Localization (en)/Internal/Localizable.strings +++ b/English Localization (en)/Internal/Localizable.strings @@ -1117,7 +1117,7 @@ /* 6Mq-wE-cHt */ "TT_PowerTimeoutKernelPanic" = "Type: plist boolean\nFailsafe: false\nRequirement: 10.15 (not required for older)\nDescription: Disables kernel panic on setPowerState timeout.\nAn additional security measure was added to macOS Catalina (10.15) causing kernel panic on power change timeout for Apple drivers. Sometimes it may cause issues on misconfigured hardware, notably digital audio, which sometimes fails to wake up. For debug kernels setpowerstate_panic=0 boot argument should be used, which is otherwise equivalent to this quirk."; -"TT_ProvideCurrentCpuInfo" = "Type: plist boolean\nFailsafe: false\nRequirement: 10.8 (10.14)\nDescription: Provides current CPU info to the kernel.\n\nThis quirk works differently depending on the CPU:\n• For Microsoft Hyper-V it provides the correct TSC and FSB values to the kernel, as well as disables CPU topology validation (10.8+).\n• For KVM and other hypervisors it provides precomputed MSR 35h values solving kernel panic with -cpu host.\n• For Intel CPUs it adds support for asymmetrical SMP systems (e.g. Intel Alder Lake) by patching core count to thread count along with the supplemental required changes (10.14+)."; +"TT_ProvideCurrentCpuInfo" = "Type: plist boolean\nFailsafe: false\nRequirement: 10.4 (10.14)\nDescription: Provides current CPU info to the kernel.\n\nThis quirk works differently depending on the CPU:\n• For Microsoft Hyper-V it provides the correct TSC and FSB values to the kernel, as well as disables CPU topology validation (10.8+).\n• For KVM and other hypervisors it provides precomputed MSR 35h values solving kernel panic with -cpu host.\n• For Intel CPUs it adds support for asymmetrical SMP systems (e.g. Intel Alder Lake) by patching core count to thread count along with the supplemental required changes (10.14+). Cache size and cache line size are also provided when using 10.4 as Intel Penryn and newer may only have cache information in CPUID leaf 0x4 which is unsupported by 10.4."; /* yhV-cY-frg */ "TT_ThirdPartyDrives" = "Type: plist boolean\nFailsafe: false\nRequirement: 10.6 (not required for older)\nDescription: Apply vendor patches to IOAHCIBlockStorage.kext to enable native features for third-party drives, such as TRIM on SSDs or hibernation support on 10.15 and newer.\nNote: This option may be avoided on user preference. NVMe SSDs are compatible without the change. For AHCI SSDs on modern macOS version there is a dedicated built-in utility called trimforce. Starting from 10.15 this utility creates EnableTRIM variable in APPLE_BOOT_VARIABLE_GUID namespace with 01 00 00 00 value."; @@ -1216,10 +1216,10 @@ "TT_secureBootModel" = "Type: plist string \nFailsafe: Default\nDescription: Apple Secure Boot hardware model.\n\nSets Apple Secure Boot hardware model and policy. Specifying this value defines which operating systems will be bootable. Operating systems shipped before the specified model was released will not boot.\n\nValid values:\n• Default — Matching model for current SMBIOS.\n• Disabled — No model, Secure Boot will be disabled.\n• j137 — iMacPro1,1 (December 2017) minimum macOS 10.13.2 (17C2111)\n• j680 — MacBookPro15,1 (July 2018) minimum macOS 10.13.6 (17G2112)\n• j132 — MacBookPro15,2 (July 2018) minimum macOS 10.13.6 (17G2112)\n• j174 — Macmini8,1 (October 2018) minimum macOS 10.14 (18A2063)\n• j140k — MacBookAir8,1 (October 2018) minimum macOS 10.14.1 (18B2084)\n• j780 — MacBookPro15,3 (May 2019) minimum macOS 10.14.5 (18F132)\n• j213 — MacBookPro15,4 (July 2019) minimum macOS 10.14.5 (18F2058)\n• j140a — MacBookAir8,2 (July 2019) minimum macOS 10.14.5 (18F2058)\n• j152f — MacBookPro16,1 (November 2019) minimum macOS 10.15.1 (19B2093)\n• j160 — MacPro7,1 (December 2019) minimum macOS 10.15.1 (19B88)\n• j230k — MacBookAir9,1 (March 2020) minimum macOS 10.15.3 (19D2064)\n• j214k — MacBookPro16,2 (May 2020) minimum macOS 10.15.4 (19E2269)\n• j223 — MacBookPro16,3 (May 2020) minimum macOS 10.15.4 (19E2265)\n• j215 — MacBookPro16,4 (June 2020) minimum macOS 10.15.5 (19F96)\n• j185 — iMac20,1 (August 2020) minimum macOS 10.15.6 (19G2005)\n• j185f — iMac20,2 (August 2020) minimum macOS 10.15.6 (19G2005)\n• x86legacy — Macs and VMs without T2 chip minimum macOS 11.0.1 (20B29)\n\nWarning: Not all Apple Secure Boot models are supported on all hardware configurations.\n\nApple Secure Boot appeared in macOS 10.13 on models with T2 chips. Prior to macOS 12 PlatformInfo and SecureBootModel were independent, allowing Apple Secure Boot can be used with any SMBIOS with and without T2. Starting with macOS 12 SecureBootModel must match the SMBIOS Mac model. Default model derives the model based on SMBIOS board identifier, either set automatically via the Generic section or set manually via the SMBIOS section. If there is no board identifier override the model will be derived heuristically from OEM SMBIOS.\n\nSetting SecureBootModel to any valid value but Disabled is equivalent to Medium Security of Apple Secure Boot. The ApECID value must also be specified to achieve Full Security. Check ForceSecureBootScheme when using Apple Secure Boot on a virtual machine.\n\nNote that enabling Apple Secure Boot is demanding on invalid configurations, faulty macOS installations, and on unsupported setups.\n\nThings to consider:\n(a) As with T2 Macs, all unsigned kernel extensions as well as several signed kernel extensions, including NVIDIA Web Drivers, cannot be installed.\n(b) The list of cached kernel extensions may be different, resulting in a need to change the list of Added or Forced kernel extensions. For example, IO80211Family cannot be injected in this case.\n(c) System volume alterations on operating systems with sealing, such as macOS 11, may result in the operating system being unbootable. Do not try to disable system volume encryption unless Apple Secure Boot is disabled.\n(d) Boot failures might occur when the platform requires certain settings, but they have not been enabled because the associated issues were not discovered earlier. Be extra careful with IgnoreInvalidFlexRatio or HashServices.\n(e) Operating systems released before Apple Secure Boot was released (e.g. macOS 10.12 or earlier), will still boot until UEFI Secure Boot is enabled. This is so because Apple Secure Boot treats these as incompatible and they are then handled by the firmware (as Microsoft Windows is).\n(f) On older CPUs (e.g. before Sandy Bridge), enabling Apple Secure Boot might cause slightly slower loading (by up to 1 second).\n(g) As the Default value will increase with time to support the latest major released operating system, it is not recommended to use the ApECID and the Default settings together.\n(h) Installing macOS with Apple Secure Boot enabled is not possible while using HFS+ target volumes. This may include HFS+ formatted drives when no spare APFS drive is available.\n\nThe installed operating system may have sometimes outdated Apple Secure Boot manifests on the Preboot partition, resulting in boot failures. This is likely to be the case when an “OCB: Apple Secure Boot prohibits this boot entry, enforcing!” message is logged.\n\nWhen this happens, either reinstall the operating system or copy the manifests (files with .im4m extension, such as boot.efi.j137.im4m) from /usr/standalone/i386 to /Volumes/Preboot//System/Library/CoreServices. Here, is the system volume identifier. On HFS+ installations, the manifests should be copied to /System/Library/CoreServices on the system volume.\n\nFor more details on how to configure Apple Secure Boot with UEFI Secure Boot, refer to the UEFI Secure Boot"; /* NCW-lH-X8S */ -"TT_PasswordHash" = "Type: plist data 64 bytes\nFailsafe: all zero\nDescription: Password hash used when EnabledPassword is set."; +"TT_PasswordHash" = "Type: plist data 64 bytes\nFailsafe: all zero\nDescription: Password hash used when EnablePassword is set."; /* pYq-Ve-K08 */ -"TT_PasswordSalt" = "Type: plist data\nFailsafe: empty\nDescription: Password salt used when EnabledPassword is set."; +"TT_PasswordSalt" = "Type: plist data\nFailsafe: empty\nDescription: Password salt used when EnablePassword is set."; /* 0sy-D3-AKk */ "TT_AuthRestart" = "Type: plist boolean\nFailsafe: false\nDescription: Enable VirtualSMC-compatible authenticated restart.\n\nAuthenticated restart is a way to reboot FileVault 2 enabled macOS without entering the password. A dedicated terminal command can be used to perform authenticated restarts: sudo fdesetup authrestart. It is also used when installing operating system updates.\n\nVirtualSMC performs authenticated restarts by splitting and saving disk encryption keys between NVRAM and RTC, which despite being removed as soon as OpenCore starts, may be considered a security risk and thus is optional."; @@ -1292,9 +1292,6 @@ /* cVF-o8-z0z */ "TT_nvram_legacySchemaTables" = "3. LegacySchema\nType: plist dict\nDescription: Allows setting certain NVRAM variables from a map (plist dict) of GUIDs to an array (plist array) of variable names in plist string format.\n* value can be used to accept all variables for certain GUID.\nWARNING: Choose variables very carefully, as nvram.plist is not vaulted. For instance, do not put boot-args or csr-active-config, as this can bypass SIP.\nTo read NVRAM variable value from macOS one could use nvram by concatenating variable GUID and name separated by : symbol. For example, nvram 7C436110-AB2A-4BBB-A880-FE41995C9F82:boot-args.\nA continuously updated variable list can be found in a corresponding document: NVRAM Variables.\n\nWARNING: Choose variables carefully, as the nvram.plist file is not vaulted. For instance, do not include boot-args\nor csr-active-config, as these can be used to bypass SIP."; -/* 2KJ-kg-wip */ -"TT_LegacyEnable" = "Type: plist boolean\nFailsafe: false\nDescription: Enables loading a NVRAM variable file named nvram.plist from EFI volume root.\nThis file must have a root plist dictionary type and contain two fields:\n• Version — plist integer, file version, must be set to 1.\n• Add — plist dictionary, equivalent to Add from config.plist.\n\nVariable loading happens prior to the Delete (and Add) phases. Unless LegacyOverwrite is enabled, it overwrite any existing variable. Variables allowed to be set must be specified in LegacySchema. Third-party scripts may be used to create nvram.plist file. An example of such script can be found in Utilities. The use of third-party scripts may require ExposeSensitiveData set to 0x3 to provide boot-path variable with the OpenCore EFI partition UUID.\n\nWARNING: This feature can be dangerous, as it passes unprotected data to your firmware variable services. Only use when no hardware NVRAM implementation is provided by the firmware or when the NVRAM implementation is incompatible."; - /* Bqu-cW-189 */ "TT_LegacyOverwrite" = "Type: plist boolean\nFailsafe: false\nDescription: Permits overwriting firmware variables from nvram.plist.\nNote: Only variables accessible from the operating system will be overwritten."; @@ -1605,7 +1602,7 @@ cat /proc/asound/card{n}/codec#{m}\n\nUsing AudioOutMask, it is possible to play "TT_VolumeAmplifier" = "Type: plist integer\nFailsafe: 0\nDescription: Multiplication coefficient for system volume to raw volume linear translation from 0 to 1000.\nVolume level range read from SystemAudioVolume varies depending on the codec. To transform read value in [0, 127] range into raw volume range [0, 100] the read value is scaled to VolumeAmplifier percents.\n\nNote: the transformation used in macOS is not linear, but it is very close and this nuance is thus ignored."; /* jGE-sP-Rtr */ -"TT_SetupDelay" = "Type: plist integer\nFailsafe: 0\nDescription: Audio codec reconfiguration delay in microseconds.\n\nSome codecs require a vendor-specific delay after the reconfiguration (e.g. volume setting). This option makes it configurable. A typical delay can be up to 0.5 seconds."; +"TT_SetupDelay" = "Type: plist integer\nFailsafe: 0\nDescription: Audio codec reconfiguration delay in milliseconds.\n\nSome codecs require a vendor-specific delay after the reconfiguration (e.g. volume setting). This option makes it configurable. A typical delay can be up to 0.5 seconds."; /* 77y-Lm-hgl */ "TT_playchime" = "Type: plist string\nFailsafe: Auto\nDescription: Play chime sound at startup.\n\nEnabling this setting plays the boot chime using the builtin audio support. The volume level is determined by the SystemAudioVolumeDB NVRAM variable. Supported values are:\n• Auto — Enables chime when StartupMute NVRAM variable is not present or set to 00.\n• Enabled — Enables chime unconditionally.\n• Disabled — Disables chime unconditionally.\n\nNote 1: Enabled can be used separately from the StartupMute NVRAM variable to avoid conflicts when the firmware is able to play the boot chime.\n\nNote 2 : Regardless of this setting, the boot chime will not play if system audio is muted, i.e. if the SystemAudioVolume NVRAM variable has bit 0x80 set."; @@ -1626,7 +1623,7 @@ cat /proc/asound/card{n}/codec#{m}\n\nUsing AudioOutMask, it is possible to play /* Drivers */ /* 6zo-Jl-Ryl */ -"TT_uefi_driversTable" = "1. Comment\nType: plist string\nFailsafe: Empty\nDescription: Arbitrary ASCII string used to provide human readable reference for the entry. Whether this value is used is implementation defined.\n2. Path\nType: plist string\nFailsafe: Empty\nDescription: Path of file to be loaded as a UEFI driver from OC/Drivers directory.\n3. Enabled\nType: plist boolean\nFailsafe: false\nDescription: If false this driver entry will be ignored.\n4. Arguments\nType: plist string\nFailsafe: Empty\nDescription: Some OpenCore plugins accept optional additional arguments which may be specified as a string here."; +"TT_uefi_driversTable" = "1. Comment\nType: plist string\nFailsafe: Empty\nDescription: Arbitrary ASCII string used to provide human readable reference for the entry. Whether this value is used is implementation defined.\n2. Path\nType: plist string\nFailsafe: Empty\nDescription: Path of file to be loaded as a UEFI driver from OC/Drivers directory.\n3. Enabled\nType: plist boolean\nFailsafe: false\nDescription: If false this driver entry will be ignored.\n4. LoadEarly\nType: plist boolean\nFailsafe: false\nDescription: Load the driver early in the OpenCore boot process, before NVRAM setup.\n\nNote: Do not enable this option unless specifically recommended to do so for a given driver and purpose.\n5. Arguments\nType: plist string\nFailsafe: Empty\nDescription: Some OpenCore plugins accept optional additional arguments which may be specified as a string here."; /* 9f0-xd-rhT */ "TT_ConnectDrivers" = "Type: plist boolean\nFailsafe: false\nDescription: Perform UEFI controller connection after driver loading.\nThis option is useful for loading drivers following UEFI driver model, as they may not start by themselves. Examples of such drivers are filesystem or audio drivers. While effective, this option may not be necessary for drivers performing automatic connection, and may slightly slowdown the boot.\n\nNote: Some types of firmware, particularly those made by Apple, only connect the boot drive to speed up the boot process. Enable this option to be able to see all the boot options when running multiple drives."; diff --git a/English Localization (en)/Sections/nvramController.strings b/English Localization (en)/Sections/nvramController.strings index 5e0814ba95feb49fe94bebff885e0b2e9d1a74d3..86862d4b7770662c093fd73c79a6a9a59538125f 100644 --- a/English Localization (en)/Sections/nvramController.strings +++ b/English Localization (en)/Sections/nvramController.strings @@ -23,9 +23,6 @@ /* Class = "NSBox"; title = "Box"; ObjectID = "NoT-Wv-Hn9"; */ "NoT-Wv-Hn9.title" = "Box"; -/* Class = "NSButtonCell"; title = "LegacyEnable"; ObjectID = "ORI-69-MG3"; */ -"ORI-69-MG3.title" = "LegacyEnable"; - /* Class = "NSTabViewItem"; label = "Delete"; ObjectID = "dmH-cD-uzh"; */ "dmH-cD-uzh.label" = "Delete"; diff --git a/English Localization (en)/Sections/uefiController.strings b/English Localization (en)/Sections/uefiController.strings index f950c25a345b4c666619210771b6338925fd544d..c71c95391d3daac4cc4543682b564d7e38cc63ad 100644 --- a/English Localization (en)/Sections/uefiController.strings +++ b/English Localization (en)/Sections/uefiController.strings @@ -56,9 +56,6 @@ /* Class = "NSButtonCell"; title = "PointerSupport"; ObjectID = "Elq-pL-QTD"; */ "Elq-pL-QTD.title" = "PointerSupport"; -/* Class = "NSTextFieldCell"; title = "VolumeAmplifier"; ObjectID = "En7-ww-Uj5"; */ -"En7-ww-Uj5.title" = "VolumeAmplifier"; - /* Class = "NSTextFieldCell"; title = "KeyForgetThreshold"; ObjectID = "ErN-ks-EzO"; */ "ErN-ks-EzO.title" = "KeyForgetThreshold"; @@ -77,6 +74,9 @@ /* Class = "NSTextFieldCell"; title = "KeySubsequentDelay"; ObjectID = "JWy-Kv-Tq6"; */ "JWy-Kv-Tq6.title" = "KeySubsequentDelay"; +/* Class = "NSTableColumn"; headerCell.title = "LoadEarly"; ObjectID = "Jlh-ZM-CXj"; */ +"Jlh-ZM-CXj.headerCell.title" = "LoadEarly"; + /* Class = "NSTableColumn"; headerCell.title = "Arguments"; ObjectID = "Kuw-7J-hNc"; */ "Kuw-7J-hNc.headerCell.title" = "Arguments"; @@ -158,9 +158,6 @@ /* Class = "NSButtonCell"; title = "HideVerbose"; ObjectID = "egr-8J-RIS"; */ "egr-8J-RIS.title" = "HideVerbose"; -/* Class = "NSTextFieldCell"; title = "MinimumVolume"; ObjectID = "ehu-K3-gbY"; */ -"ehu-K3-gbY.title" = "MinimumVolume"; - /* Class = "NSMenuItem"; title = "DEFAULT"; ObjectID = "fZq-zJ-tYW"; */ "fZq-zJ-tYW.title" = "DEFAULT"; @@ -182,9 +179,6 @@ /* Class = "NSButtonCell"; title = "Connect Drivers"; ObjectID = "kBk-75-acl"; */ "kBk-75-acl.title" = "Connect Drivers"; -/* Class = "NSTextFieldCell"; title = "AudioOut"; ObjectID = "kM6-tO-pns"; */ -"kM6-tO-pns.title" = "AudioOut"; - /* Class = "NSTableColumn"; headerCell.title = "Address"; ObjectID = "ldi-uY-9wO"; */ "ldi-uY-9wO.headerCell.title" = "Address"; diff --git a/French Localization (fr)/Internal/Localizable.strings b/French Localization (fr)/Internal/Localizable.strings index 15f33a5e8df5dc0d6f856befafe41a552622ac06..503289c3760a5f2112c19a89b504c9f88835efb8 100644 --- a/French Localization (fr)/Internal/Localizable.strings +++ b/French Localization (fr)/Internal/Localizable.strings @@ -1117,7 +1117,7 @@ /* 6Mq-wE-cHt */ "TT_PowerTimeoutKernelPanic" = "Type: plist boolean\nFailsafe: false\nRequirement: 10.15 (not required for older)\nDescription: Disables kernel panic on setPowerState timeout.\nAn additional security measure was added to macOS Catalina (10.15) causing kernel panic on power change timeout for Apple drivers. Sometimes it may cause issues on misconfigured hardware, notably digital audio, which sometimes fails to wake up. For debug kernels setpowerstate_panic=0 boot argument should be used, which is otherwise equivalent to this quirk."; -"TT_ProvideCurrentCpuInfo" = "Type: plist boolean\nFailsafe: false\nRequirement: 10.8 (10.14)\nDescription: Provides current CPU info to the kernel.\n\nThis quirk works differently depending on the CPU:\n• For Microsoft Hyper-V it provides the correct TSC and FSB values to the kernel, as well as disables CPU topology validation (10.8+).\n• For KVM and other hypervisors it provides precomputed MSR 35h values solving kernel panic with -cpu host.\n• For Intel CPUs it adds support for asymmetrical SMP systems (e.g. Intel Alder Lake) by patching core count to thread count along with the supplemental required changes (10.14+)."; +"TT_ProvideCurrentCpuInfo" = "Type: plist boolean\nFailsafe: false\nRequirement: 10.4 (10.14)\nDescription: Provides current CPU info to the kernel.\n\nThis quirk works differently depending on the CPU:\n• For Microsoft Hyper-V it provides the correct TSC and FSB values to the kernel, as well as disables CPU topology validation (10.8+).\n• For KVM and other hypervisors it provides precomputed MSR 35h values solving kernel panic with -cpu host.\n• For Intel CPUs it adds support for asymmetrical SMP systems (e.g. Intel Alder Lake) by patching core count to thread count along with the supplemental required changes (10.14+). Cache size and cache line size are also provided when using 10.4 as Intel Penryn and newer may only have cache information in CPUID leaf 0x4 which is unsupported by 10.4."; /* yhV-cY-frg */ "TT_ThirdPartyDrives" = "Type: plist boolean\nFailsafe: false\nRequirement: 10.6 (not required for older)\nDescription: Apply vendor patches to IOAHCIBlockStorage.kext to enable native features for third-party drives, such as TRIM on SSDs or hibernation support on 10.15 and newer.\nNote: This option may be avoided on user preference. NVMe SSDs are compatible without the change. For AHCI SSDs on modern macOS version there is a dedicated built-in utility called trimforce. Starting from 10.15 this utility creates EnableTRIM variable in APPLE_BOOT_VARIABLE_GUID namespace with 01 00 00 00 value."; @@ -1216,10 +1216,10 @@ "TT_secureBootModel" = "Type: plist string \nFailsafe: Default\nDescription: Apple Secure Boot hardware model.\n\nSets Apple Secure Boot hardware model and policy. Specifying this value defines which operating systems will be bootable. Operating systems shipped before the specified model was released will not boot.\n\nValid values:\n• Default — Matching model for current SMBIOS.\n• Disabled — No model, Secure Boot will be disabled.\n• j137 — iMacPro1,1 (December 2017) minimum macOS 10.13.2 (17C2111)\n• j680 — MacBookPro15,1 (July 2018) minimum macOS 10.13.6 (17G2112)\n• j132 — MacBookPro15,2 (July 2018) minimum macOS 10.13.6 (17G2112)\n• j174 — Macmini8,1 (October 2018) minimum macOS 10.14 (18A2063)\n• j140k — MacBookAir8,1 (October 2018) minimum macOS 10.14.1 (18B2084)\n• j780 — MacBookPro15,3 (May 2019) minimum macOS 10.14.5 (18F132)\n• j213 — MacBookPro15,4 (July 2019) minimum macOS 10.14.5 (18F2058)\n• j140a — MacBookAir8,2 (July 2019) minimum macOS 10.14.5 (18F2058)\n• j152f — MacBookPro16,1 (November 2019) minimum macOS 10.15.1 (19B2093)\n• j160 — MacPro7,1 (December 2019) minimum macOS 10.15.1 (19B88)\n• j230k — MacBookAir9,1 (March 2020) minimum macOS 10.15.3 (19D2064)\n• j214k — MacBookPro16,2 (May 2020) minimum macOS 10.15.4 (19E2269)\n• j223 — MacBookPro16,3 (May 2020) minimum macOS 10.15.4 (19E2265)\n• j215 — MacBookPro16,4 (June 2020) minimum macOS 10.15.5 (19F96)\n• j185 — iMac20,1 (August 2020) minimum macOS 10.15.6 (19G2005)\n• j185f — iMac20,2 (August 2020) minimum macOS 10.15.6 (19G2005)\n• x86legacy — Macs and VMs without T2 chip minimum macOS 11.0.1 (20B29)\n\nWarning: Not all Apple Secure Boot models are supported on all hardware configurations.\n\nApple Secure Boot appeared in macOS 10.13 on models with T2 chips. Prior to macOS 12 PlatformInfo and SecureBootModel were independent, allowing Apple Secure Boot can be used with any SMBIOS with and without T2. Starting with macOS 12 SecureBootModel must match the SMBIOS Mac model. Default model derives the model based on SMBIOS board identifier, either set automatically via the Generic section or set manually via the SMBIOS section. If there is no board identifier override the model will be derived heuristically from OEM SMBIOS.\n\nSetting SecureBootModel to any valid value but Disabled is equivalent to Medium Security of Apple Secure Boot. The ApECID value must also be specified to achieve Full Security. Check ForceSecureBootScheme when using Apple Secure Boot on a virtual machine.\n\nNote that enabling Apple Secure Boot is demanding on invalid configurations, faulty macOS installations, and on unsupported setups.\n\nThings to consider:\n(a) As with T2 Macs, all unsigned kernel extensions as well as several signed kernel extensions, including NVIDIA Web Drivers, cannot be installed.\n(b) The list of cached kernel extensions may be different, resulting in a need to change the list of Added or Forced kernel extensions. For example, IO80211Family cannot be injected in this case.\n(c) System volume alterations on operating systems with sealing, such as macOS 11, may result in the operating system being unbootable. Do not try to disable system volume encryption unless Apple Secure Boot is disabled.\n(d) Boot failures might occur when the platform requires certain settings, but they have not been enabled because the associated issues were not discovered earlier. Be extra careful with IgnoreInvalidFlexRatio or HashServices.\n(e) Operating systems released before Apple Secure Boot was released (e.g. macOS 10.12 or earlier), will still boot until UEFI Secure Boot is enabled. This is so because Apple Secure Boot treats these as incompatible and they are then handled by the firmware (as Microsoft Windows is).\n(f) On older CPUs (e.g. before Sandy Bridge), enabling Apple Secure Boot might cause slightly slower loading (by up to 1 second).\n(g) As the Default value will increase with time to support the latest major released operating system, it is not recommended to use the ApECID and the Default settings together.\n(h) Installing macOS with Apple Secure Boot enabled is not possible while using HFS+ target volumes. This may include HFS+ formatted drives when no spare APFS drive is available.\n\nThe installed operating system may have sometimes outdated Apple Secure Boot manifests on the Preboot partition, resulting in boot failures. This is likely to be the case when an “OCB: Apple Secure Boot prohibits this boot entry, enforcing!” message is logged.\n\nWhen this happens, either reinstall the operating system or copy the manifests (files with .im4m extension, such as boot.efi.j137.im4m) from /usr/standalone/i386 to /Volumes/Preboot//System/Library/CoreServices. Here, is the system volume identifier. On HFS+ installations, the manifests should be copied to /System/Library/CoreServices on the system volume.\n\nFor more details on how to configure Apple Secure Boot with UEFI Secure Boot, refer to the UEFI Secure Boot"; /* NCW-lH-X8S */ -"TT_PasswordHash" = "Type: plist data 64 bytes\nFailsafe: all zero\nDescription: Password hash used when EnabledPassword is set."; +"TT_PasswordHash" = "Type: plist data 64 bytes\nFailsafe: all zero\nDescription: Password hash used when EnablePassword is set."; /* pYq-Ve-K08 */ -"TT_PasswordSalt" = "Type: plist data\nFailsafe: empty\nDescription: Password salt used when EnabledPassword is set."; +"TT_PasswordSalt" = "Type: plist data\nFailsafe: empty\nDescription: Password salt used when EnablePassword is set."; /* 0sy-D3-AKk */ "TT_AuthRestart" = "Type: plist boolean\nFailsafe: false\nDescription: Enable VirtualSMC-compatible authenticated restart.\n\nAuthenticated restart is a way to reboot FileVault 2 enabled macOS without entering the password. A dedicated terminal command can be used to perform authenticated restarts: sudo fdesetup authrestart. It is also used when installing operating system updates.\n\nVirtualSMC performs authenticated restarts by splitting and saving disk encryption keys between NVRAM and RTC, which despite being removed as soon as OpenCore starts, may be considered a security risk and thus is optional."; @@ -1293,9 +1293,6 @@ This option will override the value of gEfiMdeModulePkgTokenSpaceGuid.PcdSerialU /* cVF-o8-z0z */ "TT_nvram_legacySchemaTables" = "3. LegacySchema\nType: plist dict\nDescription: Allows setting certain NVRAM variables from a map (plist dict) of GUIDs to an array (plist array) of variable names in plist string format.\n* value can be used to accept all variables for certain GUID.\nWARNING: Choose variables very carefully, as nvram.plist is not vaulted. For instance, do not put boot-args or csr-active-config, as this can bypass SIP.\nTo read NVRAM variable value from macOS one could use nvram by concatenating variable GUID and name separated by : symbol. For example, nvram 7C436110-AB2A-4BBB-A880-FE41995C9F82:boot-args.\nA continuously updated variable list can be found in a corresponding document: NVRAM Variables.\n\nWARNING: Choose variables carefully, as the nvram.plist file is not vaulted. For instance, do not include boot-args\nor csr-active-config, as these can be used to bypass SIP."; -/* 2KJ-kg-wip */ -"TT_LegacyEnable" = "Type: plist boolean\nFailsafe: false\nDescription: Enables loading a NVRAM variable file named nvram.plist from EFI volume root.\nThis file must have a root plist dictionary type and contain two fields:\n• Version — plist integer, file version, must be set to 1.\n• Add — plist dictionary, equivalent to Add from config.plist.\n\nVariable loading happens prior to the Delete (and Add) phases. Unless LegacyOverwrite is enabled, it overwrite any existing variable. Variables allowed to be set must be specified in LegacySchema. Third-party scripts may be used to create nvram.plist file. An example of such script can be found in Utilities. The use of third-party scripts may require ExposeSensitiveData set to 0x3 to provide boot-path variable with the OpenCore EFI partition UUID.\n\nWARNING: This feature can be dangerous, as it passes unprotected data to your firmware variable services. Only use when no hardware NVRAM implementation is provided by the firmware or when the NVRAM implementation is incompatible."; - /* Bqu-cW-189 */ "TT_LegacyOverwrite" = "Type: plist boolean\nFailsafe: false\nDescription: Permits overwriting firmware variables from nvram.plist.\nNote: Only variables accessible from the operating system will be overwritten."; @@ -1606,7 +1603,7 @@ cat /proc/asound/card{n}/codec#{m}\n\nUsing AudioOutMask, it is possible to play "TT_VolumeAmplifier" = "Type: plist integer\nFailsafe: 0\nDescription: Multiplication coefficient for system volume to raw volume linear translation from 0 to 1000.\nVolume level range read from SystemAudioVolume varies depending on the codec. To transform read value in [0, 127] range into raw volume range [0, 100] the read value is scaled to VolumeAmplifier percents.\n\nNote: the transformation used in macOS is not linear, but it is very close and this nuance is thus ignored."; /* jGE-sP-Rtr */ -"TT_SetupDelay" = "Type: plist integer\nFailsafe: 0\nDescription: Audio codec reconfiguration delay in microseconds.\n\nSome codecs require a vendor-specific delay after the reconfiguration (e.g. volume setting). This option makes it configurable. A typical delay can be up to 0.5 seconds."; +"TT_SetupDelay" = "Type: plist integer\nFailsafe: 0\nDescription: Audio codec reconfiguration delay in milliseconds.\n\nSome codecs require a vendor-specific delay after the reconfiguration (e.g. volume setting). This option makes it configurable. A typical delay can be up to 0.5 seconds."; /* 77y-Lm-hgl */ "TT_playchime" = "Type: plist string\nFailsafe: Auto\nDescription: Play chime sound at startup.\n\nEnabling this setting plays the boot chime using the builtin audio support. The volume level is determined by the SystemAudioVolumeDB NVRAM variable. Supported values are:\n• Auto — Enables chime when StartupMute NVRAM variable is not present or set to 00.\n• Enabled — Enables chime unconditionally.\n• Disabled — Disables chime unconditionally.\n\nNote 1: Enabled can be used separately from the StartupMute NVRAM variable to avoid conflicts when the firmware is able to play the boot chime.\n\nNote 2 : Regardless of this setting, the boot chime will not play if system audio is muted, i.e. if the SystemAudioVolume NVRAM variable has bit 0x80 set."; @@ -1627,7 +1624,7 @@ cat /proc/asound/card{n}/codec#{m}\n\nUsing AudioOutMask, it is possible to play /* Drivers */ /* 6zo-Jl-Ryl */ -"TT_uefi_driversTable" = "1. Path\nType: plist string\nFailsafe: Empty\nDescription: Path of file to be loaded as a UEFI driver from OC/Drivers directory.\n2. Enabled\nType: plist boolean\nFailsafe: false\nDescription: If false this driver entry will be ignored.\n3. Arguments\nType: plist string\nFailsafe: Empty\nDescription: Some OpenCore plugins accept optional additional arguments which may be specified as a string here."; +"TT_uefi_driversTable" = "1. Comment\nType: plist string\nFailsafe: Empty\nDescription: Arbitrary ASCII string used to provide human readable reference for the entry. Whether this value is used is implementation defined.\n2. Path\nType: plist string\nFailsafe: Empty\nDescription: Path of file to be loaded as a UEFI driver from OC/Drivers directory.\n3. Enabled\nType: plist boolean\nFailsafe: false\nDescription: If false this driver entry will be ignored.\n4. LoadEarly\nType: plist boolean\nFailsafe: false\nDescription: Load the driver early in the OpenCore boot process, before NVRAM setup.\n\nNote: Do not enable this option unless specifically recommended to do so for a given driver and purpose.\n5. Arguments\nType: plist string\nFailsafe: Empty\nDescription: Some OpenCore plugins accept optional additional arguments which may be specified as a string here."; /* 9f0-xd-rhT */ "TT_ConnectDrivers" = "Type: plist boolean\nFailsafe: false\nDescription: Perform UEFI controller connection after driver loading.\nThis option is useful for loading drivers following UEFI driver model, as they may not start by themselves. Examples of such drivers are filesystem or audio drivers. While effective, this option may not be necessary for drivers performing automatic connection, and may slightly slowdown the boot.\n\nNote: Some types of firmware, particularly those made by Apple, only connect the boot drive to speed up the boot process. Enable this option to be able to see all the boot options when running multiple drives."; diff --git a/French Localization (fr)/Sections/nvramController.strings b/French Localization (fr)/Sections/nvramController.strings index c9c9ac9734bc5a525313a54d464b8053de6b71d3..9633ca800d9339cc1c8b9edfd8f8c70de994717d 100644 --- a/French Localization (fr)/Sections/nvramController.strings +++ b/French Localization (fr)/Sections/nvramController.strings @@ -23,9 +23,6 @@ /* Class = "NSBox"; title = "Box"; ObjectID = "NoT-Wv-Hn9"; */ "NoT-Wv-Hn9.title" = "Box"; -/* Class = "NSButtonCell"; title = "LegacyEnable"; ObjectID = "ORI-69-MG3"; */ -"ORI-69-MG3.title" = "LegacyEnable"; - /* Class = "NSTabViewItem"; label = "Delete"; ObjectID = "dmH-cD-uzh"; */ "dmH-cD-uzh.label" = "Effacer"; diff --git a/French Localization (fr)/Sections/uefiController.strings b/French Localization (fr)/Sections/uefiController.strings index 89d3f19a36de3ac1760ad6ceda494328ab9a7431..279f81f223981b959fcf1438293e7e79ef2d7fc3 100644 --- a/French Localization (fr)/Sections/uefiController.strings +++ b/French Localization (fr)/Sections/uefiController.strings @@ -56,9 +56,6 @@ /* Class = "NSButtonCell"; title = "PointerSupport"; ObjectID = "Elq-pL-QTD"; */ "Elq-pL-QTD.title" = "PointerSupport"; -/* Class = "NSTextFieldCell"; title = "VolumeAmplifier"; ObjectID = "En7-ww-Uj5"; */ -"En7-ww-Uj5.title" = "VolumeAmplifier"; - /* Class = "NSTextFieldCell"; title = "KeyForgetThreshold"; ObjectID = "ErN-ks-EzO"; */ "ErN-ks-EzO.title" = "KeyForgetThreshold"; @@ -77,6 +74,9 @@ /* Class = "NSTextFieldCell"; title = "KeySubsequentDelay"; ObjectID = "JWy-Kv-Tq6"; */ "JWy-Kv-Tq6.title" = "KeySubsequentDelay"; +/* Class = "NSTableColumn"; headerCell.title = "LoadEarly"; ObjectID = "Jlh-ZM-CXj"; */ +"Jlh-ZM-CXj.headerCell.title" = "LoadEarly"; + /* Class = "NSTableColumn"; headerCell.title = "Arguments"; ObjectID = "Kuw-7J-hNc"; */ "Kuw-7J-hNc.headerCell.title" = "Arguments"; @@ -158,9 +158,6 @@ /* Class = "NSButtonCell"; title = "HideVerbose"; ObjectID = "egr-8J-RIS"; */ "egr-8J-RIS.title" = "HideVerbose"; -/* Class = "NSTextFieldCell"; title = "MinimumVolume"; ObjectID = "ehu-K3-gbY"; */ -"ehu-K3-gbY.title" = "MinimumVolume"; - /* Class = "NSMenuItem"; title = "DEFAULT"; ObjectID = "fZq-zJ-tYW"; */ "fZq-zJ-tYW.title" = "DEFAULT"; @@ -182,9 +179,6 @@ /* Class = "NSButtonCell"; title = "Connect Drivers"; ObjectID = "kBk-75-acl"; */ "kBk-75-acl.title" = "Pilote de connexion"; -/* Class = "NSTextFieldCell"; title = "AudioOut"; ObjectID = "kM6-tO-pns"; */ -"kM6-tO-pns.title" = "AudioOut"; - /* Class = "NSTableColumn"; headerCell.title = "Address"; ObjectID = "ldi-uY-9wO"; */ "ldi-uY-9wO.headerCell.title" = "Adresse"; diff --git a/Korean Localization (ko)/Internal/Localizable.strings b/Korean Localization (ko)/Internal/Localizable.strings index 12c8fa8930e1a59dd9f2d2081e604c1e8287664f..1b1ee25b6937f765f1836b0555b26c5cee30c307 100644 --- a/Korean Localization (ko)/Internal/Localizable.strings +++ b/Korean Localization (ko)/Internal/Localizable.strings @@ -1117,7 +1117,7 @@ /* 6Mq-wE-cHt */ "TT_PowerTimeoutKernelPanic" = "Type: plist boolean\nFailsafe: false\nRequirement: 10.15 (not required for older)\nDescription: Disables kernel panic on setPowerState timeout.\nAn additional security measure was added to macOS Catalina (10.15) causing kernel panic on power change timeout for Apple drivers. Sometimes it may cause issues on misconfigured hardware, notably digital audio, which sometimes fails to wake up. For debug kernels setpowerstate_panic=0 boot argument should be used, which is otherwise equivalent to this quirk."; -"TT_ProvideCurrentCpuInfo" = "Type: plist boolean\nFailsafe: false\nRequirement: 10.8 (10.14)\nDescription: Provides current CPU info to the kernel.\n\nThis quirk works differently depending on the CPU:\n• For Microsoft Hyper-V it provides the correct TSC and FSB values to the kernel, as well as disables CPU topology validation (10.8+).\n• For KVM and other hypervisors it provides precomputed MSR 35h values solving kernel panic with -cpu host.\n• For Intel CPUs it adds support for asymmetrical SMP systems (e.g. Intel Alder Lake) by patching core count to thread count along with the supplemental required changes (10.14+)."; +"TT_ProvideCurrentCpuInfo" = "Type: plist boolean\nFailsafe: false\nRequirement: 10.4 (10.14)\nDescription: Provides current CPU info to the kernel.\n\nThis quirk works differently depending on the CPU:\n• For Microsoft Hyper-V it provides the correct TSC and FSB values to the kernel, as well as disables CPU topology validation (10.8+).\n• For KVM and other hypervisors it provides precomputed MSR 35h values solving kernel panic with -cpu host.\n• For Intel CPUs it adds support for asymmetrical SMP systems (e.g. Intel Alder Lake) by patching core count to thread count along with the supplemental required changes (10.14+). Cache size and cache line size are also provided when using 10.4 as Intel Penryn and newer may only have cache information in CPUID leaf 0x4 which is unsupported by 10.4."; /* yhV-cY-frg */ "TT_ThirdPartyDrives" = "Type: plist boolean\nFailsafe: false\nRequirement: 10.6 (not required for older)\nDescription: Apply vendor patches to IOAHCIBlockStorage.kext to enable native features for third-party drives, such as TRIM on SSDs or hibernation support on 10.15 and newer.\nNote: This option may be avoided on user preference. NVMe SSDs are compatible without the change. For AHCI SSDs on modern macOS version there is a dedicated built-in utility called trimforce. Starting from 10.15 this utility creates EnableTRIM variable in APPLE_BOOT_VARIABLE_GUID namespace with 01 00 00 00 value."; @@ -1216,10 +1216,10 @@ "TT_secureBootModel" = "Type: plist string \nFailsafe: Default\nDescription: Apple Secure Boot hardware model.\n\nSets Apple Secure Boot hardware model and policy. Specifying this value defines which operating systems will be bootable. Operating systems shipped before the specified model was released will not boot.\n\nValid values:\n• Default — Matching model for current SMBIOS.\n• Disabled — No model, Secure Boot will be disabled.\n• j137 — iMacPro1,1 (December 2017) minimum macOS 10.13.2 (17C2111)\n• j680 — MacBookPro15,1 (July 2018) minimum macOS 10.13.6 (17G2112)\n• j132 — MacBookPro15,2 (July 2018) minimum macOS 10.13.6 (17G2112)\n• j174 — Macmini8,1 (October 2018) minimum macOS 10.14 (18A2063)\n• j140k — MacBookAir8,1 (October 2018) minimum macOS 10.14.1 (18B2084)\n• j780 — MacBookPro15,3 (May 2019) minimum macOS 10.14.5 (18F132)\n• j213 — MacBookPro15,4 (July 2019) minimum macOS 10.14.5 (18F2058)\n• j140a — MacBookAir8,2 (July 2019) minimum macOS 10.14.5 (18F2058)\n• j152f — MacBookPro16,1 (November 2019) minimum macOS 10.15.1 (19B2093)\n• j160 — MacPro7,1 (December 2019) minimum macOS 10.15.1 (19B88)\n• j230k — MacBookAir9,1 (March 2020) minimum macOS 10.15.3 (19D2064)\n• j214k — MacBookPro16,2 (May 2020) minimum macOS 10.15.4 (19E2269)\n• j223 — MacBookPro16,3 (May 2020) minimum macOS 10.15.4 (19E2265)\n• j215 — MacBookPro16,4 (June 2020) minimum macOS 10.15.5 (19F96)\n• j185 — iMac20,1 (August 2020) minimum macOS 10.15.6 (19G2005)\n• j185f — iMac20,2 (August 2020) minimum macOS 10.15.6 (19G2005)\n• x86legacy — Macs and VMs without T2 chip minimum macOS 11.0.1 (20B29)\n\nWarning: Not all Apple Secure Boot models are supported on all hardware configurations.\n\nApple Secure Boot appeared in macOS 10.13 on models with T2 chips. Prior to macOS 12 PlatformInfo and SecureBootModel were independent, allowing Apple Secure Boot can be used with any SMBIOS with and without T2. Starting with macOS 12 SecureBootModel must match the SMBIOS Mac model. Default model derives the model based on SMBIOS board identifier, either set automatically via the Generic section or set manually via the SMBIOS section. If there is no board identifier override the model will be derived heuristically from OEM SMBIOS.\n\nSetting SecureBootModel to any valid value but Disabled is equivalent to Medium Security of Apple Secure Boot. The ApECID value must also be specified to achieve Full Security. Check ForceSecureBootScheme when using Apple Secure Boot on a virtual machine.\n\nNote that enabling Apple Secure Boot is demanding on invalid configurations, faulty macOS installations, and on unsupported setups.\n\nThings to consider:\n(a) As with T2 Macs, all unsigned kernel extensions as well as several signed kernel extensions, including NVIDIA Web Drivers, cannot be installed.\n(b) The list of cached kernel extensions may be different, resulting in a need to change the list of Added or Forced kernel extensions. For example, IO80211Family cannot be injected in this case.\n(c) System volume alterations on operating systems with sealing, such as macOS 11, may result in the operating system being unbootable. Do not try to disable system volume encryption unless Apple Secure Boot is disabled.\n(d) Boot failures might occur when the platform requires certain settings, but they have not been enabled because the associated issues were not discovered earlier. Be extra careful with IgnoreInvalidFlexRatio or HashServices.\n(e) Operating systems released before Apple Secure Boot was released (e.g. macOS 10.12 or earlier), will still boot until UEFI Secure Boot is enabled. This is so because Apple Secure Boot treats these as incompatible and they are then handled by the firmware (as Microsoft Windows is).\n(f) On older CPUs (e.g. before Sandy Bridge), enabling Apple Secure Boot might cause slightly slower loading (by up to 1 second).\n(g) As the Default value will increase with time to support the latest major released operating system, it is not recommended to use the ApECID and the Default settings together.\n(h) Installing macOS with Apple Secure Boot enabled is not possible while using HFS+ target volumes. This may include HFS+ formatted drives when no spare APFS drive is available.\n\nThe installed operating system may have sometimes outdated Apple Secure Boot manifests on the Preboot partition, resulting in boot failures. This is likely to be the case when an “OCB: Apple Secure Boot prohibits this boot entry, enforcing!” message is logged.\n\nWhen this happens, either reinstall the operating system or copy the manifests (files with .im4m extension, such as boot.efi.j137.im4m) from /usr/standalone/i386 to /Volumes/Preboot//System/Library/CoreServices. Here, is the system volume identifier. On HFS+ installations, the manifests should be copied to /System/Library/CoreServices on the system volume.\n\nFor more details on how to configure Apple Secure Boot with UEFI Secure Boot, refer to the UEFI Secure Boot"; /* NCW-lH-X8S */ -"TT_PasswordHash" = "Type: plist data 64 bytes\nFailsafe: all zero\nDescription: Password hash used when EnabledPassword is set."; +"TT_PasswordHash" = "Type: plist data 64 bytes\nFailsafe: all zero\nDescription: Password hash used when EnablePassword is set."; /* pYq-Ve-K08 */ -"TT_PasswordSalt" = "Type: plist data\nFailsafe: empty\nDescription: Password salt used when EnabledPassword is set."; +"TT_PasswordSalt" = "Type: plist data\nFailsafe: empty\nDescription: Password salt used when EnablePassword is set."; /* 0sy-D3-AKk */ "TT_AuthRestart" = "Type: plist boolean\nFailsafe: false\nDescription: Enable VirtualSMC-compatible authenticated restart.\n\nAuthenticated restart is a way to reboot FileVault 2 enabled macOS without entering the password. A dedicated terminal command can be used to perform authenticated restarts: sudo fdesetup authrestart. It is also used when installing operating system updates.\n\nVirtualSMC performs authenticated restarts by splitting and saving disk encryption keys between NVRAM and RTC, which despite being removed as soon as OpenCore starts, may be considered a security risk and thus is optional."; @@ -1293,9 +1293,6 @@ This option will override the value of gEfiMdeModulePkgTokenSpaceGuid.PcdSerialU /* cVF-o8-z0z */ "TT_nvram_legacySchemaTables" = "3. LegacySchema\nType: plist dict\nDescription: Allows setting certain NVRAM variables from a map (plist dict) of GUIDs to an array (plist array) of variable names in plist string format.\n* value can be used to accept all variables for certain GUID.\nWARNING: Choose variables very carefully, as nvram.plist is not vaulted. For instance, do not put boot-args or csr-active-config, as this can bypass SIP.\nTo read NVRAM variable value from macOS one could use nvram by concatenating variable GUID and name separated by : symbol. For example, nvram 7C436110-AB2A-4BBB-A880-FE41995C9F82:boot-args.\nA continuously updated variable list can be found in a corresponding document: NVRAM Variables.\n\nWARNING: Choose variables carefully, as the nvram.plist file is not vaulted. For instance, do not include boot-args\nor csr-active-config, as these can be used to bypass SIP."; -/* 2KJ-kg-wip */ -"TT_LegacyEnable" = "Type: plist boolean\nFailsafe: false\nDescription: Enables loading a NVRAM variable file named nvram.plist from EFI volume root.\nThis file must have a root plist dictionary type and contain two fields:\n• Version — plist integer, file version, must be set to 1.\n• Add — plist dictionary, equivalent to Add from config.plist.\n\nVariable loading happens prior to the Delete (and Add) phases. Unless LegacyOverwrite is enabled, it overwrite any existing variable. Variables allowed to be set must be specified in LegacySchema. Third-party scripts may be used to create nvram.plist file. An example of such script can be found in Utilities. The use of third-party scripts may require ExposeSensitiveData set to 0x3 to provide boot-path variable with the OpenCore EFI partition UUID.\n\nWARNING: This feature can be dangerous, as it passes unprotected data to your firmware variable services. Only use when no hardware NVRAM implementation is provided by the firmware or when the NVRAM implementation is incompatible."; - /* Bqu-cW-189 */ "TT_LegacyOverwrite" = "Type: plist boolean\nFailsafe: false\nDescription: Permits overwriting firmware variables from nvram.plist.\nNote: Only variables accessible from the operating system will be overwritten."; @@ -1606,7 +1603,7 @@ cat /proc/asound/card{n}/codec#{m}\n\nUsing AudioOutMask, it is possible to play "TT_VolumeAmplifier" = "Type: plist integer\nFailsafe: 0\nDescription: Multiplication coefficient for system volume to raw volume linear translation from 0 to 1000.\nVolume level range read from SystemAudioVolume varies depending on the codec. To transform read value in [0, 127] range into raw volume range [0, 100] the read value is scaled to VolumeAmplifier percents.\n\nNote: the transformation used in macOS is not linear, but it is very close and this nuance is thus ignored."; /* jGE-sP-Rtr */ -"TT_SetupDelay" = "Type: plist integer\nFailsafe: 0\nDescription: Audio codec reconfiguration delay in microseconds.\n\nSome codecs require a vendor-specific delay after the reconfiguration (e.g. volume setting). This option makes it configurable. A typical delay can be up to 0.5 seconds."; +"TT_SetupDelay" = "Type: plist integer\nFailsafe: 0\nDescription: Audio codec reconfiguration delay in milliseconds.\n\nSome codecs require a vendor-specific delay after the reconfiguration (e.g. volume setting). This option makes it configurable. A typical delay can be up to 0.5 seconds."; /* 77y-Lm-hgl */ "TT_playchime" = "Type: plist string\nFailsafe: Auto\nDescription: Play chime sound at startup.\n\nEnabling this setting plays the boot chime using the builtin audio support. The volume level is determined by the SystemAudioVolumeDB NVRAM variable. Supported values are:\n• Auto — Enables chime when StartupMute NVRAM variable is not present or set to 00.\n• Enabled — Enables chime unconditionally.\n• Disabled — Disables chime unconditionally.\n\nNote 1: Enabled can be used separately from the StartupMute NVRAM variable to avoid conflicts when the firmware is able to play the boot chime.\n\nNote 2 : Regardless of this setting, the boot chime will not play if system audio is muted, i.e. if the SystemAudioVolume NVRAM variable has bit 0x80 set."; @@ -1627,7 +1624,7 @@ cat /proc/asound/card{n}/codec#{m}\n\nUsing AudioOutMask, it is possible to play /* Drivers */ /* 6zo-Jl-Ryl */ -"TT_uefi_driversTable" = "1. Path\nType: plist string\nFailsafe: Empty\nDescription: Path of file to be loaded as a UEFI driver from OC/Drivers directory.\n2. Enabled\nType: plist boolean\nFailsafe: false\nDescription: If false this driver entry will be ignored.\n3. Arguments\nType: plist string\nFailsafe: Empty\nDescription: Some OpenCore plugins accept optional additional arguments which may be specified as a string here."; +"TT_uefi_driversTable" = "1. Comment\nType: plist string\nFailsafe: Empty\nDescription: Arbitrary ASCII string used to provide human readable reference for the entry. Whether this value is used is implementation defined.\n2. Path\nType: plist string\nFailsafe: Empty\nDescription: Path of file to be loaded as a UEFI driver from OC/Drivers directory.\n3. Enabled\nType: plist boolean\nFailsafe: false\nDescription: If false this driver entry will be ignored.\n4. LoadEarly\nType: plist boolean\nFailsafe: false\nDescription: Load the driver early in the OpenCore boot process, before NVRAM setup.\n\nNote: Do not enable this option unless specifically recommended to do so for a given driver and purpose.\n5. Arguments\nType: plist string\nFailsafe: Empty\nDescription: Some OpenCore plugins accept optional additional arguments which may be specified as a string here."; /* 9f0-xd-rhT */ "TT_ConnectDrivers" = "Type: plist boolean\nFailsafe: false\nDescription: Perform UEFI controller connection after driver loading.\nThis option is useful for loading drivers following UEFI driver model, as they may not start by themselves. Examples of such drivers are filesystem or audio drivers. While effective, this option may not be necessary for drivers performing automatic connection, and may slightly slowdown the boot.\n\nNote: Some types of firmware, particularly those made by Apple, only connect the boot drive to speed up the boot process. Enable this option to be able to see all the boot options when running multiple drives."; diff --git a/Korean Localization (ko)/Sections/nvramController.strings b/Korean Localization (ko)/Sections/nvramController.strings index e1930258a8342e4496ca3318bb73a225d7208a98..197780f46b606f7b2373a44645040b0bc2051f4b 100644 --- a/Korean Localization (ko)/Sections/nvramController.strings +++ b/Korean Localization (ko)/Sections/nvramController.strings @@ -23,9 +23,6 @@ /* Class = "NSBox"; title = "Box"; ObjectID = "NoT-Wv-Hn9"; */ "NoT-Wv-Hn9.title" = "박스"; -/* Class = "NSButtonCell"; title = "LegacyEnable"; ObjectID = "ORI-69-MG3"; */ -"ORI-69-MG3.title" = "LegacyEnable"; - /* Class = "NSTabViewItem"; label = "Delete"; ObjectID = "dmH-cD-uzh"; */ "dmH-cD-uzh.label" = "지우기"; diff --git a/Korean Localization (ko)/Sections/uefiController.strings b/Korean Localization (ko)/Sections/uefiController.strings index 0cf1de1ec51193f1b20e416d3927f18494cd48ef..339f7a2fa2de68cd66a759dfb6938afe9be7b3aa 100644 --- a/Korean Localization (ko)/Sections/uefiController.strings +++ b/Korean Localization (ko)/Sections/uefiController.strings @@ -56,9 +56,6 @@ /* Class = "NSButtonCell"; title = "PointerSupport"; ObjectID = "Elq-pL-QTD"; */ "Elq-pL-QTD.title" = "PointerSupport"; -/* Class = "NSTextFieldCell"; title = "VolumeAmplifier"; ObjectID = "En7-ww-Uj5"; */ -"En7-ww-Uj5.title" = "VolumeAmplifier"; - /* Class = "NSTextFieldCell"; title = "KeyForgetThreshold"; ObjectID = "ErN-ks-EzO"; */ "ErN-ks-EzO.title" = "KeyForgetThreshold"; @@ -77,6 +74,9 @@ /* Class = "NSTextFieldCell"; title = "KeySubsequentDelay"; ObjectID = "JWy-Kv-Tq6"; */ "JWy-Kv-Tq6.title" = "KeySubsequentDelay"; +/* Class = "NSTableColumn"; headerCell.title = "LoadEarly"; ObjectID = "Jlh-ZM-CXj"; */ +"Jlh-ZM-CXj.headerCell.title" = "LoadEarly"; + /* Class = "NSTableColumn"; headerCell.title = "Arguments"; ObjectID = "Kuw-7J-hNc"; */ "Kuw-7J-hNc.headerCell.title" = "Arguments"; @@ -158,9 +158,6 @@ /* Class = "NSButtonCell"; title = "HideVerbose"; ObjectID = "egr-8J-RIS"; */ "egr-8J-RIS.title" = "HideVerbose"; -/* Class = "NSTextFieldCell"; title = "MinimumVolume"; ObjectID = "ehu-K3-gbY"; */ -"ehu-K3-gbY.title" = "MinimumVolume"; - /* Class = "NSMenuItem"; title = "DEFAULT"; ObjectID = "fZq-zJ-tYW"; */ "fZq-zJ-tYW.title" = "DEFAULT"; @@ -182,9 +179,6 @@ /* Class = "NSButtonCell"; title = "Connect Drivers"; ObjectID = "kBk-75-acl"; */ "kBk-75-acl.title" = "Connect Drivers"; -/* Class = "NSTextFieldCell"; title = "AudioOut"; ObjectID = "kM6-tO-pns"; */ -"kM6-tO-pns.title" = "AudioOut"; - /* Class = "NSTableColumn"; headerCell.title = "Address"; ObjectID = "ldi-uY-9wO"; */ "ldi-uY-9wO.headerCell.title" = "Address"; diff --git a/Polish Localization (pl)/Internal/Localizable.strings b/Polish Localization (pl)/Internal/Localizable.strings index a9075efbe396fde783033c9b293a8521b8954355..c3b31f03017836d54b4dd57ffd624479b28074dc 100644 --- a/Polish Localization (pl)/Internal/Localizable.strings +++ b/Polish Localization (pl)/Internal/Localizable.strings @@ -1117,7 +1117,7 @@ /* 6Mq-wE-cHt */ "TT_PowerTimeoutKernelPanic" = "Type: plist boolean\nFailsafe: false\nRequirement: 10.15 (not required for older)\nDescription: Disables kernel panic on setPowerState timeout.\nAn additional security measure was added to macOS Catalina (10.15) causing kernel panic on power change timeout for Apple drivers. Sometimes it may cause issues on misconfigured hardware, notably digital audio, which sometimes fails to wake up. For debug kernels setpowerstate_panic=0 boot argument should be used, which is otherwise equivalent to this quirk."; -"TT_ProvideCurrentCpuInfo" = "Type: plist boolean\nFailsafe: false\nRequirement: 10.8 (10.14)\nDescription: Provides current CPU info to the kernel.\n\nThis quirk works differently depending on the CPU:\n• For Microsoft Hyper-V it provides the correct TSC and FSB values to the kernel, as well as disables CPU topology validation (10.8+).\n• For KVM and other hypervisors it provides precomputed MSR 35h values solving kernel panic with -cpu host.\n• For Intel CPUs it adds support for asymmetrical SMP systems (e.g. Intel Alder Lake) by patching core count to thread count along with the supplemental required changes (10.14+)."; +"TT_ProvideCurrentCpuInfo" = "Type: plist boolean\nFailsafe: false\nRequirement: 10.4 (10.14)\nDescription: Provides current CPU info to the kernel.\n\nThis quirk works differently depending on the CPU:\n• For Microsoft Hyper-V it provides the correct TSC and FSB values to the kernel, as well as disables CPU topology validation (10.8+).\n• For KVM and other hypervisors it provides precomputed MSR 35h values solving kernel panic with -cpu host.\n• For Intel CPUs it adds support for asymmetrical SMP systems (e.g. Intel Alder Lake) by patching core count to thread count along with the supplemental required changes (10.14+). Cache size and cache line size are also provided when using 10.4 as Intel Penryn and newer may only have cache information in CPUID leaf 0x4 which is unsupported by 10.4."; /* yhV-cY-frg */ "TT_ThirdPartyDrives" = "Type: plist boolean\nFailsafe: false\nRequirement: 10.6 (not required for older)\nDescription: Apply vendor patches to IOAHCIBlockStorage.kext to enable native features for third-party drives, such as TRIM on SSDs or hibernation support on 10.15 and newer.\nNote: This option may be avoided on user preference. NVMe SSDs are compatible without the change. For AHCI SSDs on modern macOS version there is a dedicated built-in utility called trimforce. Starting from 10.15 this utility creates EnableTRIM variable in APPLE_BOOT_VARIABLE_GUID namespace with 01 00 00 00 value."; @@ -1216,10 +1216,10 @@ "TT_secureBootModel" = "Type: plist string \nFailsafe: Default\nDescription: Apple Secure Boot hardware model.\n\nSets Apple Secure Boot hardware model and policy. Specifying this value defines which operating systems will be bootable. Operating systems shipped before the specified model was released will not boot.\n\nValid values:\n• Default — Matching model for current SMBIOS.\n• Disabled — No model, Secure Boot will be disabled.\n• j137 — iMacPro1,1 (December 2017) minimum macOS 10.13.2 (17C2111)\n• j680 — MacBookPro15,1 (July 2018) minimum macOS 10.13.6 (17G2112)\n• j132 — MacBookPro15,2 (July 2018) minimum macOS 10.13.6 (17G2112)\n• j174 — Macmini8,1 (October 2018) minimum macOS 10.14 (18A2063)\n• j140k — MacBookAir8,1 (October 2018) minimum macOS 10.14.1 (18B2084)\n• j780 — MacBookPro15,3 (May 2019) minimum macOS 10.14.5 (18F132)\n• j213 — MacBookPro15,4 (July 2019) minimum macOS 10.14.5 (18F2058)\n• j140a — MacBookAir8,2 (July 2019) minimum macOS 10.14.5 (18F2058)\n• j152f — MacBookPro16,1 (November 2019) minimum macOS 10.15.1 (19B2093)\n• j160 — MacPro7,1 (December 2019) minimum macOS 10.15.1 (19B88)\n• j230k — MacBookAir9,1 (March 2020) minimum macOS 10.15.3 (19D2064)\n• j214k — MacBookPro16,2 (May 2020) minimum macOS 10.15.4 (19E2269)\n• j223 — MacBookPro16,3 (May 2020) minimum macOS 10.15.4 (19E2265)\n• j215 — MacBookPro16,4 (June 2020) minimum macOS 10.15.5 (19F96)\n• j185 — iMac20,1 (August 2020) minimum macOS 10.15.6 (19G2005)\n• j185f — iMac20,2 (August 2020) minimum macOS 10.15.6 (19G2005)\n• x86legacy — Macs and VMs without T2 chip minimum macOS 11.0.1 (20B29)\n\nWarning: Not all Apple Secure Boot models are supported on all hardware configurations.\n\nApple Secure Boot appeared in macOS 10.13 on models with T2 chips. Prior to macOS 12 PlatformInfo and SecureBootModel were independent, allowing Apple Secure Boot can be used with any SMBIOS with and without T2. Starting with macOS 12 SecureBootModel must match the SMBIOS Mac model. Default model derives the model based on SMBIOS board identifier, either set automatically via the Generic section or set manually via the SMBIOS section. If there is no board identifier override the model will be derived heuristically from OEM SMBIOS.\n\nSetting SecureBootModel to any valid value but Disabled is equivalent to Medium Security of Apple Secure Boot. The ApECID value must also be specified to achieve Full Security. Check ForceSecureBootScheme when using Apple Secure Boot on a virtual machine.\n\nNote that enabling Apple Secure Boot is demanding on invalid configurations, faulty macOS installations, and on unsupported setups.\n\nThings to consider:\n(a) As with T2 Macs, all unsigned kernel extensions as well as several signed kernel extensions, including NVIDIA Web Drivers, cannot be installed.\n(b) The list of cached kernel extensions may be different, resulting in a need to change the list of Added or Forced kernel extensions. For example, IO80211Family cannot be injected in this case.\n(c) System volume alterations on operating systems with sealing, such as macOS 11, may result in the operating system being unbootable. Do not try to disable system volume encryption unless Apple Secure Boot is disabled.\n(d) Boot failures might occur when the platform requires certain settings, but they have not been enabled because the associated issues were not discovered earlier. Be extra careful with IgnoreInvalidFlexRatio or HashServices.\n(e) Operating systems released before Apple Secure Boot was released (e.g. macOS 10.12 or earlier), will still boot until UEFI Secure Boot is enabled. This is so because Apple Secure Boot treats these as incompatible and they are then handled by the firmware (as Microsoft Windows is).\n(f) On older CPUs (e.g. before Sandy Bridge), enabling Apple Secure Boot might cause slightly slower loading (by up to 1 second).\n(g) As the Default value will increase with time to support the latest major released operating system, it is not recommended to use the ApECID and the Default settings together.\n(h) Installing macOS with Apple Secure Boot enabled is not possible while using HFS+ target volumes. This may include HFS+ formatted drives when no spare APFS drive is available.\n\nThe installed operating system may have sometimes outdated Apple Secure Boot manifests on the Preboot partition, resulting in boot failures. This is likely to be the case when an “OCB: Apple Secure Boot prohibits this boot entry, enforcing!” message is logged.\n\nWhen this happens, either reinstall the operating system or copy the manifests (files with .im4m extension, such as boot.efi.j137.im4m) from /usr/standalone/i386 to /Volumes/Preboot//System/Library/CoreServices. Here, is the system volume identifier. On HFS+ installations, the manifests should be copied to /System/Library/CoreServices on the system volume.\n\nFor more details on how to configure Apple Secure Boot with UEFI Secure Boot, refer to the UEFI Secure Boot"; /* NCW-lH-X8S */ -"TT_PasswordHash" = "Type: plist data 64 bytes\nFailsafe: all zero\nDescription: Password hash used when EnabledPassword is set."; +"TT_PasswordHash" = "Type: plist data 64 bytes\nFailsafe: all zero\nDescription: Password hash used when EnablePassword is set."; /* pYq-Ve-K08 */ -"TT_PasswordSalt" = "Type: plist data\nFailsafe: empty\nDescription: Password salt used when EnabledPassword is set."; +"TT_PasswordSalt" = "Type: plist data\nFailsafe: empty\nDescription: Password salt used when EnablePassword is set."; /* 0sy-D3-AKk */ "TT_AuthRestart" = "Type: plist boolean\nFailsafe: false\nDescription: Enable VirtualSMC-compatible authenticated restart.\n\nAuthenticated restart is a way to reboot FileVault 2 enabled macOS without entering the password. A dedicated terminal command can be used to perform authenticated restarts: sudo fdesetup authrestart. It is also used when installing operating system updates.\n\nVirtualSMC performs authenticated restarts by splitting and saving disk encryption keys between NVRAM and RTC, which despite being removed as soon as OpenCore starts, may be considered a security risk and thus is optional."; @@ -1293,9 +1293,6 @@ This option will override the value of gEfiMdeModulePkgTokenSpaceGuid.PcdSerialU /* cVF-o8-z0z */ "TT_nvram_legacySchemaTables" = "3. LegacySchema\nType: plist dict\nDescription: Allows setting certain NVRAM variables from a map (plist dict) of GUIDs to an array (plist array) of variable names in plist string format.\n* value can be used to accept all variables for certain GUID.\nWARNING: Choose variables very carefully, as nvram.plist is not vaulted. For instance, do not put boot-args or csr-active-config, as this can bypass SIP.\nTo read NVRAM variable value from macOS one could use nvram by concatenating variable GUID and name separated by : symbol. For example, nvram 7C436110-AB2A-4BBB-A880-FE41995C9F82:boot-args.\nA continuously updated variable list can be found in a corresponding document: NVRAM Variables.\n\nWARNING: Choose variables carefully, as the nvram.plist file is not vaulted. For instance, do not include boot-args\nor csr-active-config, as these can be used to bypass SIP."; -/* 2KJ-kg-wip */ -"TT_LegacyEnable" = "Type: plist boolean\nFailsafe: false\nDescription: Enables loading a NVRAM variable file named nvram.plist from EFI volume root.\nThis file must have a root plist dictionary type and contain two fields:\n• Version — plist integer, file version, must be set to 1.\n• Add — plist dictionary, equivalent to Add from config.plist.\n\nVariable loading happens prior to the Delete (and Add) phases. Unless LegacyOverwrite is enabled, it overwrite any existing variable. Variables allowed to be set must be specified in LegacySchema. Third-party scripts may be used to create nvram.plist file. An example of such script can be found in Utilities. The use of third-party scripts may require ExposeSensitiveData set to 0x3 to provide boot-path variable with the OpenCore EFI partition UUID.\n\nWARNING: This feature can be dangerous, as it passes unprotected data to your firmware variable services. Only use when no hardware NVRAM implementation is provided by the firmware or when the NVRAM implementation is incompatible."; - /* Bqu-cW-189 */ "TT_LegacyOverwrite" = "Type: plist boolean\nFailsafe: false\nDescription: Permits overwriting firmware variables from nvram.plist.\nNote: Only variables accessible from the operating system will be overwritten."; @@ -1606,7 +1603,7 @@ cat /proc/asound/card{n}/codec#{m}\n\nUsing AudioOutMask, it is possible to play "TT_VolumeAmplifier" = "Type: plist integer\nFailsafe: 0\nDescription: Multiplication coefficient for system volume to raw volume linear translation from 0 to 1000.\nVolume level range read from SystemAudioVolume varies depending on the codec. To transform read value in [0, 127] range into raw volume range [0, 100] the read value is scaled to VolumeAmplifier percents.\n\nNote: the transformation used in macOS is not linear, but it is very close and this nuance is thus ignored."; /* jGE-sP-Rtr */ -"TT_SetupDelay" = "Type: plist integer\nFailsafe: 0\nDescription: Audio codec reconfiguration delay in microseconds.\n\nSome codecs require a vendor-specific delay after the reconfiguration (e.g. volume setting). This option makes it configurable. A typical delay can be up to 0.5 seconds."; +"TT_SetupDelay" = "Type: plist integer\nFailsafe: 0\nDescription: Audio codec reconfiguration delay in milliseconds.\n\nSome codecs require a vendor-specific delay after the reconfiguration (e.g. volume setting). This option makes it configurable. A typical delay can be up to 0.5 seconds."; /* 77y-Lm-hgl */ "TT_playchime" = "Type: plist string\nFailsafe: Auto\nDescription: Play chime sound at startup.\n\nEnabling this setting plays the boot chime using the builtin audio support. The volume level is determined by the SystemAudioVolumeDB NVRAM variable. Supported values are:\n• Auto — Enables chime when StartupMute NVRAM variable is not present or set to 00.\n• Enabled — Enables chime unconditionally.\n• Disabled — Disables chime unconditionally.\n\nNote 1: Enabled can be used separately from the StartupMute NVRAM variable to avoid conflicts when the firmware is able to play the boot chime.\n\nNote 2 : Regardless of this setting, the boot chime will not play if system audio is muted, i.e. if the SystemAudioVolume NVRAM variable has bit 0x80 set."; @@ -1627,7 +1624,7 @@ cat /proc/asound/card{n}/codec#{m}\n\nUsing AudioOutMask, it is possible to play /* Drivers */ /* 6zo-Jl-Ryl */ -"TT_uefi_driversTable" = "1. Path\nType: plist string\nFailsafe: Empty\nDescription: Path of file to be loaded as a UEFI driver from OC/Drivers directory.\n2. Enabled\nType: plist boolean\nFailsafe: false\nDescription: If false this driver entry will be ignored.\n3. Arguments\nType: plist string\nFailsafe: Empty\nDescription: Some OpenCore plugins accept optional additional arguments which may be specified as a string here."; +"TT_uefi_driversTable" = "1. Comment\nType: plist string\nFailsafe: Empty\nDescription: Arbitrary ASCII string used to provide human readable reference for the entry. Whether this value is used is implementation defined.\n2. Path\nType: plist string\nFailsafe: Empty\nDescription: Path of file to be loaded as a UEFI driver from OC/Drivers directory.\n3. Enabled\nType: plist boolean\nFailsafe: false\nDescription: If false this driver entry will be ignored.\n4. LoadEarly\nType: plist boolean\nFailsafe: false\nDescription: Load the driver early in the OpenCore boot process, before NVRAM setup.\n\nNote: Do not enable this option unless specifically recommended to do so for a given driver and purpose.\n5. Arguments\nType: plist string\nFailsafe: Empty\nDescription: Some OpenCore plugins accept optional additional arguments which may be specified as a string here."; /* 9f0-xd-rhT */ "TT_ConnectDrivers" = "Type: plist boolean\nFailsafe: false\nDescription: Perform UEFI controller connection after driver loading.\nThis option is useful for loading drivers following UEFI driver model, as they may not start by themselves. Examples of such drivers are filesystem or audio drivers. While effective, this option may not be necessary for drivers performing automatic connection, and may slightly slowdown the boot.\n\nNote: Some types of firmware, particularly those made by Apple, only connect the boot drive to speed up the boot process. Enable this option to be able to see all the boot options when running multiple drives."; diff --git a/Polish Localization (pl)/Sections/nvramController.strings b/Polish Localization (pl)/Sections/nvramController.strings index 5e0814ba95feb49fe94bebff885e0b2e9d1a74d3..86862d4b7770662c093fd73c79a6a9a59538125f 100644 --- a/Polish Localization (pl)/Sections/nvramController.strings +++ b/Polish Localization (pl)/Sections/nvramController.strings @@ -23,9 +23,6 @@ /* Class = "NSBox"; title = "Box"; ObjectID = "NoT-Wv-Hn9"; */ "NoT-Wv-Hn9.title" = "Box"; -/* Class = "NSButtonCell"; title = "LegacyEnable"; ObjectID = "ORI-69-MG3"; */ -"ORI-69-MG3.title" = "LegacyEnable"; - /* Class = "NSTabViewItem"; label = "Delete"; ObjectID = "dmH-cD-uzh"; */ "dmH-cD-uzh.label" = "Delete"; diff --git a/Polish Localization (pl)/Sections/uefiController.strings b/Polish Localization (pl)/Sections/uefiController.strings index f950c25a345b4c666619210771b6338925fd544d..c71c95391d3daac4cc4543682b564d7e38cc63ad 100644 --- a/Polish Localization (pl)/Sections/uefiController.strings +++ b/Polish Localization (pl)/Sections/uefiController.strings @@ -56,9 +56,6 @@ /* Class = "NSButtonCell"; title = "PointerSupport"; ObjectID = "Elq-pL-QTD"; */ "Elq-pL-QTD.title" = "PointerSupport"; -/* Class = "NSTextFieldCell"; title = "VolumeAmplifier"; ObjectID = "En7-ww-Uj5"; */ -"En7-ww-Uj5.title" = "VolumeAmplifier"; - /* Class = "NSTextFieldCell"; title = "KeyForgetThreshold"; ObjectID = "ErN-ks-EzO"; */ "ErN-ks-EzO.title" = "KeyForgetThreshold"; @@ -77,6 +74,9 @@ /* Class = "NSTextFieldCell"; title = "KeySubsequentDelay"; ObjectID = "JWy-Kv-Tq6"; */ "JWy-Kv-Tq6.title" = "KeySubsequentDelay"; +/* Class = "NSTableColumn"; headerCell.title = "LoadEarly"; ObjectID = "Jlh-ZM-CXj"; */ +"Jlh-ZM-CXj.headerCell.title" = "LoadEarly"; + /* Class = "NSTableColumn"; headerCell.title = "Arguments"; ObjectID = "Kuw-7J-hNc"; */ "Kuw-7J-hNc.headerCell.title" = "Arguments"; @@ -158,9 +158,6 @@ /* Class = "NSButtonCell"; title = "HideVerbose"; ObjectID = "egr-8J-RIS"; */ "egr-8J-RIS.title" = "HideVerbose"; -/* Class = "NSTextFieldCell"; title = "MinimumVolume"; ObjectID = "ehu-K3-gbY"; */ -"ehu-K3-gbY.title" = "MinimumVolume"; - /* Class = "NSMenuItem"; title = "DEFAULT"; ObjectID = "fZq-zJ-tYW"; */ "fZq-zJ-tYW.title" = "DEFAULT"; @@ -182,9 +179,6 @@ /* Class = "NSButtonCell"; title = "Connect Drivers"; ObjectID = "kBk-75-acl"; */ "kBk-75-acl.title" = "Connect Drivers"; -/* Class = "NSTextFieldCell"; title = "AudioOut"; ObjectID = "kM6-tO-pns"; */ -"kM6-tO-pns.title" = "AudioOut"; - /* Class = "NSTableColumn"; headerCell.title = "Address"; ObjectID = "ldi-uY-9wO"; */ "ldi-uY-9wO.headerCell.title" = "Address"; diff --git a/Resources/Drivers/driversList_en.plist b/Resources/Drivers/driversList_en.plist index 8569d15384ab6c2374501c9e3e40690dbd1ceef4..955e00387cc3ab92c42b7ce4ab3a46eecfc5e651 100644 --- a/Resources/Drivers/driversList_en.plist +++ b/Resources/Drivers/driversList_en.plist @@ -238,7 +238,7 @@ Note: OpenCanopy is currently considered experimental and is not recommended for 64 description - Partition management driver with Apple Partitioning Scheme support. This driver can be used to support loading older DMG recoveries such as macOS 10.9 using Apple Partitioning Scheme. OpenDuet already includes this driver. + Partition management driver with Apple Partitioning Scheme support. This driver can be used to support loading older DMG recoveries such as macOS 10.9 using Apple Partitioning Scheme, or for loading other macOS Installers where these were created using the Apple Partitioning Scheme (creating macOS Installers using GPT avoids the need for this). OpenDuet already includes this driver. name OpenPartitionDxe diff --git a/Russian Localization (ru)/Internal/Localizable.strings b/Russian Localization (ru)/Internal/Localizable.strings index 0461127d04af5d3bf296670327f89ac760b0b44a..3652f422f6adbc9c8cff1543f63a136aa7627461 100644 --- a/Russian Localization (ru)/Internal/Localizable.strings +++ b/Russian Localization (ru)/Internal/Localizable.strings @@ -1117,7 +1117,7 @@ /* 6Mq-wE-cHt */ "TT_PowerTimeoutKernelPanic" = "Type: plist boolean\nFailsafe: false\nRequirement: 10.15 (not required for older)\nDescription: Disables kernel panic on setPowerState timeout.\nAn additional security measure was added to macOS Catalina (10.15) causing kernel panic on power change timeout for Apple drivers. Sometimes it may cause issues on misconfigured hardware, notably digital audio, which sometimes fails to wake up. For debug kernels setpowerstate_panic=0 boot argument should be used, which is otherwise equivalent to this quirk."; -"TT_ProvideCurrentCpuInfo" = "Type: plist boolean\nFailsafe: false\nRequirement: 10.8 (10.14)\nDescription: Provides current CPU info to the kernel.\n\nThis quirk works differently depending on the CPU:\n• For Microsoft Hyper-V it provides the correct TSC and FSB values to the kernel, as well as disables CPU topology validation (10.8+).\n• For KVM and other hypervisors it provides precomputed MSR 35h values solving kernel panic with -cpu host.\n• For Intel CPUs it adds support for asymmetrical SMP systems (e.g. Intel Alder Lake) by patching core count to thread count along with the supplemental required changes (10.14+)."; +"TT_ProvideCurrentCpuInfo" = "Type: plist boolean\nFailsafe: false\nRequirement: 10.4 (10.14)\nDescription: Provides current CPU info to the kernel.\n\nThis quirk works differently depending on the CPU:\n• For Microsoft Hyper-V it provides the correct TSC and FSB values to the kernel, as well as disables CPU topology validation (10.8+).\n• For KVM and other hypervisors it provides precomputed MSR 35h values solving kernel panic with -cpu host.\n• For Intel CPUs it adds support for asymmetrical SMP systems (e.g. Intel Alder Lake) by patching core count to thread count along with the supplemental required changes (10.14+). Cache size and cache line size are also provided when using 10.4 as Intel Penryn and newer may only have cache information in CPUID leaf 0x4 which is unsupported by 10.4."; /* yhV-cY-frg */ "TT_ThirdPartyDrives" = "Type: plist boolean\nFailsafe: false\nRequirement: 10.6 (not required for older)\nDescription: Apply vendor patches to IOAHCIBlockStorage.kext to enable native features for third-party drives, such as TRIM on SSDs or hibernation support on 10.15 and newer.\nNote: This option may be avoided on user preference. NVMe SSDs are compatible without the change. For AHCI SSDs on modern macOS version there is a dedicated built-in utility called trimforce. Starting from 10.15 this utility creates EnableTRIM variable in APPLE_BOOT_VARIABLE_GUID namespace with 01 00 00 00 value."; @@ -1216,10 +1216,10 @@ "TT_secureBootModel" = "Type: plist string \nFailsafe: Default\nDescription: Apple Secure Boot hardware model.\n\nSets Apple Secure Boot hardware model and policy. Specifying this value defines which operating systems will be bootable. Operating systems shipped before the specified model was released will not boot.\n\nValid values:\n• Default — Matching model for current SMBIOS.\n• Disabled — No model, Secure Boot will be disabled.\n• j137 — iMacPro1,1 (December 2017) minimum macOS 10.13.2 (17C2111)\n• j680 — MacBookPro15,1 (July 2018) minimum macOS 10.13.6 (17G2112)\n• j132 — MacBookPro15,2 (July 2018) minimum macOS 10.13.6 (17G2112)\n• j174 — Macmini8,1 (October 2018) minimum macOS 10.14 (18A2063)\n• j140k — MacBookAir8,1 (October 2018) minimum macOS 10.14.1 (18B2084)\n• j780 — MacBookPro15,3 (May 2019) minimum macOS 10.14.5 (18F132)\n• j213 — MacBookPro15,4 (July 2019) minimum macOS 10.14.5 (18F2058)\n• j140a — MacBookAir8,2 (July 2019) minimum macOS 10.14.5 (18F2058)\n• j152f — MacBookPro16,1 (November 2019) minimum macOS 10.15.1 (19B2093)\n• j160 — MacPro7,1 (December 2019) minimum macOS 10.15.1 (19B88)\n• j230k — MacBookAir9,1 (March 2020) minimum macOS 10.15.3 (19D2064)\n• j214k — MacBookPro16,2 (May 2020) minimum macOS 10.15.4 (19E2269)\n• j223 — MacBookPro16,3 (May 2020) minimum macOS 10.15.4 (19E2265)\n• j215 — MacBookPro16,4 (June 2020) minimum macOS 10.15.5 (19F96)\n• j185 — iMac20,1 (August 2020) minimum macOS 10.15.6 (19G2005)\n• j185f — iMac20,2 (August 2020) minimum macOS 10.15.6 (19G2005)\n• x86legacy — Macs and VMs without T2 chip minimum macOS 11.0.1 (20B29)\n\nWarning: Not all Apple Secure Boot models are supported on all hardware configurations.\n\nApple Secure Boot appeared in macOS 10.13 on models with T2 chips. Prior to macOS 12 PlatformInfo and SecureBootModel were independent, allowing Apple Secure Boot can be used with any SMBIOS with and without T2. Starting with macOS 12 SecureBootModel must match the SMBIOS Mac model. Default model derives the model based on SMBIOS board identifier, either set automatically via the Generic section or set manually via the SMBIOS section. If there is no board identifier override the model will be derived heuristically from OEM SMBIOS.\n\nSetting SecureBootModel to any valid value but Disabled is equivalent to Medium Security of Apple Secure Boot. The ApECID value must also be specified to achieve Full Security. Check ForceSecureBootScheme when using Apple Secure Boot on a virtual machine.\n\nNote that enabling Apple Secure Boot is demanding on invalid configurations, faulty macOS installations, and on unsupported setups.\n\nThings to consider:\n(a) As with T2 Macs, all unsigned kernel extensions as well as several signed kernel extensions, including NVIDIA Web Drivers, cannot be installed.\n(b) The list of cached kernel extensions may be different, resulting in a need to change the list of Added or Forced kernel extensions. For example, IO80211Family cannot be injected in this case.\n(c) System volume alterations on operating systems with sealing, such as macOS 11, may result in the operating system being unbootable. Do not try to disable system volume encryption unless Apple Secure Boot is disabled.\n(d) Boot failures might occur when the platform requires certain settings, but they have not been enabled because the associated issues were not discovered earlier. Be extra careful with IgnoreInvalidFlexRatio or HashServices.\n(e) Operating systems released before Apple Secure Boot was released (e.g. macOS 10.12 or earlier), will still boot until UEFI Secure Boot is enabled. This is so because Apple Secure Boot treats these as incompatible and they are then handled by the firmware (as Microsoft Windows is).\n(f) On older CPUs (e.g. before Sandy Bridge), enabling Apple Secure Boot might cause slightly slower loading (by up to 1 second).\n(g) As the Default value will increase with time to support the latest major released operating system, it is not recommended to use the ApECID and the Default settings together.\n(h) Installing macOS with Apple Secure Boot enabled is not possible while using HFS+ target volumes. This may include HFS+ formatted drives when no spare APFS drive is available.\n\nThe installed operating system may have sometimes outdated Apple Secure Boot manifests on the Preboot partition, resulting in boot failures. This is likely to be the case when an “OCB: Apple Secure Boot prohibits this boot entry, enforcing!” message is logged.\n\nWhen this happens, either reinstall the operating system or copy the manifests (files with .im4m extension, such as boot.efi.j137.im4m) from /usr/standalone/i386 to /Volumes/Preboot//System/Library/CoreServices. Here, is the system volume identifier. On HFS+ installations, the manifests should be copied to /System/Library/CoreServices on the system volume.\n\nFor more details on how to configure Apple Secure Boot with UEFI Secure Boot, refer to the UEFI Secure Boot"; /* NCW-lH-X8S */ -"TT_PasswordHash" = "Type: plist data 64 bytes\nFailsafe: all zero\nDescription: Password hash used when EnabledPassword is set."; +"TT_PasswordHash" = "Type: plist data 64 bytes\nFailsafe: all zero\nDescription: Password hash used when EnablePassword is set."; /* pYq-Ve-K08 */ -"TT_PasswordSalt" = "Type: plist data\nFailsafe: empty\nDescription: Password salt used when EnabledPassword is set."; +"TT_PasswordSalt" = "Type: plist data\nFailsafe: empty\nDescription: Password salt used when EnablePassword is set."; /* 0sy-D3-AKk */ "TT_AuthRestart" = "Type: plist boolean\nFailsafe: false\nDescription: Enable VirtualSMC-compatible authenticated restart.\n\nAuthenticated restart is a way to reboot FileVault 2 enabled macOS without entering the password. A dedicated terminal command can be used to perform authenticated restarts: sudo fdesetup authrestart. It is also used when installing operating system updates.\n\nVirtualSMC performs authenticated restarts by splitting and saving disk encryption keys between NVRAM and RTC, which despite being removed as soon as OpenCore starts, may be considered a security risk and thus is optional."; @@ -1293,9 +1293,6 @@ This option will override the value of gEfiMdeModulePkgTokenSpaceGuid.PcdSerialU /* cVF-o8-z0z */ "TT_nvram_legacySchemaTables" = "3. LegacySchema\nType: plist dict\nDescription: Allows setting certain NVRAM variables from a map (plist dict) of GUIDs to an array (plist array) of variable names in plist string format.\n* value can be used to accept all variables for certain GUID.\nWARNING: Choose variables very carefully, as nvram.plist is not vaulted. For instance, do not put boot-args or csr-active-config, as this can bypass SIP.\nTo read NVRAM variable value from macOS one could use nvram by concatenating variable GUID and name separated by : symbol. For example, nvram 7C436110-AB2A-4BBB-A880-FE41995C9F82:boot-args.\nA continuously updated variable list can be found in a corresponding document: NVRAM Variables.\n\nWARNING: Choose variables carefully, as the nvram.plist file is not vaulted. For instance, do not include boot-args\nor csr-active-config, as these can be used to bypass SIP."; -/* 2KJ-kg-wip */ -"TT_LegacyEnable" = "Type: plist boolean\nFailsafe: false\nDescription: Enables loading a NVRAM variable file named nvram.plist from EFI volume root.\nThis file must have a root plist dictionary type and contain two fields:\n• Version — plist integer, file version, must be set to 1.\n• Add — plist dictionary, equivalent to Add from config.plist.\n\nVariable loading happens prior to the Delete (and Add) phases. Unless LegacyOverwrite is enabled, it overwrite any existing variable. Variables allowed to be set must be specified in LegacySchema. Third-party scripts may be used to create nvram.plist file. An example of such script can be found in Utilities. The use of third-party scripts may require ExposeSensitiveData set to 0x3 to provide boot-path variable with the OpenCore EFI partition UUID.\n\nWARNING: This feature can be dangerous, as it passes unprotected data to your firmware variable services. Only use when no hardware NVRAM implementation is provided by the firmware or when the NVRAM implementation is incompatible."; - /* Bqu-cW-189 */ "TT_LegacyOverwrite" = "Type: plist boolean\nFailsafe: false\nDescription: Permits overwriting firmware variables from nvram.plist.\nNote: Only variables accessible from the operating system will be overwritten."; @@ -1606,7 +1603,7 @@ cat /proc/asound/card{n}/codec#{m}\n\nUsing AudioOutMask, it is possible to play "TT_VolumeAmplifier" = "Type: plist integer\nFailsafe: 0\nDescription: Multiplication coefficient for system volume to raw volume linear translation from 0 to 1000.\nVolume level range read from SystemAudioVolume varies depending on the codec. To transform read value in [0, 127] range into raw volume range [0, 100] the read value is scaled to VolumeAmplifier percents.\n\nNote: the transformation used in macOS is not linear, but it is very close and this nuance is thus ignored."; /* jGE-sP-Rtr */ -"TT_SetupDelay" = "Type: plist integer\nFailsafe: 0\nDescription: Audio codec reconfiguration delay in microseconds.\n\nSome codecs require a vendor-specific delay after the reconfiguration (e.g. volume setting). This option makes it configurable. A typical delay can be up to 0.5 seconds."; +"TT_SetupDelay" = "Type: plist integer\nFailsafe: 0\nDescription: Audio codec reconfiguration delay in milliseconds.\n\nSome codecs require a vendor-specific delay after the reconfiguration (e.g. volume setting). This option makes it configurable. A typical delay can be up to 0.5 seconds."; /* 77y-Lm-hgl */ "TT_playchime" = "Type: plist string\nFailsafe: Auto\nDescription: Play chime sound at startup.\n\nEnabling this setting plays the boot chime using the builtin audio support. The volume level is determined by the SystemAudioVolumeDB NVRAM variable. Supported values are:\n• Auto — Enables chime when StartupMute NVRAM variable is not present or set to 00.\n• Enabled — Enables chime unconditionally.\n• Disabled — Disables chime unconditionally.\n\nNote 1: Enabled can be used separately from the StartupMute NVRAM variable to avoid conflicts when the firmware is able to play the boot chime.\n\nNote 2 : Regardless of this setting, the boot chime will not play if system audio is muted, i.e. if the SystemAudioVolume NVRAM variable has bit 0x80 set."; @@ -1627,7 +1624,7 @@ cat /proc/asound/card{n}/codec#{m}\n\nUsing AudioOutMask, it is possible to play /* Drivers */ /* 6zo-Jl-Ryl */ -"TT_uefi_driversTable" = "1. Path\nType: plist string\nFailsafe: Empty\nDescription: Path of file to be loaded as a UEFI driver from OC/Drivers directory.\n2. Enabled\nType: plist boolean\nFailsafe: false\nDescription: If false this driver entry will be ignored.\n3. Arguments\nType: plist string\nFailsafe: Empty\nDescription: Some OpenCore plugins accept optional additional arguments which may be specified as a string here."; +"TT_uefi_driversTable" = "1. Comment\nType: plist string\nFailsafe: Empty\nDescription: Arbitrary ASCII string used to provide human readable reference for the entry. Whether this value is used is implementation defined.\n2. Path\nType: plist string\nFailsafe: Empty\nDescription: Path of file to be loaded as a UEFI driver from OC/Drivers directory.\n3. Enabled\nType: plist boolean\nFailsafe: false\nDescription: If false this driver entry will be ignored.\n4. LoadEarly\nType: plist boolean\nFailsafe: false\nDescription: Load the driver early in the OpenCore boot process, before NVRAM setup.\n\nNote: Do not enable this option unless specifically recommended to do so for a given driver and purpose.\n5. Arguments\nType: plist string\nFailsafe: Empty\nDescription: Some OpenCore plugins accept optional additional arguments which may be specified as a string here."; /* 9f0-xd-rhT */ "TT_ConnectDrivers" = "Type: plist boolean\nFailsafe: false\nDescription: Perform UEFI controller connection after driver loading.\nThis option is useful for loading drivers following UEFI driver model, as they may not start by themselves. Examples of such drivers are filesystem or audio drivers. While effective, this option may not be necessary for drivers performing automatic connection, and may slightly slowdown the boot.\n\nNote: Some types of firmware, particularly those made by Apple, only connect the boot drive to speed up the boot process. Enable this option to be able to see all the boot options when running multiple drives."; diff --git a/Russian Localization (ru)/Sections/nvramController.strings b/Russian Localization (ru)/Sections/nvramController.strings index 5e0814ba95feb49fe94bebff885e0b2e9d1a74d3..86862d4b7770662c093fd73c79a6a9a59538125f 100644 --- a/Russian Localization (ru)/Sections/nvramController.strings +++ b/Russian Localization (ru)/Sections/nvramController.strings @@ -23,9 +23,6 @@ /* Class = "NSBox"; title = "Box"; ObjectID = "NoT-Wv-Hn9"; */ "NoT-Wv-Hn9.title" = "Box"; -/* Class = "NSButtonCell"; title = "LegacyEnable"; ObjectID = "ORI-69-MG3"; */ -"ORI-69-MG3.title" = "LegacyEnable"; - /* Class = "NSTabViewItem"; label = "Delete"; ObjectID = "dmH-cD-uzh"; */ "dmH-cD-uzh.label" = "Delete"; diff --git a/Russian Localization (ru)/Sections/uefiController.strings b/Russian Localization (ru)/Sections/uefiController.strings index f950c25a345b4c666619210771b6338925fd544d..c71c95391d3daac4cc4543682b564d7e38cc63ad 100644 --- a/Russian Localization (ru)/Sections/uefiController.strings +++ b/Russian Localization (ru)/Sections/uefiController.strings @@ -56,9 +56,6 @@ /* Class = "NSButtonCell"; title = "PointerSupport"; ObjectID = "Elq-pL-QTD"; */ "Elq-pL-QTD.title" = "PointerSupport"; -/* Class = "NSTextFieldCell"; title = "VolumeAmplifier"; ObjectID = "En7-ww-Uj5"; */ -"En7-ww-Uj5.title" = "VolumeAmplifier"; - /* Class = "NSTextFieldCell"; title = "KeyForgetThreshold"; ObjectID = "ErN-ks-EzO"; */ "ErN-ks-EzO.title" = "KeyForgetThreshold"; @@ -77,6 +74,9 @@ /* Class = "NSTextFieldCell"; title = "KeySubsequentDelay"; ObjectID = "JWy-Kv-Tq6"; */ "JWy-Kv-Tq6.title" = "KeySubsequentDelay"; +/* Class = "NSTableColumn"; headerCell.title = "LoadEarly"; ObjectID = "Jlh-ZM-CXj"; */ +"Jlh-ZM-CXj.headerCell.title" = "LoadEarly"; + /* Class = "NSTableColumn"; headerCell.title = "Arguments"; ObjectID = "Kuw-7J-hNc"; */ "Kuw-7J-hNc.headerCell.title" = "Arguments"; @@ -158,9 +158,6 @@ /* Class = "NSButtonCell"; title = "HideVerbose"; ObjectID = "egr-8J-RIS"; */ "egr-8J-RIS.title" = "HideVerbose"; -/* Class = "NSTextFieldCell"; title = "MinimumVolume"; ObjectID = "ehu-K3-gbY"; */ -"ehu-K3-gbY.title" = "MinimumVolume"; - /* Class = "NSMenuItem"; title = "DEFAULT"; ObjectID = "fZq-zJ-tYW"; */ "fZq-zJ-tYW.title" = "DEFAULT"; @@ -182,9 +179,6 @@ /* Class = "NSButtonCell"; title = "Connect Drivers"; ObjectID = "kBk-75-acl"; */ "kBk-75-acl.title" = "Connect Drivers"; -/* Class = "NSTextFieldCell"; title = "AudioOut"; ObjectID = "kM6-tO-pns"; */ -"kM6-tO-pns.title" = "AudioOut"; - /* Class = "NSTableColumn"; headerCell.title = "Address"; ObjectID = "ldi-uY-9wO"; */ "ldi-uY-9wO.headerCell.title" = "Address";