/** @file OpenCore driver. Copyright (c) 2019, vit9696. All rights reserved.
This program and the accompanying materials are licensed and made available under the terms and conditions of the BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/licenses/bsd-license.php THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED. **/ #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #define OC_EXIT_BOOT_SERVICES_HANDLER_MAX 5 STATIC EFI_EVENT_NOTIFY mOcExitBootServicesHandlers[OC_EXIT_BOOT_SERVICES_HANDLER_MAX+1]; STATIC VOID *mOcExitBootServicesContexts[OC_EXIT_BOOT_SERVICES_HANDLER_MAX]; STATIC UINTN mOcExitBootServicesIndex; VOID OcScheduleExitBootServices ( IN EFI_EVENT_NOTIFY Handler, IN VOID *Context ) { if (mOcExitBootServicesIndex + 1 == OC_EXIT_BOOT_SERVICES_HANDLER_MAX) { ASSERT (FALSE); return; } mOcExitBootServicesHandlers[mOcExitBootServicesIndex] = Handler; mOcExitBootServicesContexts[mOcExitBootServicesIndex] = Context; ++mOcExitBootServicesIndex; } STATIC VOID OcLoadDrivers ( IN OC_STORAGE_CONTEXT *Storage, IN OC_GLOBAL_CONFIG *Config, OUT EFI_HANDLE **DriversToConnect OPTIONAL ) { EFI_STATUS Status; VOID *Driver; UINT32 DriverSize; UINT32 Index; CHAR16 DriverPath[OC_STORAGE_SAFE_PATH_MAX]; EFI_HANDLE ImageHandle; EFI_HANDLE *DriversToConnectIterator; VOID *DriverBinding; BOOLEAN SkipDriver; DriversToConnectIterator = NULL; if (DriversToConnect != NULL) { *DriversToConnect = NULL; } DEBUG ((DEBUG_INFO, "OC: Got %u drivers\n", Config->Uefi.Drivers.Count)); for (Index = 0; Index < Config->Uefi.Drivers.Count; ++Index) { SkipDriver = OC_BLOB_GET (Config->Uefi.Drivers.Values[Index])[0] == '#'; DEBUG (( DEBUG_INFO, "OC: Driver %a at %u is %a\n", OC_BLOB_GET (Config->Uefi.Drivers.Values[Index]), Index, SkipDriver ? "skipped!" : "being loaded..." )); // // Skip drivers marked as comments. // if (SkipDriver) { continue; } Status = OcUnicodeSafeSPrint ( DriverPath, sizeof (DriverPath), OPEN_CORE_UEFI_DRIVER_PATH "%a", OC_BLOB_GET (Config->Uefi.Drivers.Values[Index]) ); if (EFI_ERROR (Status)) { DEBUG (( DEBUG_ERROR, "OC: Driver %s%a does not fit path!\n", OPEN_CORE_UEFI_DRIVER_PATH, OC_BLOB_GET (Config->Uefi.Drivers.Values[Index]) )); continue; } Driver = OcStorageReadFileUnicode (Storage, DriverPath, &DriverSize); if (Driver == NULL) { DEBUG (( DEBUG_ERROR, "OC: Driver %a at %u cannot be found!\n", OC_BLOB_GET (Config->Uefi.Drivers.Values[Index]), Index )); // // TODO: This should cause security violation if configured! // continue; } // // TODO: Use AppleLoadedImage!! // ImageHandle = NULL; Status = gBS->LoadImage ( FALSE, gImageHandle, NULL, Driver, DriverSize, &ImageHandle ); if (EFI_ERROR (Status)) { DEBUG (( DEBUG_ERROR, "OC: Driver %a at %u cannot be loaded - %r!\n", OC_BLOB_GET (Config->Uefi.Drivers.Values[Index]), Index, Status )); FreePool (Driver); continue; } Status = gBS->StartImage ( ImageHandle, NULL, NULL ); if (EFI_ERROR (Status)) { DEBUG (( DEBUG_ERROR, "OC: Driver %a at %u cannot be started - %r!\n", OC_BLOB_GET (Config->Uefi.Drivers.Values[Index]), Index, Status )); gBS->UnloadImage (ImageHandle); } if (!EFI_ERROR (Status)) { DEBUG (( DEBUG_INFO, "OC: Driver %a at %u is successfully loaded!\n", OC_BLOB_GET (Config->Uefi.Drivers.Values[Index]), Index )); if (DriversToConnect != NULL) { Status = gBS->HandleProtocol ( ImageHandle, &gEfiDriverBindingProtocolGuid, (VOID **) &DriverBinding ); if (!EFI_ERROR (Status)) { if (*DriversToConnect == NULL) { // // Allocate enough entries for the drivers to connect. // *DriversToConnect = AllocatePool ( (Config->Uefi.Drivers.Count + 1 - Index) * sizeof (**DriversToConnect) ); if (*DriversToConnect != NULL) { DriversToConnectIterator = *DriversToConnect; } else { DEBUG ((DEBUG_ERROR, "OC: Failed to allocate memory for drivers to connect\n")); FreePool (Driver); return; } } *DriversToConnectIterator = ImageHandle; ++DriversToConnectIterator; DEBUG (( DEBUG_INFO, "OC: Driver %a at %u needs connection.\n", OC_BLOB_GET (Config->Uefi.Drivers.Values[Index]), Index )); } } } FreePool (Driver); } // // Driver connection list should be null-terminated. // if (DriversToConnectIterator != NULL) { *DriversToConnectIterator = NULL; } } STATIC VOID EFIAPI OcExitBootServicesHandler ( IN EFI_EVENT Event, IN VOID *Context ) { EFI_STATUS Status; OC_GLOBAL_CONFIG *Config; Config = (OC_GLOBAL_CONFIG *) Context; // // Printing from ExitBootServices is dangerous, as it may cause // memory reallocation, which can make ExitBootServices fail. // Only do that on error, which is not expected. // if (Config->Uefi.Quirks.ReleaseUsbOwnership) { Status = ReleaseUsbOwnership (); if (EFI_ERROR (Status)) { DEBUG ((DEBUG_INFO, "OC: ReleaseUsbOwnership - %r\n", Status)); } } // // FIXME: This is a very ugly hack for (at least) ASUS Z87-Pro. // This board results in still waiting for root devices due to firmware // performing some timer(?) actions in parallel to ExitBootServices. // Some day we should figure out what exactly happens there. // It is not the first time I face this, check AptioInputFix timer code: // https://github.com/acidanthera/AptioFixPkg/blob/e54c185/Platform/AptioInputFix/Timer/AIT.c#L72-L73 // Roughly 5 seconds is good enough. // if (Config->Uefi.Quirks.ExitBootServicesDelay > 0) { gBS->Stall (Config->Uefi.Quirks.ExitBootServicesDelay); } } STATIC VOID OcReinstallProtocols ( IN OC_GLOBAL_CONFIG *Config ) { CONST CHAR8 *AppleEventMode; BOOLEAN InstallAppleEvent; BOOLEAN OverrideAppleEvent; if (OcAudioInstallProtocols (Config->Uefi.ProtocolOverrides.AppleAudio) == NULL) { DEBUG ((DEBUG_INFO, "OC: Disabling audio in favour of firmware implementation\n")); } if (OcAppleBootPolicyInstallProtocol (Config->Uefi.ProtocolOverrides.AppleBootPolicy) == NULL) { DEBUG ((DEBUG_INFO, "OC: Failed to install boot policy protocol\n")); } if (OcDataHubInstallProtocol (Config->Uefi.ProtocolOverrides.DataHub) == NULL) { DEBUG ((DEBUG_INFO, "OC: Failed to install data hub protocol\n")); } if (OcDevicePathPropertyInstallProtocol (Config->Uefi.ProtocolOverrides.DeviceProperties) == NULL) { DEBUG ((DEBUG_INFO, "OC: Failed to install device properties protocol\n")); } if (OcAppleImageConversionInstallProtocol (Config->Uefi.ProtocolOverrides.AppleImageConversion) == NULL) { DEBUG ((DEBUG_INFO, "OC: Failed to install image conversion protocol\n")); } if (OcAppleDebugLogInstallProtocol (Config->Uefi.ProtocolOverrides.AppleDebugLog) == NULL) { DEBUG ((DEBUG_INFO, "OC: Failed to install debug log protocol\n")); } if (OcSmcIoInstallProtocol (Config->Uefi.ProtocolOverrides.AppleSmcIo, Config->Misc.Security.AuthRestart) == NULL) { DEBUG ((DEBUG_INFO, "OC: Failed to install smc i/o protocol\n")); } if (OcAppleUserInterfaceThemeInstallProtocol (Config->Uefi.ProtocolOverrides.AppleUserInterfaceTheme) == NULL) { DEBUG ((DEBUG_INFO, "OC: Failed to install user interface theme protocol\n")); } if (OcUnicodeCollationEngInstallProtocol (Config->Uefi.ProtocolOverrides.UnicodeCollation) == NULL) { DEBUG ((DEBUG_INFO, "OC: Failed to install unicode collation protocol\n")); } if (OcHashServicesInstallProtocol (Config->Uefi.ProtocolOverrides.HashServices) == NULL) { DEBUG ((DEBUG_INFO, "OC: Failed to install hash services protocol\n")); } if (OcAppleKeyMapInstallProtocols (Config->Uefi.ProtocolOverrides.AppleKeyMap) == NULL) { DEBUG ((DEBUG_INFO, "OC: Failed to install key map protocols\n")); } InstallAppleEvent = TRUE; OverrideAppleEvent = FALSE; AppleEventMode = OC_BLOB_GET (&Config->Uefi.AppleInput.AppleEvent); if (AsciiStrCmp (AppleEventMode, "Auto") == 0) { } else if (AsciiStrCmp (AppleEventMode, "OEM") == 0) { InstallAppleEvent = FALSE; } else if (AsciiStrCmp (AppleEventMode, "Builtin") == 0) { OverrideAppleEvent = TRUE; } else { DEBUG ((DEBUG_INFO, "OC: Invalid AppleInput AppleEvent setting %a, using Auto\n", AppleEventMode)); } if (OcAppleEventInstallProtocol ( InstallAppleEvent, OverrideAppleEvent, Config->Uefi.AppleInput.CustomDelays, Config->Uefi.AppleInput.KeyInitialDelay, Config->Uefi.AppleInput.KeySubsequentDelay, Config->Uefi.AppleInput.GraphicsInputMirroring, Config->Uefi.AppleInput.PointerSpeedDiv, Config->Uefi.AppleInput.PointerSpeedMul ) == NULL && InstallAppleEvent) { DEBUG ((DEBUG_INFO, "OC: Failed to install apple event protocol\n")); }; if (OcFirmwareVolumeInstallProtocol (Config->Uefi.ProtocolOverrides.FirmwareVolume) == NULL) { DEBUG ((DEBUG_INFO, "OC: Failed to install firmware volume protocol\n")); } if (OcOSInfoInstallProtocol (Config->Uefi.ProtocolOverrides.OSInfo) == NULL) { DEBUG ((DEBUG_INFO, "OC: Failed to install os info protocol\n")); } if (OcAppleRtcRamInstallProtocol (Config->Uefi.ProtocolOverrides.AppleRtcRam) == NULL) { DEBUG ((DEBUG_INFO, "OC: Failed to install rtc ram protocol\n")); } if (OcAppleFbInfoInstallProtocol (Config->Uefi.ProtocolOverrides.AppleFramebufferInfo) == NULL) { DEBUG ((DEBUG_INFO, "OC: Failed to install fb info protocol\n")); } if (OcAppleEg2InfoInstallProtocol (Config->Uefi.ProtocolOverrides.AppleEg2Info) == NULL) { DEBUG ((DEBUG_INFO, "OC: Failed to install fb info protocol\n")); } } VOID OcLoadAppleSecureBoot ( IN OC_GLOBAL_CONFIG *Config ) { EFI_STATUS Status; APPLE_SECURE_BOOT_PROTOCOL *SecureBoot; CONST CHAR8 *SecureBootModel; CONST CHAR8 *RealSecureBootModel; UINT8 SecureBootPolicy; SecureBootModel = OC_BLOB_GET (&Config->Misc.Security.SecureBootModel); if (AsciiStrCmp (SecureBootModel, OC_SB_MODEL_DISABLED) == 0) { SecureBootPolicy = AppleImg4SbModeDisabled; } else if (Config->Misc.Security.ApECID != 0) { SecureBootPolicy = AppleImg4SbModeFull; } else { SecureBootPolicy = AppleImg4SbModeMedium; } // // We blindly trust DMG contents after signature verification // essentially skipping secure boot in this case. // Do not allow enabling one but not the other. // if (SecureBootPolicy != AppleImg4SbModeDisabled && AsciiStrCmp (OC_BLOB_GET (&Config->Misc.Security.DmgLoading), "Any") == 0) { DEBUG ((DEBUG_ERROR, "OC: Cannot use Secure Boot with Any DmgLoading!\n")); CpuDeadLoop (); return; } DEBUG (( DEBUG_INFO, "OC: Loading Apple Secure Boot with %a (level %u)\n", SecureBootModel, SecureBootPolicy )); if (SecureBootPolicy != AppleImg4SbModeDisabled) { RealSecureBootModel = OcAppleImg4GetHardwareModel (SecureBootModel); if (RealSecureBootModel == NULL) { DEBUG ((DEBUG_ERROR, "OC: Failed to find SB model %a\n", SecureBootModel)); return; } Status = OcAppleImg4BootstrapValues (RealSecureBootModel, Config->Misc.Security.ApECID); if (EFI_ERROR (Status)) { DEBUG ((DEBUG_ERROR, "OC: Failed to bootstrap IMG4 values - %r\n", Status)); return; } Status = OcAppleSecureBootBootstrapValues (RealSecureBootModel, Config->Misc.Security.ApECID); if (EFI_ERROR (Status)) { DEBUG ((DEBUG_ERROR, "OC: Failed to bootstrap SB values - %r\n", Status)); return; } } // // Provide protocols even in disabled state. // if (OcAppleImg4VerificationInstallProtocol (Config->Uefi.ProtocolOverrides.AppleImg4Verification) == NULL) { DEBUG ((DEBUG_ERROR, "OC: Failed to install im4m protocol\n")); return; } // // TODO: Do we need to make Windows policy configurable? // SecureBoot = OcAppleSecureBootInstallProtocol ( Config->Uefi.ProtocolOverrides.AppleSecureBoot, SecureBootPolicy, 0, FALSE ); if (SecureBoot == NULL) { DEBUG ((DEBUG_ERROR, "OC: Failed to install secure boot protocol\n")); } } STATIC EFI_STATUS EFIAPI OcSecurityFileAuthentication ( IN CONST EFI_SECURITY_ARCH_PROTOCOL *This, IN UINT32 AuthenticationStatus, IN CONST EFI_DEVICE_PATH_PROTOCOL *File ) { DEBUG ((DEBUG_VERBOSE, "OC: Security V1 %u\n", AuthenticationStatus)); return EFI_SUCCESS; } STATIC EFI_STATUS EFIAPI OcSecurity2FileAuthentication ( IN CONST EFI_SECURITY2_ARCH_PROTOCOL *This, IN CONST EFI_DEVICE_PATH_PROTOCOL *File OPTIONAL, IN VOID *FileBuffer, IN UINTN FileSize, IN BOOLEAN BootPolicy ) { DEBUG ((DEBUG_VERBOSE, "OC: Security V2 %u\n", BootPolicy)); return EFI_SUCCESS; } STATIC VOID OcInstallPermissiveSecurityPolicy ( VOID ) { EFI_STATUS Status; EFI_SECURITY_ARCH_PROTOCOL *Security; EFI_SECURITY2_ARCH_PROTOCOL *Security2; DEBUG ((DEBUG_INFO, "OC: Installing DISABLING secure boot policy overrides\n")); Status = gBS->LocateProtocol ( &gEfiSecurityArchProtocolGuid, NULL, (VOID **) &Security ); DEBUG ((DEBUG_INFO, "OC: Security arch protocol - %r\n", Status)); if (!EFI_ERROR (Status)) { Security->FileAuthenticationState = OcSecurityFileAuthentication; } Status = gBS->LocateProtocol ( &gEfiSecurity2ArchProtocolGuid, NULL, (VOID **) &Security2 ); DEBUG ((DEBUG_INFO, "OC: Security2 arch protocol - %r\n", Status)); if (!EFI_ERROR (Status)) { Security2->FileAuthentication = OcSecurity2FileAuthentication; } } VOID OcLoadBooterUefiSupport ( IN OC_GLOBAL_CONFIG *Config, IN OC_CPU_INFO *CpuInfo, IN UINT8 *Signature ) { OC_ABC_SETTINGS AbcSettings; UINT32 Index; UINT32 NextIndex; OC_BOOTER_PATCH_ENTRY *UserPatch; OC_BOOTER_PATCH *Patch; ZeroMem (&AbcSettings, sizeof (AbcSettings)); AbcSettings.AvoidRuntimeDefrag = Config->Booter.Quirks.AvoidRuntimeDefrag; AbcSettings.DevirtualiseMmio = Config->Booter.Quirks.DevirtualiseMmio; AbcSettings.DisableSingleUser = Config->Booter.Quirks.DisableSingleUser; AbcSettings.DisableVariableWrite = Config->Booter.Quirks.DisableVariableWrite; AbcSettings.ProtectSecureBoot = Config->Booter.Quirks.ProtectSecureBoot; AbcSettings.DiscardHibernateMap = Config->Booter.Quirks.DiscardHibernateMap; AbcSettings.AllowRelocationBlock = Config->Booter.Quirks.AllowRelocationBlock; AbcSettings.EnableSafeModeSlide = Config->Booter.Quirks.EnableSafeModeSlide; AbcSettings.EnableWriteUnprotector = Config->Booter.Quirks.EnableWriteUnprotector; AbcSettings.ForceExitBootServices = Config->Booter.Quirks.ForceExitBootServices; AbcSettings.ForceBooterSignature = Config->Booter.Quirks.ForceBooterSignature; CopyMem (AbcSettings.BooterSignature, Signature, sizeof (AbcSettings.BooterSignature)); AbcSettings.ProtectMemoryRegions = Config->Booter.Quirks.ProtectMemoryRegions; AbcSettings.ProvideCustomSlide = Config->Booter.Quirks.ProvideCustomSlide; AbcSettings.ProvideMaxSlide = Config->Booter.Quirks.ProvideMaxSlide; AbcSettings.ProtectUefiServices = Config->Booter.Quirks.ProtectUefiServices; AbcSettings.RebuildAppleMemoryMap = Config->Booter.Quirks.RebuildAppleMemoryMap; AbcSettings.SetupVirtualMap = Config->Booter.Quirks.SetupVirtualMap; AbcSettings.SignalAppleOS = Config->Booter.Quirks.SignalAppleOS; AbcSettings.SyncRuntimePermissions = Config->Booter.Quirks.SyncRuntimePermissions; // // Handle MmioWhitelist patches. // if (AbcSettings.DevirtualiseMmio && Config->Booter.MmioWhitelist.Count > 0) { AbcSettings.MmioWhitelist = AllocatePool ( Config->Booter.MmioWhitelist.Count * sizeof (AbcSettings.MmioWhitelist[0]) ); if (AbcSettings.MmioWhitelist != NULL) { NextIndex = 0; for (Index = 0; Index < Config->Booter.MmioWhitelist.Count; ++Index) { if (Config->Booter.MmioWhitelist.Values[Index]->Enabled) { AbcSettings.MmioWhitelist[NextIndex] = Config->Booter.MmioWhitelist.Values[Index]->Address; ++NextIndex; } } AbcSettings.MmioWhitelistSize = NextIndex; } else { DEBUG (( DEBUG_ERROR, "OC: Failed to allocate %u slots for mmio addresses\n", (UINT32) Config->Booter.MmioWhitelist.Count )); } } // // Handle customised booter patches. // if (Config->Booter.Patch.Count > 0) { AbcSettings.BooterPatches = AllocateZeroPool ( Config->Booter.Patch.Count * sizeof (AbcSettings.BooterPatches[0]) ); if (AbcSettings.BooterPatches != NULL) { NextIndex = 0; for (Index = 0; Index < Config->Booter.Patch.Count; ++Index) { Patch = &AbcSettings.BooterPatches[NextIndex]; UserPatch = Config->Booter.Patch.Values[Index]; if (!UserPatch->Enabled) { continue; } // // Ignore patch if: // - There is nothing to replace. // - Find and replace mismatch in size. // - Mask and ReplaceMask mismatch in size when are available. // if (UserPatch->Replace.Size == 0 || UserPatch->Find.Size != UserPatch->Replace.Size || (UserPatch->Mask.Size > 0 && UserPatch->Find.Size != UserPatch->Mask.Size) || (UserPatch->ReplaceMask.Size > 0 && UserPatch->Find.Size != UserPatch->ReplaceMask.Size)) { DEBUG ((DEBUG_ERROR, "OC: Booter patch %u is borked\n", Index)); continue; } // // Also, ignore patch on mismatched architecture. // Patch->Arch = OC_BLOB_GET (&UserPatch->Arch); if (Patch->Arch[0] != '\0' && AsciiStrCmp (Patch->Arch, "Any") != 0) { #if defined(MDE_CPU_X64) if (AsciiStrCmp (Patch->Arch, "x86_64") != 0) { continue; } #elif defined(MDE_CPU_IA32) if (AsciiStrCmp (Patch->Arch, "i386") != 0) { continue; } #else #error "Unsupported architecture" #endif } // // Here we simply receive Identifier from user, // and it will be parsed by the internal patch function. // Patch->Identifier = OC_BLOB_GET (&UserPatch->Identifier); Patch->Find = OC_BLOB_GET (&UserPatch->Find); Patch->Replace = OC_BLOB_GET (&UserPatch->Replace); Patch->Comment = OC_BLOB_GET (&UserPatch->Comment); if (UserPatch->Mask.Size > 0) { Patch->Mask = OC_BLOB_GET (&UserPatch->Mask); } if (UserPatch->ReplaceMask.Size > 0) { Patch->ReplaceMask = OC_BLOB_GET (&UserPatch->ReplaceMask); } Patch->Size = UserPatch->Replace.Size; Patch->Count = UserPatch->Count; Patch->Skip = UserPatch->Skip; Patch->Limit = UserPatch->Limit; ++NextIndex; } AbcSettings.BooterPatchesSize = NextIndex; } else { DEBUG (( DEBUG_ERROR, "OC: Failed to allocate %u slots for user booter patches\n", (UINT32) Config->Booter.Patch.Count )); } } AbcSettings.ExitBootServicesHandlers = mOcExitBootServicesHandlers; AbcSettings.ExitBootServicesHandlerContexts = mOcExitBootServicesContexts; OcAbcInitialize (&AbcSettings, CpuInfo); } VOID OcReserveMemory ( IN OC_GLOBAL_CONFIG *Config ) { EFI_STATUS Status; UINTN Index; EFI_PHYSICAL_ADDRESS ReservedAddress; EFI_MEMORY_TYPE RsvdMemoryType; CHAR8 *RsvdMemoryTypeStr; for (Index = 0; Index < Config->Uefi.ReservedMemory.Count; ++Index) { if (!Config->Uefi.ReservedMemory.Values[Index]->Enabled) { continue; } if ((Config->Uefi.ReservedMemory.Values[Index]->Address & (BASE_4KB - 1)) != 0 || (Config->Uefi.ReservedMemory.Values[Index]->Size & (BASE_4KB - 1)) != 0) { Status = EFI_INVALID_PARAMETER; } else { RsvdMemoryTypeStr = OC_BLOB_GET (&Config->Uefi.ReservedMemory.Values[Index]->Type); Status = OcDescToMemoryType (RsvdMemoryTypeStr, &RsvdMemoryType); if (EFI_ERROR (Status)) { DEBUG ((DEBUG_INFO, "OC: Invalid ReservedMemory Type: %a\n", RsvdMemoryTypeStr)); RsvdMemoryType = EfiReservedMemoryType; } ReservedAddress = Config->Uefi.ReservedMemory.Values[Index]->Address; Status = gBS->AllocatePages ( AllocateAddress, RsvdMemoryType, (UINTN) EFI_SIZE_TO_PAGES (Config->Uefi.ReservedMemory.Values[Index]->Size), &ReservedAddress ); } DEBUG (( DEBUG_INFO, "OC: Reserving region %Lx of %Lx size - %r\n", Config->Uefi.ReservedMemory.Values[Index]->Address, Config->Uefi.ReservedMemory.Values[Index]->Size, Status )); } } VOID OcLoadUefiSupport ( IN OC_STORAGE_CONTEXT *Storage, IN OC_GLOBAL_CONFIG *Config, IN OC_CPU_INFO *CpuInfo, IN UINT8 *Signature ) { EFI_HANDLE *DriversToConnect; EFI_EVENT Event; BOOLEAN AvxEnabled; OcReinstallProtocols (Config); OcImageLoaderInit (); OcLoadAppleSecureBoot (Config); OcLoadUefiInputSupport (Config); // // Setup Apple bootloader specific UEFI features. // OcLoadBooterUefiSupport (Config, CpuInfo, Signature); if (Config->Uefi.Quirks.ActivateHpetSupport) { ActivateHpetSupport (); } if (Config->Uefi.Quirks.IgnoreInvalidFlexRatio) { OcCpuCorrectFlexRatio (CpuInfo); } if (Config->Uefi.Quirks.TscSyncTimeout > 0) { OcCpuCorrectTscSync (CpuInfo, Config->Uefi.Quirks.TscSyncTimeout); } DEBUG (( DEBUG_INFO, "OC: RequestBootVarRouting %d\n", Config->Uefi.Quirks.RequestBootVarRouting )); // // Inform platform support whether we want Boot#### routing or not. // gRT->SetVariable ( OC_BOOT_REDIRECT_VARIABLE_NAME, &gOcVendorVariableGuid, OPEN_CORE_INT_NVRAM_ATTR, sizeof (Config->Uefi.Quirks.RequestBootVarRouting), &Config->Uefi.Quirks.RequestBootVarRouting ); if (Config->Uefi.Quirks.UnblockFsConnect) { OcUnblockUnmountedPartitions (); } if (Config->Uefi.Quirks.DisableSecurityPolicy) { OcInstallPermissiveSecurityPolicy (); } if (Config->Uefi.Quirks.ForgeUefiSupport) { OcForgeUefiSupport (); } if (Config->Uefi.Quirks.ReloadOptionRoms) { OcReloadOptionRoms (); } if (Config->Uefi.Quirks.EnableVectorAcceleration) { AvxEnabled = TryEnableAvx (); DEBUG ((DEBUG_INFO, "OC: AVX enabled - %u\n", AvxEnabled)); } OcMiscUefiQuirksLoaded (Config); // // Reserve requested memory regions // OcReserveMemory (Config); if (Config->Uefi.ConnectDrivers) { OcLoadDrivers (Storage, Config, &DriversToConnect); DEBUG ((DEBUG_INFO, "OC: Connecting drivers...\n")); if (DriversToConnect != NULL) { OcRegisterDriversToHighestPriority (DriversToConnect); // // DriversToConnect is not freed as it is owned by OcRegisterDriversToHighestPriority. // } OcConnectDrivers (); DEBUG ((DEBUG_INFO, "OC: Connecting drivers done...\n")); } else { OcLoadDrivers (Storage, Config, NULL); } if (Config->Uefi.Apfs.EnableJumpstart) { OcApfsConfigure ( Config->Uefi.Apfs.MinVersion, Config->Uefi.Apfs.MinDate, Config->Misc.Security.ScanPolicy, Config->Uefi.Apfs.GlobalConnect, Config->Uefi.Quirks.UnblockFsConnect, Config->Uefi.Apfs.HideVerbose ); OcApfsConnectDevices ( Config->Uefi.Apfs.JumpstartHotPlug ); } OcLoadUefiOutputSupport (Config); OcLoadUefiAudioSupport (Storage, Config); gBS->CreateEvent ( EVT_SIGNAL_EXIT_BOOT_SERVICES, TPL_CALLBACK, OcExitBootServicesHandler, Config, &Event ); }