]> code.delx.au - refind/blob - refind/main.c
New FreeBSD GPT BIOS-mode boot loader detection code. Also,
[refind] / refind / main.c
1 /*
2 * refind/main.c
3 * Main code for the boot menu
4 *
5 * Copyright (c) 2006-2010 Christoph Pfisterer
6 * All rights reserved.
7 *
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions are
10 * met:
11 *
12 * * Redistributions of source code must retain the above copyright
13 * notice, this list of conditions and the following disclaimer.
14 *
15 * * Redistributions in binary form must reproduce the above copyright
16 * notice, this list of conditions and the following disclaimer in the
17 * documentation and/or other materials provided with the
18 * distribution.
19 *
20 * * Neither the name of Christoph Pfisterer nor the names of the
21 * contributors may be used to endorse or promote products derived
22 * from this software without specific prior written permission.
23 *
24 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
25 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
26 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
27 * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
28 * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
29 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
30 * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
31 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
32 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
33 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
34 * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
35 */
36 /*
37 * Modifications copyright (c) 2012-2015 Roderick W. Smith
38 *
39 * Modifications distributed under the terms of the GNU General Public
40 * License (GPL) version 3 (GPLv3), a copy of which must be distributed
41 * with this source code or binaries made from it.
42 *
43 */
44
45 #include "global.h"
46 #include "config.h"
47 #include "screen.h"
48 #include "legacy.h"
49 #include "lib.h"
50 #include "icns.h"
51 #include "menu.h"
52 #include "mok.h"
53 #include "gpt.h"
54 #include "security_policy.h"
55 #include "driver_support.h"
56 #include "../include/Handle.h"
57 #include "../include/refit_call_wrapper.h"
58 #include "../EfiLib/BdsHelper.h"
59 #include "../EfiLib/legacy.h"
60
61 #ifdef __MAKEWITH_GNUEFI
62 #ifndef EFI_SECURITY_VIOLATION
63 #define EFI_SECURITY_VIOLATION EFIERR (26)
64 #endif
65 #endif
66
67 #ifndef EFI_OS_INDICATIONS_BOOT_TO_FW_UI
68 #define EFI_OS_INDICATIONS_BOOT_TO_FW_UI 0x0000000000000001ULL
69 #endif
70
71 #ifdef __MAKEWITH_TIANO
72 #define LibLocateHandle gBS->LocateHandleBuffer
73 #endif
74
75 //
76 // constants
77
78 #define MACOSX_LOADER_DIR L"System\\Library\\CoreServices"
79 #define MACOSX_LOADER_PATH ( MACOSX_LOADER_DIR L"\\boot.efi" )
80 #if defined (EFIX64)
81 #define SHELL_NAMES L"\\EFI\\tools\\shell.efi,\\EFI\\tools\\shellx64.efi,\\shell.efi,\\shellx64.efi"
82 #define GPTSYNC_NAMES L"\\EFI\\tools\\gptsync.efi,\\EFI\\tools\\gptsync_x64.efi"
83 #define GDISK_NAMES L"\\EFI\\tools\\gdisk.efi,\\EFI\\tools\\gdisk_x64.efi"
84 #define NETBOOT_NAMES L"\\EFI\\tools\\ipxe.efi"
85 #define MEMTEST_NAMES L"memtest86.efi,memtest86_x64.efi,memtest86x64.efi,bootx64.efi"
86 #define DRIVER_DIRS L"drivers,drivers_x64"
87 #define FALLBACK_FULLNAME L"EFI\\BOOT\\bootx64.efi"
88 #define FALLBACK_BASENAME L"bootx64.efi"
89 #define EFI_STUB_ARCH 0x8664
90 #elif defined (EFI32)
91 #define SHELL_NAMES L"\\EFI\\tools\\shell.efi,\\EFI\\tools\\shellia32.efi,\\shell.efi,\\shellia32.efi"
92 #define GPTSYNC_NAMES L"\\EFI\\tools\\gptsync.efi,\\EFI\\tools\\gptsync_ia32.efi"
93 #define GDISK_NAMES L"\\EFI\\tools\\gdisk.efi,\\EFI\\tools\\gdisk_ia32.efi"
94 #define NETBOOT_NAMES L"\\EFI\\tools\\ipxe.efi"
95 #define MEMTEST_NAMES L"memtest86.efi,memtest86_ia32.efi,memtest86ia32.efi,bootia32.efi"
96 #define DRIVER_DIRS L"drivers,drivers_ia32"
97 #define FALLBACK_FULLNAME L"EFI\\BOOT\\bootia32.efi"
98 #define FALLBACK_BASENAME L"bootia32.efi"
99 #define EFI_STUB_ARCH 0x014c
100 #else
101 #define SHELL_NAMES L"\\EFI\\tools\\shell.efi,\\shell.efi"
102 #define GPTSYNC_NAMES L"\\EFI\\tools\\gptsync.efi"
103 #define GDISK_NAMES L"\\EFI\\tools\\gdisk.efi"
104 #define NETBOOT_NAMES L"\\EFI\\tools\\ipxe.efi"
105 #define MEMTEST_NAMES L"memtest86.efi"
106 #define DRIVER_DIRS L"drivers"
107 #define FALLBACK_FULLNAME L"EFI\\BOOT\\boot.efi" /* Not really correct */
108 #define FALLBACK_BASENAME L"boot.efi" /* Not really correct */
109 #endif
110 #define FAT_ARCH 0x0ef1fab9 /* ID for Apple "fat" binary */
111
112 #define IPXE_DISCOVER_NAME L"\\efi\\tools\\ipxe_discover.efi"
113 #define IPXE_NAME L"\\efi\\tools\\ipxe.efi"
114
115 // Filename patterns that identify EFI boot loaders. Note that a single case (either L"*.efi" or
116 // L"*.EFI") is fine for most systems; but Gigabyte's buggy Hybrid EFI does a case-sensitive
117 // comparison when it should do a case-insensitive comparison, so I'm doubling this up. It does
118 // no harm on other computers, AFAIK. In theory, every case variation should be done for
119 // completeness, but that's ridiculous....
120 #define LOADER_MATCH_PATTERNS L"*.efi,*.EFI"
121
122 // Patterns that identify Linux kernels. Added to the loader match pattern when the
123 // scan_all_linux_kernels option is set in the configuration file. Causes kernels WITHOUT
124 // a ".efi" extension to be found when scanning for boot loaders.
125 #define LINUX_MATCH_PATTERNS L"vmlinuz*,bzImage*"
126
127 static REFIT_MENU_ENTRY MenuEntryAbout = { L"About rEFInd", TAG_ABOUT, 1, 0, 'A', NULL, NULL, NULL };
128 static REFIT_MENU_ENTRY MenuEntryReset = { L"Reboot Computer", TAG_REBOOT, 1, 0, 'R', NULL, NULL, NULL };
129 static REFIT_MENU_ENTRY MenuEntryShutdown = { L"Shut Down Computer", TAG_SHUTDOWN, 1, 0, 'U', NULL, NULL, NULL };
130 REFIT_MENU_ENTRY MenuEntryReturn = { L"Return to Main Menu", TAG_RETURN, 1, 0, 0, NULL, NULL, NULL };
131 static REFIT_MENU_ENTRY MenuEntryExit = { L"Exit rEFInd", TAG_EXIT, 1, 0, 0, NULL, NULL, NULL };
132 static REFIT_MENU_ENTRY MenuEntryFirmware = { L"Reboot to Computer Setup Utility", TAG_FIRMWARE, 1, 0, 0, NULL, NULL, NULL };
133
134 REFIT_MENU_SCREEN MainMenu = { L"Main Menu", NULL, 0, NULL, 0, NULL, 0, L"Automatic boot",
135 L"Use arrow keys to move cursor; Enter to boot;",
136 L"Insert or F2 for more options; Esc to refresh" };
137 static REFIT_MENU_SCREEN AboutMenu = { L"About", NULL, 0, NULL, 0, NULL, 0, NULL, L"Press Enter to return to main menu", L"" };
138
139 REFIT_CONFIG GlobalConfig = { FALSE, TRUE, FALSE, FALSE, 0, 0, 0, DONT_CHANGE_TEXT_MODE, 20, 0, 0, GRAPHICS_FOR_OSX, LEGACY_TYPE_MAC,
140 0, 0, { DEFAULT_BIG_ICON_SIZE / 4, DEFAULT_SMALL_ICON_SIZE, DEFAULT_BIG_ICON_SIZE }, BANNER_NOSCALE,
141 NULL, NULL, CONFIG_FILE_NAME, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL,
142 { TAG_SHELL, TAG_MEMTEST, TAG_GDISK, TAG_APPLE_RECOVERY, TAG_WINDOWS_RECOVERY, TAG_MOK_TOOL,
143 TAG_ABOUT, TAG_SHUTDOWN, TAG_REBOOT, TAG_FIRMWARE, 0, 0, 0, 0, 0, 0, 0, 0 }
144 };
145
146 EFI_GUID GlobalGuid = EFI_GLOBAL_VARIABLE;
147 EFI_GUID RefindGuid = REFIND_GUID_VALUE;
148
149 GPT_DATA *gPartitions = NULL;
150
151 // Structure used to hold boot loader filenames and time stamps in
152 // a linked list; used to sort entries within a directory.
153 struct LOADER_LIST {
154 CHAR16 *FileName;
155 EFI_TIME TimeStamp;
156 struct LOADER_LIST *NextEntry;
157 };
158
159 //
160 // misc functions
161 //
162
163 static VOID AboutrEFInd(VOID)
164 {
165 CHAR16 *FirmwareVendor;
166
167 if (AboutMenu.EntryCount == 0) {
168 AboutMenu.TitleImage = BuiltinIcon(BUILTIN_ICON_FUNC_ABOUT);
169 AddMenuInfoLine(&AboutMenu, L"rEFInd Version 0.8.6.4");
170 AddMenuInfoLine(&AboutMenu, L"");
171 AddMenuInfoLine(&AboutMenu, L"Copyright (c) 2006-2010 Christoph Pfisterer");
172 AddMenuInfoLine(&AboutMenu, L"Copyright (c) 2012-2015 Roderick W. Smith");
173 AddMenuInfoLine(&AboutMenu, L"Portions Copyright (c) Intel Corporation and others");
174 AddMenuInfoLine(&AboutMenu, L"Distributed under the terms of the GNU GPLv3 license");
175 AddMenuInfoLine(&AboutMenu, L"");
176 AddMenuInfoLine(&AboutMenu, L"Running on:");
177 AddMenuInfoLine(&AboutMenu, PoolPrint(L" EFI Revision %d.%02d", ST->Hdr.Revision >> 16, ST->Hdr.Revision & ((1 << 16) - 1)));
178 #if defined(EFI32)
179 AddMenuInfoLine(&AboutMenu, PoolPrint(L" Platform: x86 (32 bit); Secure Boot %s",
180 secure_mode() ? L"active" : L"inactive"));
181 #elif defined(EFIX64)
182 AddMenuInfoLine(&AboutMenu, PoolPrint(L" Platform: x86_64 (64 bit); Secure Boot %s",
183 secure_mode() ? L"active" : L"inactive"));
184 #else
185 AddMenuInfoLine(&AboutMenu, L" Platform: unknown");
186 #endif
187 FirmwareVendor = StrDuplicate(ST->FirmwareVendor);
188 LimitStringLength(FirmwareVendor, 65); // More than ~65 causes empty info page on 800x600 display
189 AddMenuInfoLine(&AboutMenu, PoolPrint(L" Firmware: %s %d.%02d", FirmwareVendor, ST->FirmwareRevision >> 16,
190 ST->FirmwareRevision & ((1 << 16) - 1)));
191 AddMenuInfoLine(&AboutMenu, PoolPrint(L" Screen Output: %s", egScreenDescription()));
192 AddMenuInfoLine(&AboutMenu, L"");
193 #if defined(__MAKEWITH_GNUEFI)
194 AddMenuInfoLine(&AboutMenu, L"Built with GNU-EFI");
195 #else
196 AddMenuInfoLine(&AboutMenu, L"Built with TianoCore EDK2");
197 #endif
198 AddMenuInfoLine(&AboutMenu, L"");
199 AddMenuInfoLine(&AboutMenu, L"For more information, see the rEFInd Web site:");
200 AddMenuInfoLine(&AboutMenu, L"http://www.rodsbooks.com/refind/");
201 AddMenuEntry(&AboutMenu, &MenuEntryReturn);
202 }
203
204 RunMenu(&AboutMenu, NULL);
205 } /* VOID AboutrEFInd() */
206
207 static VOID WarnSecureBootError(CHAR16 *Name, BOOLEAN Verbose) {
208 if (Name == NULL)
209 Name = L"the loader";
210
211 refit_call2_wrapper(ST->ConOut->SetAttribute, ST->ConOut, ATTR_ERROR);
212 Print(L"Secure Boot validation failure loading %s!\n", Name);
213 refit_call2_wrapper(ST->ConOut->SetAttribute, ST->ConOut, ATTR_BASIC);
214 if (Verbose && secure_mode()) {
215 Print(L"\nThis computer is configured with Secure Boot active, but\n%s has failed validation.\n", Name);
216 Print(L"\nYou can:\n * Launch another boot loader\n");
217 Print(L" * Disable Secure Boot in your firmware\n");
218 Print(L" * Sign %s with a machine owner key (MOK)\n", Name);
219 Print(L" * Use a MOK utility (often present on the second row) to add a MOK with which\n");
220 Print(L" %s has already been signed.\n", Name);
221 Print(L" * Use a MOK utility to register %s (\"enroll its hash\") without\n", Name);
222 Print(L" signing it.\n");
223 Print(L"\nSee http://www.rodsbooks.com/refind/secureboot.html for more information\n");
224 PauseForKey();
225 } // if
226 } // VOID WarnSecureBootError()
227
228 // Returns TRUE if this file is a valid EFI loader file, and is proper ARCH
229 static BOOLEAN IsValidLoader(EFI_FILE *RootDir, CHAR16 *FileName) {
230 BOOLEAN IsValid = TRUE;
231 #if defined (EFIX64) | defined (EFI32)
232 EFI_STATUS Status;
233 EFI_FILE_HANDLE FileHandle;
234 CHAR8 Header[512];
235 UINTN Size = sizeof(Header);
236
237 if ((RootDir == NULL) || (FileName == NULL)) {
238 // Assume valid here, because Macs produce NULL RootDir (& maybe FileName)
239 // when launching from a Firewire drive. This should be handled better, but
240 // fix would have to be in StartEFIImageList() and/or in FindVolumeAndFilename().
241 return TRUE;
242 } // if
243
244 Status = refit_call5_wrapper(RootDir->Open, RootDir, &FileHandle, FileName, EFI_FILE_MODE_READ, 0);
245 if (EFI_ERROR(Status))
246 return FALSE;
247
248 Status = refit_call3_wrapper(FileHandle->Read, FileHandle, &Size, Header);
249 refit_call1_wrapper(FileHandle->Close, FileHandle);
250
251 IsValid = !EFI_ERROR(Status) &&
252 Size == sizeof(Header) &&
253 ((Header[0] == 'M' && Header[1] == 'Z' &&
254 (Size = *(UINT32 *)&Header[0x3c]) < 0x180 &&
255 Header[Size] == 'P' && Header[Size+1] == 'E' &&
256 Header[Size+2] == 0 && Header[Size+3] == 0 &&
257 *(UINT16 *)&Header[Size+4] == EFI_STUB_ARCH) ||
258 (*(UINT32 *)&Header == FAT_ARCH));
259 #endif
260 return IsValid;
261 } // BOOLEAN IsValidLoader()
262
263 // Launch an EFI binary.
264 EFI_STATUS StartEFIImageList(IN EFI_DEVICE_PATH **DevicePaths,
265 IN CHAR16 *LoadOptions, IN UINTN LoaderType,
266 IN CHAR16 *ImageTitle, IN CHAR8 OSType,
267 OUT UINTN *ErrorInStep,
268 IN BOOLEAN Verbose,
269 IN BOOLEAN IsDriver)
270 {
271 EFI_STATUS Status, ReturnStatus;
272 EFI_HANDLE ChildImageHandle;
273 EFI_LOADED_IMAGE *ChildLoadedImage = NULL;
274 REFIT_VOLUME *Volume = NULL;
275 UINTN DevicePathIndex;
276 CHAR16 ErrorInfo[256];
277 CHAR16 *FullLoadOptions = NULL;
278 CHAR16 *Filename = NULL;
279 CHAR16 *Temp;
280
281 if (ErrorInStep != NULL)
282 *ErrorInStep = 0;
283
284 // set load options
285 if (LoadOptions != NULL) {
286 FullLoadOptions = StrDuplicate(LoadOptions);
287 if ((LoaderType == TYPE_EFI) && (OSType == 'M')) {
288 MergeStrings(&FullLoadOptions, L" ", 0);
289 // NOTE: That last space is also added by the EFI shell and seems to be significant
290 // when passing options to Apple's boot.efi...
291 } // if
292 } // if (LoadOptions != NULL)
293 if (Verbose)
294 Print(L"Starting %s\nUsing load options '%s'\n", ImageTitle, FullLoadOptions ? FullLoadOptions : L"");
295
296 // load the image into memory (and execute it, in the case of a shim/MOK image).
297 ReturnStatus = Status = EFI_NOT_FOUND; // in case the list is empty
298 for (DevicePathIndex = 0; DevicePaths[DevicePathIndex] != NULL; DevicePathIndex++) {
299 FindVolumeAndFilename(DevicePaths[DevicePathIndex], &Volume, &Filename);
300 // Some EFIs crash if attempting to load driver for invalid architecture, so
301 // protect for this condition; but sometimes Volume comes back NULL, so provide
302 // an exception. (TODO: Handle this special condition better.)
303 if ((LoaderType == TYPE_LEGACY) || (Volume == NULL) || IsValidLoader(Volume->RootDir, Filename)) {
304 if (Filename && (LoaderType != TYPE_LEGACY)) {
305 Temp = PoolPrint(L"\\%s %s", Filename, FullLoadOptions ? FullLoadOptions : L"");
306 if (Temp != NULL) {
307 MyFreePool(FullLoadOptions);
308 FullLoadOptions = Temp;
309 }
310 } // if (Filename)
311
312 // NOTE: Below commented-out line could be more efficient if file were read ahead of
313 // time and passed as a pre-loaded image to LoadImage(), but it doesn't work on my
314 // 32-bit Mac Mini or my 64-bit Intel box when launching a Linux kernel; the
315 // kernel returns a "Failed to handle fs_proto" error message.
316 // TODO: Track down the cause of this error and fix it, if possible.
317 // ReturnStatus = Status = refit_call6_wrapper(BS->LoadImage, FALSE, SelfImageHandle, DevicePaths[DevicePathIndex],
318 // ImageData, ImageSize, &ChildImageHandle);
319 ReturnStatus = Status = refit_call6_wrapper(BS->LoadImage, FALSE, SelfImageHandle, DevicePaths[DevicePathIndex],
320 NULL, 0, &ChildImageHandle);
321 } else {
322 Print(L"Invalid loader file!\n");
323 ReturnStatus = EFI_LOAD_ERROR;
324 }
325 if (ReturnStatus != EFI_NOT_FOUND) {
326 break;
327 }
328 }
329 if ((Status == EFI_ACCESS_DENIED) || (Status == EFI_SECURITY_VIOLATION)) {
330 WarnSecureBootError(ImageTitle, Verbose);
331 goto bailout;
332 }
333 SPrint(ErrorInfo, 255, L"while loading %s", ImageTitle);
334 if (CheckError(Status, ErrorInfo)) {
335 if (ErrorInStep != NULL)
336 *ErrorInStep = 1;
337 goto bailout;
338 }
339
340 ReturnStatus = Status = refit_call3_wrapper(BS->HandleProtocol, ChildImageHandle, &LoadedImageProtocol,
341 (VOID **) &ChildLoadedImage);
342 if (CheckError(Status, L"while getting a LoadedImageProtocol handle")) {
343 if (ErrorInStep != NULL)
344 *ErrorInStep = 2;
345 goto bailout_unload;
346 }
347 ChildLoadedImage->LoadOptions = (VOID *)FullLoadOptions;
348 ChildLoadedImage->LoadOptionsSize = FullLoadOptions ? ((UINT32)StrLen(FullLoadOptions) + 1) * sizeof(CHAR16) : 0;
349 // turn control over to the image
350 // TODO: (optionally) re-enable the EFI watchdog timer!
351
352 // close open file handles
353 UninitRefitLib();
354 ReturnStatus = Status = refit_call3_wrapper(BS->StartImage, ChildImageHandle, NULL, NULL);
355
356 // control returns here when the child image calls Exit()
357 SPrint(ErrorInfo, 255, L"returned from %s", ImageTitle);
358 if (CheckError(Status, ErrorInfo)) {
359 if (ErrorInStep != NULL)
360 *ErrorInStep = 3;
361 }
362
363 // re-open file handles
364 ReinitRefitLib();
365
366 bailout_unload:
367 // unload the image, we don't care if it works or not...
368 if (!IsDriver)
369 Status = refit_call1_wrapper(BS->UnloadImage, ChildImageHandle);
370
371 bailout:
372 MyFreePool(FullLoadOptions);
373 return ReturnStatus;
374 } /* EFI_STATUS StartEFIImageList() */
375
376 static EFI_STATUS StartEFIImage(IN EFI_DEVICE_PATH *DevicePath,
377 IN CHAR16 *LoadOptions, IN UINTN LoaderType,
378 IN CHAR16 *ImageTitle, IN CHAR8 OSType,
379 OUT UINTN *ErrorInStep,
380 IN BOOLEAN Verbose,
381 IN BOOLEAN IsDriver
382 )
383 {
384 EFI_DEVICE_PATH *DevicePaths[2];
385
386 DevicePaths[0] = DevicePath;
387 DevicePaths[1] = NULL;
388 return StartEFIImageList(DevicePaths, LoadOptions, LoaderType, ImageTitle, OSType, ErrorInStep, Verbose, IsDriver);
389 } /* static EFI_STATUS StartEFIImage() */
390
391 // From gummiboot: Reboot the computer into its built-in user interface
392 static EFI_STATUS RebootIntoFirmware(VOID) {
393 CHAR8 *b;
394 UINTN size;
395 UINT64 osind;
396 EFI_STATUS err;
397
398 osind = EFI_OS_INDICATIONS_BOOT_TO_FW_UI;
399
400 err = EfivarGetRaw(&GlobalGuid, L"OsIndications", &b, &size);
401 if (err == EFI_SUCCESS)
402 osind |= (UINT64)*b;
403 MyFreePool(b);
404
405 err = EfivarSetRaw(&GlobalGuid, L"OsIndications", (CHAR8 *)&osind, sizeof(UINT64), TRUE);
406 if (err != EFI_SUCCESS)
407 return err;
408
409 refit_call4_wrapper(RT->ResetSystem, EfiResetCold, EFI_SUCCESS, 0, NULL);
410 Print(L"Error calling ResetSystem: %r", err);
411 PauseForKey();
412 return err;
413 }
414
415 // Record the value of the loader's name/description in rEFInd's "PreviousBoot" EFI variable,
416 // if it's different from what's already stored there.
417 VOID StoreLoaderName(IN CHAR16 *Name) {
418 EFI_STATUS Status;
419 CHAR16 *OldName = NULL;
420 UINTN Length;
421
422 if (Name) {
423 Status = EfivarGetRaw(&RefindGuid, L"PreviousBoot", (CHAR8**) &OldName, &Length);
424 if ((Status != EFI_SUCCESS) || (StrCmp(OldName, Name) != 0)) {
425 EfivarSetRaw(&RefindGuid, L"PreviousBoot", (CHAR8*) Name, StrLen(Name) * 2 + 2, TRUE);
426 } // if
427 MyFreePool(OldName);
428 } // if
429 } // VOID StoreLoaderName()
430
431 //
432 // EFI OS loader functions
433 //
434
435 // See http://www.thomas-krenn.com/en/wiki/Activating_the_Intel_VT_Virtualization_Feature
436 // for information on Intel VMX features
437 static VOID DoEnableAndLockVMX(VOID)
438 {
439 UINT32 msr = 0x3a;
440 UINT32 low_bits = 0, high_bits = 0;
441
442 // is VMX active ?
443 __asm__ volatile ("rdmsr" : "=a" (low_bits), "=d" (high_bits) : "c" (msr));
444
445 // enable and lock vmx if not locked
446 if ((low_bits & 1) == 0) {
447 high_bits = 0;
448 low_bits = 0x05;
449 msr = 0x3a;
450 __asm__ volatile ("wrmsr" : : "c" (msr), "a" (low_bits), "d" (high_bits));
451 }
452 } // VOID DoEnableAndLockVMX()
453
454 static VOID StartLoader(LOADER_ENTRY *Entry, CHAR16 *SelectionName)
455 {
456 UINTN ErrorInStep = 0;
457
458 if (GlobalConfig.EnableAndLockVMX) {
459 DoEnableAndLockVMX();
460 }
461
462 BeginExternalScreen(Entry->UseGraphicsMode, L"Booting OS");
463 StoreLoaderName(SelectionName);
464 StartEFIImage(Entry->DevicePath, Entry->LoadOptions, TYPE_EFI,
465 Basename(Entry->LoaderPath), Entry->OSType, &ErrorInStep, !Entry->UseGraphicsMode, FALSE);
466 FinishExternalScreen();
467 }
468
469 // Locate an initrd or initramfs file that matches the kernel specified by LoaderPath.
470 // The matching file has a name that begins with "init" and includes the same version
471 // number string as is found in LoaderPath -- but not a longer version number string.
472 // For instance, if LoaderPath is \EFI\kernels\bzImage-3.3.0.efi, and if \EFI\kernels
473 // has a file called initramfs-3.3.0.img, this function will return the string
474 // '\EFI\kernels\initramfs-3.3.0.img'. If the directory ALSO contains the file
475 // initramfs-3.3.0-rc7.img or initramfs-13.3.0.img, those files will NOT match;
476 // however, initmine-3.3.0.img might match. (FindInitrd() returns the first match it
477 // finds.) Thus, care should be taken to avoid placing duplicate matching files in
478 // the kernel's directory.
479 // If no matching init file can be found, returns NULL.
480 static CHAR16 * FindInitrd(IN CHAR16 *LoaderPath, IN REFIT_VOLUME *Volume) {
481 CHAR16 *InitrdName = NULL, *FileName, *KernelVersion, *InitrdVersion, *Path;
482 REFIT_DIR_ITER DirIter;
483 EFI_FILE_INFO *DirEntry;
484
485 FileName = Basename(LoaderPath);
486 KernelVersion = FindNumbers(FileName);
487 Path = FindPath(LoaderPath);
488
489 // Add trailing backslash for root directory; necessary on some systems, but must
490 // NOT be added to all directories, since on other systems, a trailing backslash on
491 // anything but the root directory causes them to flake out!
492 if (StrLen(Path) == 0) {
493 MergeStrings(&Path, L"\\", 0);
494 } // if
495 DirIterOpen(Volume->RootDir, Path, &DirIter);
496 // Now add a trailing backslash if it was NOT added earlier, for consistency in
497 // building the InitrdName later....
498 if ((StrLen(Path) > 0) && (Path[StrLen(Path) - 1] != L'\\'))
499 MergeStrings(&Path, L"\\", 0);
500 while ((DirIterNext(&DirIter, 2, L"init*", &DirEntry)) && (InitrdName == NULL)) {
501 InitrdVersion = FindNumbers(DirEntry->FileName);
502 if (KernelVersion != NULL) {
503 if (StriCmp(InitrdVersion, KernelVersion) == 0) {
504 InitrdName = PoolPrint(L"%s%s", Path, DirEntry->FileName);
505 } // if
506 } else {
507 if (InitrdVersion == NULL) {
508 InitrdName = PoolPrint(L"%s%s", Path, DirEntry->FileName);
509 } // if
510 } // if/else
511 MyFreePool(InitrdVersion);
512 } // while
513 DirIterClose(&DirIter);
514
515 // Note: Don't FreePool(FileName), since Basename returns a pointer WITHIN the string it's passed.
516 MyFreePool(KernelVersion);
517 MyFreePool(Path);
518 return (InitrdName);
519 } // static CHAR16 * FindInitrd()
520
521 LOADER_ENTRY * AddPreparedLoaderEntry(LOADER_ENTRY *Entry) {
522 AddMenuEntry(&MainMenu, (REFIT_MENU_ENTRY *)Entry);
523
524 return(Entry);
525 } // LOADER_ENTRY * AddPreparedLoaderEntry()
526
527 // Creates a copy of a menu screen.
528 // Returns a pointer to the copy of the menu screen.
529 static REFIT_MENU_SCREEN* CopyMenuScreen(REFIT_MENU_SCREEN *Entry) {
530 REFIT_MENU_SCREEN *NewEntry;
531 UINTN i;
532
533 NewEntry = AllocateZeroPool(sizeof(REFIT_MENU_SCREEN));
534 if ((Entry != NULL) && (NewEntry != NULL)) {
535 CopyMem(NewEntry, Entry, sizeof(REFIT_MENU_SCREEN));
536 NewEntry->Title = (Entry->Title) ? StrDuplicate(Entry->Title) : NULL;
537 NewEntry->TimeoutText = (Entry->TimeoutText) ? StrDuplicate(Entry->TimeoutText) : NULL;
538 if (Entry->TitleImage != NULL) {
539 NewEntry->TitleImage = AllocatePool(sizeof(EG_IMAGE));
540 if (NewEntry->TitleImage != NULL)
541 CopyMem(NewEntry->TitleImage, Entry->TitleImage, sizeof(EG_IMAGE));
542 } // if
543 NewEntry->InfoLines = (CHAR16**) AllocateZeroPool(Entry->InfoLineCount * (sizeof(CHAR16*)));
544 for (i = 0; i < Entry->InfoLineCount && NewEntry->InfoLines; i++) {
545 NewEntry->InfoLines[i] = (Entry->InfoLines[i]) ? StrDuplicate(Entry->InfoLines[i]) : NULL;
546 } // for
547 NewEntry->Entries = (REFIT_MENU_ENTRY**) AllocateZeroPool(Entry->EntryCount * (sizeof (REFIT_MENU_ENTRY*)));
548 for (i = 0; i < Entry->EntryCount && NewEntry->Entries; i++) {
549 AddMenuEntry(NewEntry, Entry->Entries[i]);
550 } // for
551 NewEntry->Hint1 = (Entry->Hint1) ? StrDuplicate(Entry->Hint1) : NULL;
552 NewEntry->Hint2 = (Entry->Hint2) ? StrDuplicate(Entry->Hint2) : NULL;
553 } // if
554 return (NewEntry);
555 } // static REFIT_MENU_SCREEN* CopyMenuScreen()
556
557 // Creates a copy of a menu entry. Intended to enable moving a stack-based
558 // menu entry (such as the ones for the "reboot" and "exit" functions) to
559 // to the heap. This enables easier deletion of the whole set of menu
560 // entries when re-scanning.
561 // Returns a pointer to the copy of the menu entry.
562 static REFIT_MENU_ENTRY* CopyMenuEntry(REFIT_MENU_ENTRY *Entry) {
563 REFIT_MENU_ENTRY *NewEntry;
564
565 NewEntry = AllocateZeroPool(sizeof(REFIT_MENU_ENTRY));
566 if ((Entry != NULL) && (NewEntry != NULL)) {
567 CopyMem(NewEntry, Entry, sizeof(REFIT_MENU_ENTRY));
568 NewEntry->Title = (Entry->Title) ? StrDuplicate(Entry->Title) : NULL;
569 if (Entry->BadgeImage != NULL) {
570 NewEntry->BadgeImage = AllocatePool(sizeof(EG_IMAGE));
571 if (NewEntry->BadgeImage != NULL)
572 CopyMem(NewEntry->BadgeImage, Entry->BadgeImage, sizeof(EG_IMAGE));
573 }
574 if (Entry->Image != NULL) {
575 NewEntry->Image = AllocatePool(sizeof(EG_IMAGE));
576 if (NewEntry->Image != NULL)
577 CopyMem(NewEntry->Image, Entry->Image, sizeof(EG_IMAGE));
578 }
579 if (Entry->SubScreen != NULL) {
580 NewEntry->SubScreen = CopyMenuScreen(Entry->SubScreen);
581 }
582 } // if
583 return (NewEntry);
584 } // REFIT_MENU_ENTRY* CopyMenuEntry()
585
586 // Creates a new LOADER_ENTRY data structure and populates it with
587 // default values from the specified Entry, or NULL values if Entry
588 // is unspecified (NULL).
589 // Returns a pointer to the new data structure, or NULL if it
590 // couldn't be allocated
591 LOADER_ENTRY *InitializeLoaderEntry(IN LOADER_ENTRY *Entry) {
592 LOADER_ENTRY *NewEntry = NULL;
593
594 NewEntry = AllocateZeroPool(sizeof(LOADER_ENTRY));
595 if (NewEntry != NULL) {
596 NewEntry->me.Title = NULL;
597 NewEntry->me.Tag = TAG_LOADER;
598 NewEntry->Enabled = TRUE;
599 NewEntry->UseGraphicsMode = FALSE;
600 NewEntry->OSType = 0;
601 if (Entry != NULL) {
602 NewEntry->LoaderPath = (Entry->LoaderPath) ? StrDuplicate(Entry->LoaderPath) : NULL;
603 NewEntry->VolName = (Entry->VolName) ? StrDuplicate(Entry->VolName) : NULL;
604 NewEntry->DevicePath = Entry->DevicePath;
605 NewEntry->UseGraphicsMode = Entry->UseGraphicsMode;
606 NewEntry->LoadOptions = (Entry->LoadOptions) ? StrDuplicate(Entry->LoadOptions) : NULL;
607 NewEntry->InitrdPath = (Entry->InitrdPath) ? StrDuplicate(Entry->InitrdPath) : NULL;
608 }
609 } // if
610 return (NewEntry);
611 } // LOADER_ENTRY *InitializeLoaderEntry()
612
613 // Adds InitrdPath to Options, but only if Options doesn't already include an
614 // initrd= line. Done to enable overriding the default initrd selection in a
615 // refind_linux.conf file's options list.
616 // Returns a pointer to a new string. The calling function is responsible for
617 // freeing its memory.
618 static CHAR16 *AddInitrdToOptions(CHAR16 *Options, CHAR16 *InitrdPath) {
619 CHAR16 *NewOptions = NULL;
620
621 if (Options != NULL)
622 NewOptions = StrDuplicate(Options);
623 if ((InitrdPath != NULL) && !StriSubCmp(L"initrd=", Options)) {
624 MergeStrings(&NewOptions, L"initrd=", L' ');
625 MergeStrings(&NewOptions, InitrdPath, 0);
626 }
627 return NewOptions;
628 } // CHAR16 *AddInitrdToOptions()
629
630 // Prepare a REFIT_MENU_SCREEN data structure for a subscreen entry. This sets up
631 // the default entry that launches the boot loader using the same options as the
632 // main Entry does. Subsequent options can be added by the calling function.
633 // If a subscreen already exists in the Entry that's passed to this function,
634 // it's left unchanged and a pointer to it is returned.
635 // Returns a pointer to the new subscreen data structure, or NULL if there
636 // were problems allocating memory.
637 REFIT_MENU_SCREEN *InitializeSubScreen(IN LOADER_ENTRY *Entry) {
638 CHAR16 *FileName, *MainOptions = NULL;
639 REFIT_MENU_SCREEN *SubScreen = NULL;
640 LOADER_ENTRY *SubEntry;
641
642 FileName = Basename(Entry->LoaderPath);
643 if (Entry->me.SubScreen == NULL) { // No subscreen yet; initialize default entry....
644 SubScreen = AllocateZeroPool(sizeof(REFIT_MENU_SCREEN));
645 if (SubScreen != NULL) {
646 SubScreen->Title = AllocateZeroPool(sizeof(CHAR16) * 256);
647 SPrint(SubScreen->Title, 255, L"Boot Options for %s on %s",
648 (Entry->Title != NULL) ? Entry->Title : FileName, Entry->VolName);
649 SubScreen->TitleImage = Entry->me.Image;
650 // default entry
651 SubEntry = InitializeLoaderEntry(Entry);
652 if (SubEntry != NULL) {
653 SubEntry->me.Title = StrDuplicate(L"Boot using default options");
654 MainOptions = SubEntry->LoadOptions;
655 SubEntry->LoadOptions = AddInitrdToOptions(MainOptions, SubEntry->InitrdPath);
656 MyFreePool(MainOptions);
657 AddMenuEntry(SubScreen, (REFIT_MENU_ENTRY *)SubEntry);
658 } // if (SubEntry != NULL)
659 SubScreen->Hint1 = StrDuplicate(SUBSCREEN_HINT1);
660 if (GlobalConfig.HideUIFlags & HIDEUI_FLAG_EDITOR) {
661 SubScreen->Hint2 = StrDuplicate(SUBSCREEN_HINT2_NO_EDITOR);
662 } else {
663 SubScreen->Hint2 = StrDuplicate(SUBSCREEN_HINT2);
664 } // if/else
665 } // if (SubScreen != NULL)
666 } else { // existing subscreen; less initialization, and just add new entry later....
667 SubScreen = Entry->me.SubScreen;
668 } // if/else
669 return SubScreen;
670 } // REFIT_MENU_SCREEN *InitializeSubScreen()
671
672 VOID GenerateSubScreen(LOADER_ENTRY *Entry, IN REFIT_VOLUME *Volume) {
673 REFIT_MENU_SCREEN *SubScreen;
674 LOADER_ENTRY *SubEntry;
675 CHAR16 *InitrdName;
676 CHAR16 DiagsFileName[256];
677 REFIT_FILE *File;
678 UINTN TokenCount;
679 CHAR16 **TokenList;
680
681 // create the submenu
682 if (StrLen(Entry->Title) == 0) {
683 MyFreePool(Entry->Title);
684 Entry->Title = NULL;
685 }
686 SubScreen = InitializeSubScreen(Entry);
687
688 // loader-specific submenu entries
689 if (Entry->OSType == 'M') { // entries for Mac OS X
690 #if defined(EFIX64)
691 SubEntry = InitializeLoaderEntry(Entry);
692 if (SubEntry != NULL) {
693 SubEntry->me.Title = L"Boot Mac OS X with a 64-bit kernel";
694 SubEntry->LoadOptions = L"arch=x86_64";
695 SubEntry->UseGraphicsMode = GlobalConfig.GraphicsFor & GRAPHICS_FOR_OSX;
696 AddMenuEntry(SubScreen, (REFIT_MENU_ENTRY *)SubEntry);
697 } // if
698
699 SubEntry = InitializeLoaderEntry(Entry);
700 if (SubEntry != NULL) {
701 SubEntry->me.Title = L"Boot Mac OS X with a 32-bit kernel";
702 SubEntry->LoadOptions = L"arch=i386";
703 SubEntry->UseGraphicsMode = GlobalConfig.GraphicsFor & GRAPHICS_FOR_OSX;
704 AddMenuEntry(SubScreen, (REFIT_MENU_ENTRY *)SubEntry);
705 } // if
706 #endif
707
708 if (!(GlobalConfig.HideUIFlags & HIDEUI_FLAG_SINGLEUSER)) {
709 SubEntry = InitializeLoaderEntry(Entry);
710 if (SubEntry != NULL) {
711 SubEntry->me.Title = L"Boot Mac OS X in verbose mode";
712 SubEntry->UseGraphicsMode = FALSE;
713 SubEntry->LoadOptions = L"-v";
714 AddMenuEntry(SubScreen, (REFIT_MENU_ENTRY *)SubEntry);
715 } // if
716
717 #if defined(EFIX64)
718 SubEntry = InitializeLoaderEntry(Entry);
719 if (SubEntry != NULL) {
720 SubEntry->me.Title = L"Boot Mac OS X in verbose mode (64-bit)";
721 SubEntry->UseGraphicsMode = FALSE;
722 SubEntry->LoadOptions = L"-v arch=x86_64";
723 AddMenuEntry(SubScreen, (REFIT_MENU_ENTRY *)SubEntry);
724 }
725
726 SubEntry = InitializeLoaderEntry(Entry);
727 if (SubEntry != NULL) {
728 SubEntry->me.Title = L"Boot Mac OS X in verbose mode (32-bit)";
729 SubEntry->UseGraphicsMode = FALSE;
730 SubEntry->LoadOptions = L"-v arch=i386";
731 AddMenuEntry(SubScreen, (REFIT_MENU_ENTRY *)SubEntry);
732 }
733 #endif
734
735 SubEntry = InitializeLoaderEntry(Entry);
736 if (SubEntry != NULL) {
737 SubEntry->me.Title = L"Boot Mac OS X in single user mode";
738 SubEntry->UseGraphicsMode = FALSE;
739 SubEntry->LoadOptions = L"-v -s";
740 AddMenuEntry(SubScreen, (REFIT_MENU_ENTRY *)SubEntry);
741 } // if
742 } // single-user mode allowed
743
744 if (!(GlobalConfig.HideUIFlags & HIDEUI_FLAG_SAFEMODE)) {
745 SubEntry = InitializeLoaderEntry(Entry);
746 if (SubEntry != NULL) {
747 SubEntry->me.Title = L"Boot Mac OS X in safe mode";
748 SubEntry->UseGraphicsMode = FALSE;
749 SubEntry->LoadOptions = L"-v -x";
750 AddMenuEntry(SubScreen, (REFIT_MENU_ENTRY *)SubEntry);
751 } // if
752 } // safe mode allowed
753
754 // check for Apple hardware diagnostics
755 StrCpy(DiagsFileName, L"System\\Library\\CoreServices\\.diagnostics\\diags.efi");
756 if (FileExists(Volume->RootDir, DiagsFileName) && !(GlobalConfig.HideUIFlags & HIDEUI_FLAG_HWTEST)) {
757 SubEntry = InitializeLoaderEntry(Entry);
758 if (SubEntry != NULL) {
759 SubEntry->me.Title = L"Run Apple Hardware Test";
760 MyFreePool(SubEntry->LoaderPath);
761 SubEntry->LoaderPath = StrDuplicate(DiagsFileName);
762 SubEntry->DevicePath = FileDevicePath(Volume->DeviceHandle, SubEntry->LoaderPath);
763 SubEntry->UseGraphicsMode = GlobalConfig.GraphicsFor & GRAPHICS_FOR_OSX;
764 AddMenuEntry(SubScreen, (REFIT_MENU_ENTRY *)SubEntry);
765 } // if
766 } // if diagnostics entry found
767
768 } else if (Entry->OSType == 'L') { // entries for Linux kernels with EFI stub loaders
769 File = ReadLinuxOptionsFile(Entry->LoaderPath, Volume);
770 if (File != NULL) {
771 InitrdName = FindInitrd(Entry->LoaderPath, Volume);
772 TokenCount = ReadTokenLine(File, &TokenList);
773 // first entry requires special processing, since it was initially set
774 // up with a default title but correct options by InitializeSubScreen(),
775 // earlier....
776 if ((SubScreen->Entries != NULL) && (SubScreen->Entries[0] != NULL)) {
777 MyFreePool(SubScreen->Entries[0]->Title);
778 SubScreen->Entries[0]->Title = TokenList[0] ? StrDuplicate(TokenList[0]) : StrDuplicate(L"Boot Linux");
779 } // if
780 FreeTokenLine(&TokenList, &TokenCount);
781 while ((TokenCount = ReadTokenLine(File, &TokenList)) > 1) {
782 SubEntry = InitializeLoaderEntry(Entry);
783 SubEntry->me.Title = TokenList[0] ? StrDuplicate(TokenList[0]) : StrDuplicate(L"Boot Linux");
784 MyFreePool(SubEntry->LoadOptions);
785 SubEntry->LoadOptions = AddInitrdToOptions(TokenList[1], InitrdName);
786 FreeTokenLine(&TokenList, &TokenCount);
787 SubEntry->UseGraphicsMode = GlobalConfig.GraphicsFor & GRAPHICS_FOR_LINUX;
788 AddMenuEntry(SubScreen, (REFIT_MENU_ENTRY *)SubEntry);
789 } // while
790 MyFreePool(InitrdName);
791 MyFreePool(File);
792 } // if
793
794 } else if (Entry->OSType == 'E') { // entries for ELILO
795 SubEntry = InitializeLoaderEntry(Entry);
796 if (SubEntry != NULL) {
797 SubEntry->me.Title = L"Run ELILO in interactive mode";
798 SubEntry->LoadOptions = L"-p";
799 SubEntry->UseGraphicsMode = GlobalConfig.GraphicsFor & GRAPHICS_FOR_ELILO;
800 AddMenuEntry(SubScreen, (REFIT_MENU_ENTRY *)SubEntry);
801 }
802
803 SubEntry = InitializeLoaderEntry(Entry);
804 if (SubEntry != NULL) {
805 SubEntry->me.Title = L"Boot Linux for a 17\" iMac or a 15\" MacBook Pro (*)";
806 SubEntry->UseGraphicsMode = TRUE;
807 SubEntry->LoadOptions = L"-d 0 i17";
808 SubEntry->UseGraphicsMode = GlobalConfig.GraphicsFor & GRAPHICS_FOR_ELILO;
809 AddMenuEntry(SubScreen, (REFIT_MENU_ENTRY *)SubEntry);
810 }
811
812 SubEntry = InitializeLoaderEntry(Entry);
813 if (SubEntry != NULL) {
814 SubEntry->me.Title = L"Boot Linux for a 20\" iMac (*)";
815 SubEntry->UseGraphicsMode = TRUE;
816 SubEntry->LoadOptions = L"-d 0 i20";
817 SubEntry->UseGraphicsMode = GlobalConfig.GraphicsFor & GRAPHICS_FOR_ELILO;
818 AddMenuEntry(SubScreen, (REFIT_MENU_ENTRY *)SubEntry);
819 }
820
821 SubEntry = InitializeLoaderEntry(Entry);
822 if (SubEntry != NULL) {
823 SubEntry->me.Title = L"Boot Linux for a Mac Mini (*)";
824 SubEntry->UseGraphicsMode = TRUE;
825 SubEntry->LoadOptions = L"-d 0 mini";
826 SubEntry->UseGraphicsMode = GlobalConfig.GraphicsFor & GRAPHICS_FOR_ELILO;
827 AddMenuEntry(SubScreen, (REFIT_MENU_ENTRY *)SubEntry);
828 }
829
830 AddMenuInfoLine(SubScreen, L"NOTE: This is an example. Entries");
831 AddMenuInfoLine(SubScreen, L"marked with (*) may not work.");
832
833 } else if (Entry->OSType == 'X') { // entries for xom.efi
834 // by default, skip the built-in selection and boot from hard disk only
835 Entry->LoadOptions = L"-s -h";
836
837 SubEntry = InitializeLoaderEntry(Entry);
838 if (SubEntry != NULL) {
839 SubEntry->me.Title = L"Boot Windows from Hard Disk";
840 SubEntry->LoadOptions = L"-s -h";
841 SubEntry->UseGraphicsMode = GlobalConfig.GraphicsFor & GRAPHICS_FOR_WINDOWS;
842 AddMenuEntry(SubScreen, (REFIT_MENU_ENTRY *)SubEntry);
843 }
844
845 SubEntry = InitializeLoaderEntry(Entry);
846 if (SubEntry != NULL) {
847 SubEntry->me.Title = L"Boot Windows from CD-ROM";
848 SubEntry->LoadOptions = L"-s -c";
849 SubEntry->UseGraphicsMode = GlobalConfig.GraphicsFor & GRAPHICS_FOR_WINDOWS;
850 AddMenuEntry(SubScreen, (REFIT_MENU_ENTRY *)SubEntry);
851 }
852
853 SubEntry = InitializeLoaderEntry(Entry);
854 if (SubEntry != NULL) {
855 SubEntry->me.Title = L"Run XOM in text mode";
856 SubEntry->UseGraphicsMode = FALSE;
857 SubEntry->LoadOptions = L"-v";
858 SubEntry->UseGraphicsMode = GlobalConfig.GraphicsFor & GRAPHICS_FOR_WINDOWS;
859 AddMenuEntry(SubScreen, (REFIT_MENU_ENTRY *)SubEntry);
860 }
861 } // entries for xom.efi
862 AddMenuEntry(SubScreen, &MenuEntryReturn);
863 Entry->me.SubScreen = SubScreen;
864 } // VOID GenerateSubScreen()
865
866 // Returns options for a Linux kernel. Reads them from an options file in the
867 // kernel's directory; and if present, adds an initrd= option for an initial
868 // RAM disk file with the same version number as the kernel file.
869 static CHAR16 * GetMainLinuxOptions(IN CHAR16 * LoaderPath, IN REFIT_VOLUME *Volume) {
870 CHAR16 *Options = NULL, *InitrdName, *FullOptions = NULL;
871
872 Options = GetFirstOptionsFromFile(LoaderPath, Volume);
873 InitrdName = FindInitrd(LoaderPath, Volume);
874 FullOptions = AddInitrdToOptions(Options, InitrdName);
875
876 MyFreePool(Options);
877 MyFreePool(InitrdName);
878 return (FullOptions);
879 } // static CHAR16 * GetMainLinuxOptions()
880
881 // Try to guess the name of the Linux distribution & add that name to
882 // OSIconName list.
883 static VOID GuessLinuxDistribution(CHAR16 **OSIconName, REFIT_VOLUME *Volume, CHAR16 *LoaderPath) {
884 UINTN FileSize = 0;
885 REFIT_FILE File;
886 CHAR16** TokenList;
887 UINTN TokenCount = 0;
888
889 // If on Linux root fs, /etc/os-release file probably has clues....
890 if (FileExists(Volume->RootDir, L"etc\\os-release") &&
891 (ReadFile(Volume->RootDir, L"etc\\os-release", &File, &FileSize) == EFI_SUCCESS)) {
892 do {
893 TokenCount = ReadTokenLine(&File, &TokenList);
894 if ((TokenCount > 1) && ((StriCmp(TokenList[0], L"ID") == 0) || (StriCmp(TokenList[0], L"NAME") == 0))) {
895 MergeStrings(OSIconName, TokenList[1], L',');
896 } // if
897 FreeTokenLine(&TokenList, &TokenCount);
898 } while (TokenCount > 0);
899 MyFreePool(File.Buffer);
900 } // if
901
902 // Search for clues in the kernel's filename....
903 if (StriSubCmp(L".fc", LoaderPath))
904 MergeStrings(OSIconName, L"fedora", L',');
905 if (StriSubCmp(L".el", LoaderPath))
906 MergeStrings(OSIconName, L"redhat", L',');
907 } // VOID GuessLinuxDistribution()
908
909 // Sets a few defaults for a loader entry -- mainly the icon, but also the OS type
910 // code and shortcut letter. For Linux EFI stub loaders, also sets kernel options
911 // that will (with luck) work fairly automatically.
912 VOID SetLoaderDefaults(LOADER_ENTRY *Entry, CHAR16 *LoaderPath, REFIT_VOLUME *Volume) {
913 CHAR16 *NameClues, *PathOnly, *NoExtension, *OSIconName = NULL, *Temp, *SubString;
914 CHAR16 ShortcutLetter = 0;
915 UINTN i = 0, Length;
916
917 NameClues = Basename(LoaderPath);
918 PathOnly = FindPath(LoaderPath);
919 NoExtension = StripEfiExtension(NameClues);
920
921 if (Volume->DiskKind == DISK_KIND_NET) {
922 MergeStrings(&NameClues, Entry->me.Title, L' ');
923 } else {
924 // locate a custom icon for the loader
925 // Anything found here takes precedence over the "hints" in the OSIconName variable
926 if (!Entry->me.Image) {
927 Entry->me.Image = egLoadIconAnyType(Volume->RootDir, PathOnly, NoExtension, GlobalConfig.IconSizes[ICON_SIZE_BIG]);
928 }
929 if (!Entry->me.Image) {
930 Entry->me.Image = egCopyImage(Volume->VolIconImage);
931 }
932
933 // Begin creating icon "hints" by using last part of directory path leading
934 // to the loader
935 Temp = FindLastDirName(LoaderPath);
936 MergeStrings(&OSIconName, Temp, L',');
937 MyFreePool(Temp);
938 Temp = NULL;
939 if (OSIconName != NULL) {
940 ShortcutLetter = OSIconName[0];
941 }
942
943 // Add every "word" in the volume label, delimited by spaces, dashes (-), or
944 // underscores (_), to the list of hints to be used in searching for OS
945 // icons.
946 if ((Volume->VolName) && (StrLen(Volume->VolName) > 0)) {
947 Temp = SubString = StrDuplicate(Volume->VolName);
948 if (Temp != NULL) {
949 Length = StrLen(Temp);
950 for (i = 0; i < Length; i++) {
951 if ((Temp[i] == L' ') || (Temp[i] == L'_') || (Temp[i] == L'-')) {
952 Temp[i] = 0;
953 if (StrLen(SubString) > 0)
954 MergeStrings(&OSIconName, SubString, L',');
955 SubString = Temp + i + 1;
956 } // if
957 } // for
958 MergeStrings(&OSIconName, SubString, L',');
959 MyFreePool(Temp);
960 } // if
961 } // if
962 } // if/else network boot
963
964 // detect specific loaders
965 if (StriSubCmp(L"bzImage", NameClues) || StriSubCmp(L"vmlinuz", NameClues)) {
966 if (Volume->DiskKind != DISK_KIND_NET) {
967 GuessLinuxDistribution(&OSIconName, Volume, LoaderPath);
968 Entry->LoadOptions = GetMainLinuxOptions(LoaderPath, Volume);
969 }
970 MergeStrings(&OSIconName, L"linux", L',');
971 Entry->OSType = 'L';
972 if (ShortcutLetter == 0)
973 ShortcutLetter = 'L';
974 Entry->UseGraphicsMode = GlobalConfig.GraphicsFor & GRAPHICS_FOR_LINUX;
975 } else if (StriSubCmp(L"refit", LoaderPath)) {
976 MergeStrings(&OSIconName, L"refit", L',');
977 Entry->OSType = 'R';
978 ShortcutLetter = 'R';
979 } else if (StriSubCmp(L"refind", LoaderPath)) {
980 MergeStrings(&OSIconName, L"refind", L',');
981 Entry->OSType = 'R';
982 ShortcutLetter = 'R';
983 } else if (StriCmp(LoaderPath, MACOSX_LOADER_PATH) == 0) {
984 MergeStrings(&OSIconName, L"mac", L',');
985 Entry->OSType = 'M';
986 ShortcutLetter = 'M';
987 Entry->UseGraphicsMode = GlobalConfig.GraphicsFor & GRAPHICS_FOR_OSX;
988 } else if (StriCmp(NameClues, L"diags.efi") == 0) {
989 MergeStrings(&OSIconName, L"hwtest", L',');
990 } else if (StriCmp(NameClues, L"e.efi") == 0 || StriCmp(NameClues, L"elilo.efi") == 0 || StriSubCmp(L"elilo", NameClues)) {
991 MergeStrings(&OSIconName, L"elilo,linux", L',');
992 Entry->OSType = 'E';
993 if (ShortcutLetter == 0)
994 ShortcutLetter = 'L';
995 Entry->UseGraphicsMode = GlobalConfig.GraphicsFor & GRAPHICS_FOR_ELILO;
996 } else if (StriSubCmp(L"grub", NameClues)) {
997 MergeStrings(&OSIconName, L"grub,linux", L',');
998 Entry->OSType = 'G';
999 ShortcutLetter = 'G';
1000 Entry->UseGraphicsMode = GlobalConfig.GraphicsFor & GRAPHICS_FOR_GRUB;
1001 } else if (StriCmp(NameClues, L"cdboot.efi") == 0 ||
1002 StriCmp(NameClues, L"bootmgr.efi") == 0 ||
1003 StriCmp(NameClues, L"bootmgfw.efi") == 0 ||
1004 StriCmp(NameClues, L"bkpbootmgfw.efi") == 0) {
1005 MergeStrings(&OSIconName, L"win8", L',');
1006 Entry->OSType = 'W';
1007 ShortcutLetter = 'W';
1008 Entry->UseGraphicsMode = GlobalConfig.GraphicsFor & GRAPHICS_FOR_WINDOWS;
1009 } else if (StriCmp(NameClues, L"xom.efi") == 0) {
1010 MergeStrings(&OSIconName, L"xom,win,win8", L',');
1011 Entry->UseGraphicsMode = TRUE;
1012 Entry->OSType = 'X';
1013 ShortcutLetter = 'W';
1014 Entry->UseGraphicsMode = GlobalConfig.GraphicsFor & GRAPHICS_FOR_WINDOWS;
1015 }
1016 else if (StriSubCmp(L"ipxe", NameClues)) {
1017 Entry->OSType = 'N';
1018 ShortcutLetter = 'N';
1019 MergeStrings(&OSIconName, L"network", L',');
1020 }
1021
1022 if ((ShortcutLetter >= 'a') && (ShortcutLetter <= 'z'))
1023 ShortcutLetter = ShortcutLetter - 'a' + 'A'; // convert lowercase to uppercase
1024 Entry->me.ShortcutLetter = ShortcutLetter;
1025 if (Entry->me.Image == NULL)
1026 Entry->me.Image = LoadOSIcon(OSIconName, L"unknown", FALSE);
1027 MyFreePool(PathOnly);
1028 } // VOID SetLoaderDefaults()
1029
1030 // Add a specified EFI boot loader to the list, using automatic settings
1031 // for icons, options, etc.
1032 LOADER_ENTRY * AddLoaderEntry(IN CHAR16 *LoaderPath, IN CHAR16 *LoaderTitle, IN REFIT_VOLUME *Volume) {
1033 LOADER_ENTRY *Entry;
1034
1035 CleanUpPathNameSlashes(LoaderPath);
1036 Entry = InitializeLoaderEntry(NULL);
1037 if (Entry != NULL) {
1038 Entry->Title = StrDuplicate((LoaderTitle != NULL) ? LoaderTitle : LoaderPath);
1039 Entry->me.Title = AllocateZeroPool(sizeof(CHAR16) * 256);
1040 // Extra space at end of Entry->me.Title enables searching on Volume->VolName even if another volume
1041 // name is identical except for something added to the end (e.g., VolB1 vs. VolB12).
1042 // Note: Volume->VolName will be NULL for network boot programs.
1043 if (Volume->VolName)
1044 SPrint(Entry->me.Title, 255, L"Boot %s from %s ", (LoaderTitle != NULL) ? LoaderTitle : LoaderPath, Volume->VolName);
1045 else
1046 SPrint(Entry->me.Title, 255, L"Boot %s ", (LoaderTitle != NULL) ? LoaderTitle : LoaderPath);
1047 Entry->me.Row = 0;
1048 Entry->me.BadgeImage = Volume->VolBadgeImage;
1049 if ((LoaderPath != NULL) && (LoaderPath[0] != L'\\')) {
1050 Entry->LoaderPath = StrDuplicate(L"\\");
1051 } else {
1052 Entry->LoaderPath = NULL;
1053 }
1054 MergeStrings(&(Entry->LoaderPath), LoaderPath, 0);
1055 Entry->VolName = Volume->VolName;
1056 Entry->DevicePath = FileDevicePath(Volume->DeviceHandle, Entry->LoaderPath);
1057 SetLoaderDefaults(Entry, LoaderPath, Volume);
1058 GenerateSubScreen(Entry, Volume);
1059 AddMenuEntry(&MainMenu, (REFIT_MENU_ENTRY *)Entry);
1060 }
1061
1062 return(Entry);
1063 } // LOADER_ENTRY * AddLoaderEntry()
1064
1065 // Returns -1 if (Time1 < Time2), +1 if (Time1 > Time2), or 0 if
1066 // (Time1 == Time2). Precision is only to the nearest second; since
1067 // this is used for sorting boot loader entries, differences smaller
1068 // than this are likely to be meaningless (and unlikely!).
1069 INTN TimeComp(IN EFI_TIME *Time1, IN EFI_TIME *Time2) {
1070 INT64 Time1InSeconds, Time2InSeconds;
1071
1072 // Following values are overestimates; I'm assuming 31 days in every month.
1073 // This is fine for the purpose of this function, which is limited
1074 Time1InSeconds = Time1->Second + (Time1->Minute * 60) + (Time1->Hour * 3600) + (Time1->Day * 86400) +
1075 (Time1->Month * 2678400) + ((Time1->Year - 1998) * 32140800);
1076 Time2InSeconds = Time2->Second + (Time2->Minute * 60) + (Time2->Hour * 3600) + (Time2->Day * 86400) +
1077 (Time2->Month * 2678400) + ((Time2->Year - 1998) * 32140800);
1078 if (Time1InSeconds < Time2InSeconds)
1079 return (-1);
1080 else if (Time1InSeconds > Time2InSeconds)
1081 return (1);
1082
1083 return 0;
1084 } // INTN TimeComp()
1085
1086 // Adds a loader list element, keeping it sorted by date. Returns the new
1087 // first element (the one with the most recent date).
1088 static struct LOADER_LIST * AddLoaderListEntry(struct LOADER_LIST *LoaderList, struct LOADER_LIST *NewEntry) {
1089 struct LOADER_LIST *LatestEntry, *CurrentEntry, *PrevEntry = NULL;
1090
1091 LatestEntry = CurrentEntry = LoaderList;
1092 if (LoaderList == NULL) {
1093 LatestEntry = NewEntry;
1094 } else {
1095 while ((CurrentEntry != NULL) && (TimeComp(&(NewEntry->TimeStamp), &(CurrentEntry->TimeStamp)) < 0)) {
1096 PrevEntry = CurrentEntry;
1097 CurrentEntry = CurrentEntry->NextEntry;
1098 } // while
1099 NewEntry->NextEntry = CurrentEntry;
1100 if (PrevEntry == NULL) {
1101 LatestEntry = NewEntry;
1102 } else {
1103 PrevEntry->NextEntry = NewEntry;
1104 } // if/else
1105 } // if/else
1106 return (LatestEntry);
1107 } // static VOID AddLoaderListEntry()
1108
1109 // Delete the LOADER_LIST linked list
1110 static VOID CleanUpLoaderList(struct LOADER_LIST *LoaderList) {
1111 struct LOADER_LIST *Temp;
1112
1113 while (LoaderList != NULL) {
1114 Temp = LoaderList;
1115 LoaderList = LoaderList->NextEntry;
1116 MyFreePool(Temp->FileName);
1117 MyFreePool(Temp);
1118 } // while
1119 } // static VOID CleanUpLoaderList()
1120
1121 // Returns FALSE if the specified file/volume matches the GlobalConfig.DontScanDirs
1122 // or GlobalConfig.DontScanVolumes specification, or if Path points to a volume
1123 // other than the one specified by Volume, or if the specified path is SelfDir.
1124 // Returns TRUE if none of these conditions is met -- that is, if the path is
1125 // eligible for scanning.
1126 static BOOLEAN ShouldScan(REFIT_VOLUME *Volume, CHAR16 *Path) {
1127 CHAR16 *VolName = NULL, *DontScanDir, *PathCopy = NULL;
1128 UINTN i = 0;
1129 BOOLEAN ScanIt = TRUE;
1130
1131 if ((IsIn(Volume->VolName, GlobalConfig.DontScanVolumes)) || (IsIn(Volume->PartName, GlobalConfig.DontScanVolumes)))
1132 return FALSE;
1133
1134 if ((StriCmp(Path, SelfDirPath) == 0) && (Volume->DeviceHandle == SelfVolume->DeviceHandle))
1135 return FALSE;
1136
1137 // See if Path includes an explicit volume declaration that's NOT Volume....
1138 PathCopy = StrDuplicate(Path);
1139 if (SplitVolumeAndFilename(&PathCopy, &VolName)) {
1140 VolumeNumberToName(Volume, &VolName);
1141 if (VolName && StriCmp(VolName, Volume->VolName) != 0) {
1142 ScanIt = FALSE;
1143 } // if
1144 } // if Path includes volume specification
1145 MyFreePool(PathCopy);
1146 MyFreePool(VolName);
1147 VolName = NULL;
1148
1149 // See if Volume is in GlobalConfig.DontScanDirs....
1150 while (ScanIt && (DontScanDir = FindCommaDelimited(GlobalConfig.DontScanDirs, i++))) {
1151 SplitVolumeAndFilename(&DontScanDir, &VolName);
1152 CleanUpPathNameSlashes(DontScanDir);
1153 VolumeNumberToName(Volume, &VolName);
1154 if (VolName != NULL) {
1155 if ((StriCmp(VolName, Volume->VolName) == 0) && (StriCmp(DontScanDir, Path) == 0))
1156 ScanIt = FALSE;
1157 } else {
1158 if (StriCmp(DontScanDir, Path) == 0)
1159 ScanIt = FALSE;
1160 }
1161 MyFreePool(DontScanDir);
1162 MyFreePool(VolName);
1163 DontScanDir = NULL;
1164 VolName = NULL;
1165 } // while()
1166
1167 return ScanIt;
1168 } // BOOLEAN ShouldScan()
1169
1170 // Returns TRUE if the file is byte-for-byte identical with the fallback file
1171 // on the volume AND if the file is not itself the fallback file; returns
1172 // FALSE if the file is not identical to the fallback file OR if the file
1173 // IS the fallback file. Intended for use in excluding the fallback boot
1174 // loader when it's a duplicate of another boot loader.
1175 static BOOLEAN DuplicatesFallback(IN REFIT_VOLUME *Volume, IN CHAR16 *FileName) {
1176 CHAR8 *FileContents, *FallbackContents;
1177 EFI_FILE_HANDLE FileHandle, FallbackHandle;
1178 EFI_FILE_INFO *FileInfo, *FallbackInfo;
1179 UINTN FileSize = 0, FallbackSize = 0;
1180 EFI_STATUS Status;
1181 BOOLEAN AreIdentical = FALSE;
1182
1183 if (!FileExists(Volume->RootDir, FileName) || !FileExists(Volume->RootDir, FALLBACK_FULLNAME))
1184 return FALSE;
1185
1186 CleanUpPathNameSlashes(FileName);
1187
1188 if (StriCmp(FileName, FALLBACK_FULLNAME) == 0)
1189 return FALSE; // identical filenames, so not a duplicate....
1190
1191 Status = refit_call5_wrapper(Volume->RootDir->Open, Volume->RootDir, &FileHandle, FileName, EFI_FILE_MODE_READ, 0);
1192 if (Status == EFI_SUCCESS) {
1193 FileInfo = LibFileInfo(FileHandle);
1194 FileSize = FileInfo->FileSize;
1195 } else {
1196 return FALSE;
1197 }
1198
1199 Status = refit_call5_wrapper(Volume->RootDir->Open, Volume->RootDir, &FallbackHandle, FALLBACK_FULLNAME, EFI_FILE_MODE_READ, 0);
1200 if (Status == EFI_SUCCESS) {
1201 FallbackInfo = LibFileInfo(FallbackHandle);
1202 FallbackSize = FallbackInfo->FileSize;
1203 } else {
1204 refit_call1_wrapper(FileHandle->Close, FileHandle);
1205 return FALSE;
1206 }
1207
1208 if (FallbackSize != FileSize) { // not same size, so can't be identical
1209 AreIdentical = FALSE;
1210 } else { // could be identical; do full check....
1211 FileContents = AllocatePool(FileSize);
1212 FallbackContents = AllocatePool(FallbackSize);
1213 if (FileContents && FallbackContents) {
1214 Status = refit_call3_wrapper(FileHandle->Read, FileHandle, &FileSize, FileContents);
1215 if (Status == EFI_SUCCESS) {
1216 Status = refit_call3_wrapper(FallbackHandle->Read, FallbackHandle, &FallbackSize, FallbackContents);
1217 }
1218 if (Status == EFI_SUCCESS) {
1219 AreIdentical = (CompareMem(FileContents, FallbackContents, FileSize) == 0);
1220 } // if
1221 } // if
1222 MyFreePool(FileContents);
1223 MyFreePool(FallbackContents);
1224 } // if/else
1225
1226 // BUG ALERT: Some systems (e.g., DUET, some Macs with large displays) crash if the
1227 // following two calls are reversed. Go figure....
1228 refit_call1_wrapper(FileHandle->Close, FallbackHandle);
1229 refit_call1_wrapper(FileHandle->Close, FileHandle);
1230 return AreIdentical;
1231 } // BOOLEAN DuplicatesFallback()
1232
1233 // Returns FALSE if two measures of file size are identical for a single file,
1234 // TRUE if not or if the file can't be opened and the other measure is non-0.
1235 // Despite the function's name, this isn't really a direct test of symbolic
1236 // link status, since EFI doesn't officially support symlinks. It does seem
1237 // to be a reliable indicator, though. (OTOH, some disk errors might cause a
1238 // file to fail to open, which would return a false positive -- but as I use
1239 // this function to exclude symbolic links from the list of boot loaders,
1240 // that would be fine, since such boot loaders wouldn't work.)
1241 static BOOLEAN IsSymbolicLink(REFIT_VOLUME *Volume, CHAR16 *Path, EFI_FILE_INFO *DirEntry) {
1242 EFI_FILE_HANDLE FileHandle;
1243 EFI_FILE_INFO *FileInfo = NULL;
1244 EFI_STATUS Status;
1245 UINTN FileSize2 = 0;
1246 CHAR16 *FileName;
1247
1248 FileName = StrDuplicate(Path);
1249 MergeStrings(&FileName, DirEntry->FileName, L'\\');
1250 CleanUpPathNameSlashes(FileName);
1251
1252 Status = refit_call5_wrapper(Volume->RootDir->Open, Volume->RootDir, &FileHandle, FileName, EFI_FILE_MODE_READ, 0);
1253 if (Status == EFI_SUCCESS) {
1254 FileInfo = LibFileInfo(FileHandle);
1255 if (FileInfo != NULL)
1256 FileSize2 = FileInfo->FileSize;
1257 }
1258
1259 MyFreePool(FileName);
1260 MyFreePool(FileInfo);
1261
1262 return (DirEntry->FileSize != FileSize2);
1263 } // BOOLEAN IsSymbolicLink()
1264
1265 // Returns TRUE if a file with the same name as the original but with
1266 // ".efi.signed" is also present in the same directory. Ubuntu is using
1267 // this filename as a signed version of the original unsigned kernel, and
1268 // there's no point in cluttering the display with two kernels that will
1269 // behave identically on non-SB systems, or when one will fail when SB
1270 // is active.
1271 static BOOLEAN HasSignedCounterpart(IN REFIT_VOLUME *Volume, IN CHAR16 *Path, IN CHAR16 *Filename) {
1272 CHAR16 *NewFile = NULL;
1273 BOOLEAN retval = FALSE;
1274
1275 MergeStrings(&NewFile, Path, 0);
1276 MergeStrings(&NewFile, Filename, L'\\');
1277 MergeStrings(&NewFile, L".efi.signed", 0);
1278 if (NewFile != NULL) {
1279 CleanUpPathNameSlashes(NewFile);
1280 if (FileExists(Volume->RootDir, NewFile))
1281 retval = TRUE;
1282 MyFreePool(NewFile);
1283 } // if
1284
1285 return retval;
1286 } // BOOLEAN HasSignedCounterpart()
1287
1288 // Scan an individual directory for EFI boot loader files and, if found,
1289 // add them to the list. Exception: Ignores FALLBACK_FULLNAME, which is picked
1290 // up in ScanEfiFiles(). Sorts the entries within the loader directory so that
1291 // the most recent one appears first in the list.
1292 // Returns TRUE if a duplicate for FALLBACK_FILENAME was found, FALSE if not.
1293 static BOOLEAN ScanLoaderDir(IN REFIT_VOLUME *Volume, IN CHAR16 *Path, IN CHAR16 *Pattern)
1294 {
1295 EFI_STATUS Status;
1296 REFIT_DIR_ITER DirIter;
1297 EFI_FILE_INFO *DirEntry;
1298 CHAR16 FileName[256], *Extension;
1299 struct LOADER_LIST *LoaderList = NULL, *NewLoader;
1300 BOOLEAN FoundFallbackDuplicate = FALSE;
1301
1302 if ((!SelfDirPath || !Path || ((StriCmp(Path, SelfDirPath) == 0) && (Volume->DeviceHandle != SelfVolume->DeviceHandle)) ||
1303 (StriCmp(Path, SelfDirPath) != 0)) && (ShouldScan(Volume, Path))) {
1304 // look through contents of the directory
1305 DirIterOpen(Volume->RootDir, Path, &DirIter);
1306 while (DirIterNext(&DirIter, 2, Pattern, &DirEntry)) {
1307 Extension = FindExtension(DirEntry->FileName);
1308 if (DirEntry->FileName[0] == '.' ||
1309 StriCmp(Extension, L".icns") == 0 ||
1310 StriCmp(Extension, L".png") == 0 ||
1311 (StriCmp(DirEntry->FileName, FALLBACK_BASENAME) == 0 && (StriCmp(Path, L"EFI\\BOOT") == 0)) ||
1312 StriSubCmp(L"shell", DirEntry->FileName) ||
1313 IsSymbolicLink(Volume, Path, DirEntry) || /* is symbolic link */
1314 HasSignedCounterpart(Volume, Path, DirEntry->FileName) || /* a file with same name plus ".efi.signed" is present */
1315 FilenameIn(Volume, Path, DirEntry->FileName, GlobalConfig.DontScanFiles))
1316 continue; // skip this
1317
1318 if (Path)
1319 SPrint(FileName, 255, L"\\%s\\%s", Path, DirEntry->FileName);
1320 else
1321 SPrint(FileName, 255, L"\\%s", DirEntry->FileName);
1322 CleanUpPathNameSlashes(FileName);
1323
1324 if(!IsValidLoader(Volume->RootDir, FileName))
1325 continue;
1326
1327 NewLoader = AllocateZeroPool(sizeof(struct LOADER_LIST));
1328 if (NewLoader != NULL) {
1329 NewLoader->FileName = StrDuplicate(FileName);
1330 NewLoader->TimeStamp = DirEntry->ModificationTime;
1331 LoaderList = AddLoaderListEntry(LoaderList, NewLoader);
1332 if (DuplicatesFallback(Volume, FileName))
1333 FoundFallbackDuplicate = TRUE;
1334 } // if
1335 MyFreePool(Extension);
1336 } // while
1337
1338 NewLoader = LoaderList;
1339 while (NewLoader != NULL) {
1340 AddLoaderEntry(NewLoader->FileName, NULL, Volume);
1341 NewLoader = NewLoader->NextEntry;
1342 } // while
1343
1344 CleanUpLoaderList(LoaderList);
1345 Status = DirIterClose(&DirIter);
1346 // NOTE: EFI_INVALID_PARAMETER really is an error that should be reported;
1347 // but I've gotten reports from users who are getting this error occasionally
1348 // and I can't find anything wrong or reproduce the problem, so I'm putting
1349 // it down to buggy EFI implementations and ignoring that particular error....
1350 if ((Status != EFI_NOT_FOUND) && (Status != EFI_INVALID_PARAMETER)) {
1351 if (Path)
1352 SPrint(FileName, 255, L"while scanning the %s directory", Path);
1353 else
1354 StrCpy(FileName, L"while scanning the root directory");
1355 CheckError(Status, FileName);
1356 } // if (Status != EFI_NOT_FOUND)
1357 } // if not scanning a blacklisted directory
1358
1359 return FoundFallbackDuplicate;
1360 } /* static VOID ScanLoaderDir() */
1361
1362 // Run the IPXE_DISCOVER_NAME program, which obtains the IP address of the boot
1363 // server and the name of the boot file it delivers.
1364 CHAR16* RuniPXEDiscover(EFI_HANDLE Volume)
1365 {
1366 EFI_STATUS Status;
1367 EFI_DEVICE_PATH *FilePath;
1368 EFI_HANDLE iPXEHandle;
1369 CHAR16 *boot_info = NULL;
1370 UINTN boot_info_size = 0;
1371
1372 FilePath = FileDevicePath (Volume, IPXE_DISCOVER_NAME);
1373 Status = refit_call6_wrapper(BS->LoadImage, FALSE, SelfImageHandle, FilePath,
1374 NULL, 0, &iPXEHandle);
1375 if (Status != 0)
1376 return NULL;
1377
1378 Status = refit_call3_wrapper(BS->StartImage, iPXEHandle, &boot_info_size, &boot_info);
1379
1380 return boot_info;
1381 } // RuniPXEDiscover()
1382
1383 // Scan for network (PXE) boot servers. This function relies on the presence
1384 // of the IPXE_DISCOVER_NAME and IPXE_NAME program files on the volume from
1385 // which rEFInd launched. As of December 6, 2014, these tools aren't entirely
1386 // reliable. See BUILDING.txt for information on building them.
1387 static VOID ScanNetboot() {
1388 CHAR16 *iPXEFileName = IPXE_NAME;
1389 CHAR16 *Location;
1390 REFIT_VOLUME *NetVolume;
1391
1392 if (FileExists(SelfVolume->RootDir, IPXE_DISCOVER_NAME) &&
1393 FileExists(SelfVolume->RootDir, IPXE_NAME) &&
1394 IsValidLoader(SelfVolume->RootDir, IPXE_DISCOVER_NAME) &&
1395 IsValidLoader(SelfVolume->RootDir, IPXE_NAME)) {
1396 Location = RuniPXEDiscover(SelfVolume->DeviceHandle);
1397 if (Location != NULL && FileExists(SelfVolume->RootDir, iPXEFileName)) {
1398 NetVolume = AllocatePool(sizeof(REFIT_VOLUME));
1399 CopyMem(NetVolume, SelfVolume, sizeof(REFIT_VOLUME));
1400 NetVolume->DiskKind = DISK_KIND_NET;
1401 NetVolume->VolBadgeImage = BuiltinIcon(BUILTIN_ICON_VOL_NET);
1402 NetVolume->PartName = NetVolume->VolName = NULL;
1403 AddLoaderEntry(iPXEFileName, Location, NetVolume);
1404 MyFreePool(NetVolume);
1405 } // if support files exist and are valid
1406 }
1407 } // VOID ScanNetBoot()
1408
1409 static VOID ScanEfiFiles(REFIT_VOLUME *Volume) {
1410 EFI_STATUS Status;
1411 REFIT_DIR_ITER EfiDirIter;
1412 EFI_FILE_INFO *EfiDirEntry;
1413 CHAR16 FileName[256], *Directory = NULL, *MatchPatterns, *VolName = NULL, *SelfPath;
1414 UINTN i, Length;
1415 BOOLEAN ScanFallbackLoader = TRUE;
1416 BOOLEAN FoundBRBackup = FALSE;
1417
1418 if ((Volume->RootDir != NULL) && (Volume->VolName != NULL) && (Volume->IsReadable)) {
1419 MatchPatterns = StrDuplicate(LOADER_MATCH_PATTERNS);
1420 if (GlobalConfig.ScanAllLinux)
1421 MergeStrings(&MatchPatterns, LINUX_MATCH_PATTERNS, L',');
1422
1423 // check for Mac OS X boot loader
1424 if (ShouldScan(Volume, MACOSX_LOADER_DIR)) {
1425 StrCpy(FileName, MACOSX_LOADER_PATH);
1426 if (FileExists(Volume->RootDir, FileName) && !FilenameIn(Volume, MACOSX_LOADER_DIR, L"boot.efi", GlobalConfig.DontScanFiles)) {
1427 AddLoaderEntry(FileName, L"Mac OS X", Volume);
1428 if (DuplicatesFallback(Volume, FileName))
1429 ScanFallbackLoader = FALSE;
1430 }
1431
1432 // check for XOM
1433 StrCpy(FileName, L"System\\Library\\CoreServices\\xom.efi");
1434 if (FileExists(Volume->RootDir, FileName) && !FilenameIn(Volume, MACOSX_LOADER_DIR, L"xom.efi", GlobalConfig.DontScanFiles)) {
1435 AddLoaderEntry(FileName, L"Windows XP (XoM)", Volume);
1436 if (DuplicatesFallback(Volume, FileName))
1437 ScanFallbackLoader = FALSE;
1438 }
1439 } // if should scan Mac directory
1440
1441 // check for Microsoft boot loader/menu
1442 if (ShouldScan(Volume, L"EFI\\Microsoft\\Boot")) {
1443 StrCpy(FileName, L"EFI\\Microsoft\\Boot\\bkpbootmgfw.efi");
1444 if (FileExists(Volume->RootDir, FileName) && !FilenameIn(Volume, L"EFI\\Microsoft\\Boot", L"bkpbootmgfw.efi",
1445 GlobalConfig.DontScanFiles)) {
1446 AddLoaderEntry(FileName, L"Microsoft EFI boot (Boot Repair backup)", Volume);
1447 FoundBRBackup = TRUE;
1448 if (DuplicatesFallback(Volume, FileName))
1449 ScanFallbackLoader = FALSE;
1450 }
1451 StrCpy(FileName, L"EFI\\Microsoft\\Boot\\bootmgfw.efi");
1452 if (FileExists(Volume->RootDir, FileName) && !FilenameIn(Volume, L"EFI\\Microsoft\\Boot", L"bootmgfw.efi", GlobalConfig.DontScanFiles)) {
1453 if (FoundBRBackup)
1454 AddLoaderEntry(FileName, L"Supposed Microsoft EFI boot (probably GRUB)", Volume);
1455 else
1456 AddLoaderEntry(FileName, L"Microsoft EFI boot", Volume);
1457 if (DuplicatesFallback(Volume, FileName))
1458 ScanFallbackLoader = FALSE;
1459 }
1460 } // if
1461
1462 // scan the root directory for EFI executables
1463 if (ScanLoaderDir(Volume, L"\\", MatchPatterns))
1464 ScanFallbackLoader = FALSE;
1465
1466 // scan subdirectories of the EFI directory (as per the standard)
1467 DirIterOpen(Volume->RootDir, L"EFI", &EfiDirIter);
1468 while (DirIterNext(&EfiDirIter, 1, NULL, &EfiDirEntry)) {
1469 if (StriCmp(EfiDirEntry->FileName, L"tools") == 0 || EfiDirEntry->FileName[0] == '.')
1470 continue; // skip this, doesn't contain boot loaders or is scanned later
1471 SPrint(FileName, 255, L"EFI\\%s", EfiDirEntry->FileName);
1472 if (ScanLoaderDir(Volume, FileName, MatchPatterns))
1473 ScanFallbackLoader = FALSE;
1474 } // while()
1475 Status = DirIterClose(&EfiDirIter);
1476 if ((Status != EFI_NOT_FOUND) && (Status != EFI_INVALID_PARAMETER))
1477 CheckError(Status, L"while scanning the EFI directory");
1478
1479 // Scan user-specified (or additional default) directories....
1480 i = 0;
1481 while ((Directory = FindCommaDelimited(GlobalConfig.AlsoScan, i++)) != NULL) {
1482 if (ShouldScan(Volume, Directory)) {
1483 SplitVolumeAndFilename(&Directory, &VolName);
1484 CleanUpPathNameSlashes(Directory);
1485 Length = StrLen(Directory);
1486 if ((Length > 0) && ScanLoaderDir(Volume, Directory, MatchPatterns))
1487 ScanFallbackLoader = FALSE;
1488 MyFreePool(VolName);
1489 } // if should scan dir
1490 MyFreePool(Directory);
1491 } // while
1492
1493 // Don't scan the fallback loader if it's on the same volume and a duplicate of rEFInd itself....
1494 SelfPath = DevicePathToStr(SelfLoadedImage->FilePath);
1495 CleanUpPathNameSlashes(SelfPath);
1496 if ((Volume->DeviceHandle == SelfLoadedImage->DeviceHandle) && DuplicatesFallback(Volume, SelfPath))
1497 ScanFallbackLoader = FALSE;
1498
1499 // If not a duplicate & if it exists & if it's not us, create an entry
1500 // for the fallback boot loader
1501 if (ScanFallbackLoader && FileExists(Volume->RootDir, FALLBACK_FULLNAME) && ShouldScan(Volume, L"EFI\\BOOT"))
1502 AddLoaderEntry(FALLBACK_FULLNAME, L"Fallback boot loader", Volume);
1503 } // if
1504 } // static VOID ScanEfiFiles()
1505
1506 // Scan internal disks for valid EFI boot loaders....
1507 static VOID ScanInternal(VOID) {
1508 UINTN VolumeIndex;
1509
1510 for (VolumeIndex = 0; VolumeIndex < VolumesCount; VolumeIndex++) {
1511 if (Volumes[VolumeIndex]->DiskKind == DISK_KIND_INTERNAL) {
1512 ScanEfiFiles(Volumes[VolumeIndex]);
1513 }
1514 } // for
1515 } // static VOID ScanInternal()
1516
1517 // Scan external disks for valid EFI boot loaders....
1518 static VOID ScanExternal(VOID) {
1519 UINTN VolumeIndex;
1520
1521 for (VolumeIndex = 0; VolumeIndex < VolumesCount; VolumeIndex++) {
1522 if (Volumes[VolumeIndex]->DiskKind == DISK_KIND_EXTERNAL) {
1523 ScanEfiFiles(Volumes[VolumeIndex]);
1524 }
1525 } // for
1526 } // static VOID ScanExternal()
1527
1528 // Scan internal disks for valid EFI boot loaders....
1529 static VOID ScanOptical(VOID) {
1530 UINTN VolumeIndex;
1531
1532 for (VolumeIndex = 0; VolumeIndex < VolumesCount; VolumeIndex++) {
1533 if (Volumes[VolumeIndex]->DiskKind == DISK_KIND_OPTICAL) {
1534 ScanEfiFiles(Volumes[VolumeIndex]);
1535 }
1536 } // for
1537 } // static VOID ScanOptical()
1538
1539 // default volume badge icon based on disk kind
1540 EG_IMAGE * GetDiskBadge(IN UINTN DiskType) {
1541 EG_IMAGE * Badge = NULL;
1542
1543 switch (DiskType) {
1544 case BBS_HARDDISK:
1545 Badge = BuiltinIcon(BUILTIN_ICON_VOL_INTERNAL);
1546 break;
1547 case BBS_USB:
1548 Badge = BuiltinIcon(BUILTIN_ICON_VOL_EXTERNAL);
1549 break;
1550 case BBS_CDROM:
1551 Badge = BuiltinIcon(BUILTIN_ICON_VOL_OPTICAL);
1552 break;
1553 } // switch()
1554 return Badge;
1555 } // EG_IMAGE * GetDiskBadge()
1556
1557 //
1558 // pre-boot tool functions
1559 //
1560
1561 static VOID StartTool(IN LOADER_ENTRY *Entry)
1562 {
1563 BeginExternalScreen(Entry->UseGraphicsMode, Entry->me.Title + 6); // assumes "Start <title>" as assigned below
1564 StoreLoaderName(Entry->me.Title);
1565 StartEFIImage(Entry->DevicePath, Entry->LoadOptions, TYPE_EFI,
1566 Basename(Entry->LoaderPath), Entry->OSType, NULL, TRUE, FALSE);
1567 FinishExternalScreen();
1568 } /* static VOID StartTool() */
1569
1570 static LOADER_ENTRY * AddToolEntry(EFI_HANDLE DeviceHandle, IN CHAR16 *LoaderPath, IN CHAR16 *LoaderTitle, IN EG_IMAGE *Image,
1571 IN CHAR16 ShortcutLetter, IN BOOLEAN UseGraphicsMode)
1572 {
1573 LOADER_ENTRY *Entry;
1574 CHAR16 *TitleStr = NULL;
1575
1576 Entry = AllocateZeroPool(sizeof(LOADER_ENTRY));
1577
1578 TitleStr = PoolPrint(L"Start %s", LoaderTitle);
1579 Entry->me.Title = TitleStr;
1580 Entry->me.Tag = TAG_TOOL;
1581 Entry->me.Row = 1;
1582 Entry->me.ShortcutLetter = ShortcutLetter;
1583 Entry->me.Image = Image;
1584 Entry->LoaderPath = (LoaderPath) ? StrDuplicate(LoaderPath) : NULL;
1585 Entry->DevicePath = FileDevicePath(DeviceHandle, Entry->LoaderPath);
1586 Entry->UseGraphicsMode = UseGraphicsMode;
1587
1588 AddMenuEntry(&MainMenu, (REFIT_MENU_ENTRY *)Entry);
1589 return Entry;
1590 } /* static LOADER_ENTRY * AddToolEntry() */
1591
1592 //
1593 // pre-boot driver functions
1594 //
1595
1596 static UINTN ScanDriverDir(IN CHAR16 *Path)
1597 {
1598 EFI_STATUS Status;
1599 REFIT_DIR_ITER DirIter;
1600 UINTN NumFound = 0;
1601 EFI_FILE_INFO *DirEntry;
1602 CHAR16 FileName[256];
1603
1604 CleanUpPathNameSlashes(Path);
1605 // look through contents of the directory
1606 DirIterOpen(SelfRootDir, Path, &DirIter);
1607 while (DirIterNext(&DirIter, 2, LOADER_MATCH_PATTERNS, &DirEntry)) {
1608 if (DirEntry->FileName[0] == '.')
1609 continue; // skip this
1610
1611 SPrint(FileName, 255, L"%s\\%s", Path, DirEntry->FileName);
1612 NumFound++;
1613 Status = StartEFIImage(FileDevicePath(SelfLoadedImage->DeviceHandle, FileName),
1614 L"", TYPE_EFI, DirEntry->FileName, 0, NULL, FALSE, TRUE);
1615 }
1616 Status = DirIterClose(&DirIter);
1617 if ((Status != EFI_NOT_FOUND) && (Status != EFI_INVALID_PARAMETER)) {
1618 SPrint(FileName, 255, L"while scanning the %s directory", Path);
1619 CheckError(Status, FileName);
1620 }
1621 return (NumFound);
1622 }
1623
1624 #ifdef __MAKEWITH_GNUEFI
1625 static EFI_STATUS ConnectAllDriversToAllControllers(VOID)
1626 {
1627 EFI_STATUS Status;
1628 UINTN AllHandleCount;
1629 EFI_HANDLE *AllHandleBuffer;
1630 UINTN Index;
1631 UINTN HandleCount;
1632 EFI_HANDLE *HandleBuffer;
1633 UINT32 *HandleType;
1634 UINTN HandleIndex;
1635 BOOLEAN Parent;
1636 BOOLEAN Device;
1637
1638 Status = LibLocateHandle(AllHandles,
1639 NULL,
1640 NULL,
1641 &AllHandleCount,
1642 &AllHandleBuffer);
1643 if (EFI_ERROR(Status))
1644 return Status;
1645
1646 for (Index = 0; Index < AllHandleCount; Index++) {
1647 //
1648 // Scan the handle database
1649 //
1650 Status = LibScanHandleDatabase(NULL,
1651 NULL,
1652 AllHandleBuffer[Index],
1653 NULL,
1654 &HandleCount,
1655 &HandleBuffer,
1656 &HandleType);
1657 if (EFI_ERROR (Status))
1658 goto Done;
1659
1660 Device = TRUE;
1661 if (HandleType[Index] & EFI_HANDLE_TYPE_DRIVER_BINDING_HANDLE)
1662 Device = FALSE;
1663 if (HandleType[Index] & EFI_HANDLE_TYPE_IMAGE_HANDLE)
1664 Device = FALSE;
1665
1666 if (Device) {
1667 Parent = FALSE;
1668 for (HandleIndex = 0; HandleIndex < HandleCount; HandleIndex++) {
1669 if (HandleType[HandleIndex] & EFI_HANDLE_TYPE_PARENT_HANDLE)
1670 Parent = TRUE;
1671 } // for
1672
1673 if (!Parent) {
1674 if (HandleType[Index] & EFI_HANDLE_TYPE_DEVICE_HANDLE) {
1675 Status = refit_call4_wrapper(BS->ConnectController,
1676 AllHandleBuffer[Index],
1677 NULL,
1678 NULL,
1679 TRUE);
1680 }
1681 }
1682 }
1683
1684 MyFreePool (HandleBuffer);
1685 MyFreePool (HandleType);
1686 }
1687
1688 Done:
1689 MyFreePool (AllHandleBuffer);
1690 return Status;
1691 } /* EFI_STATUS ConnectAllDriversToAllControllers() */
1692 #else
1693 static EFI_STATUS ConnectAllDriversToAllControllers(VOID) {
1694 BdsLibConnectAllDriversToAllControllers();
1695 return 0;
1696 }
1697 #endif
1698
1699 // Load all EFI drivers from rEFInd's "drivers" subdirectory and from the
1700 // directories specified by the user in the "scan_driver_dirs" configuration
1701 // file line.
1702 static VOID LoadDrivers(VOID)
1703 {
1704 CHAR16 *Directory, *SelfDirectory;
1705 UINTN i = 0, Length, NumFound = 0;
1706
1707 // load drivers from the subdirectories of rEFInd's home directory specified
1708 // in the DRIVER_DIRS constant.
1709 while ((Directory = FindCommaDelimited(DRIVER_DIRS, i++)) != NULL) {
1710 SelfDirectory = SelfDirPath ? StrDuplicate(SelfDirPath) : NULL;
1711 CleanUpPathNameSlashes(SelfDirectory);
1712 MergeStrings(&SelfDirectory, Directory, L'\\');
1713 NumFound += ScanDriverDir(SelfDirectory);
1714 MyFreePool(Directory);
1715 MyFreePool(SelfDirectory);
1716 }
1717
1718 // Scan additional user-specified driver directories....
1719 i = 0;
1720 while ((Directory = FindCommaDelimited(GlobalConfig.DriverDirs, i++)) != NULL) {
1721 CleanUpPathNameSlashes(Directory);
1722 Length = StrLen(Directory);
1723 if (Length > 0) {
1724 NumFound += ScanDriverDir(Directory);
1725 } // if
1726 MyFreePool(Directory);
1727 } // while
1728
1729 // connect all devices
1730 if (NumFound > 0) {
1731 ConnectAllDriversToAllControllers();
1732 }
1733 } /* static VOID LoadDrivers() */
1734
1735 // Locates boot loaders. NOTE: This assumes that GlobalConfig.LegacyType is set correctly.
1736 static VOID ScanForBootloaders(VOID) {
1737 UINTN i;
1738 CHAR8 s;
1739 BOOLEAN ScanForLegacy = FALSE;
1740
1741 // Determine up-front if we'll be scanning for legacy loaders....
1742 for (i = 0; i < NUM_SCAN_OPTIONS; i++) {
1743 s = GlobalConfig.ScanFor[i];
1744 if ((s == 'c') || (s == 'C') || (s == 'h') || (s == 'H') || (s == 'b') || (s == 'B'))
1745 ScanForLegacy = TRUE;
1746 } // for
1747
1748 // If UEFI & scanning for legacy loaders & deep legacy scan, update NVRAM boot manager list
1749 if ((GlobalConfig.LegacyType == LEGACY_TYPE_UEFI) && ScanForLegacy && GlobalConfig.DeepLegacyScan) {
1750 BdsDeleteAllInvalidLegacyBootOptions();
1751 BdsAddNonExistingLegacyBootOptions();
1752 } // if
1753
1754 // scan for loaders and tools, add them to the menu
1755 for (i = 0; i < NUM_SCAN_OPTIONS; i++) {
1756 switch(GlobalConfig.ScanFor[i]) {
1757 case 'c': case 'C':
1758 ScanLegacyDisc();
1759 break;
1760 case 'h': case 'H':
1761 ScanLegacyInternal();
1762 break;
1763 case 'b': case 'B':
1764 ScanLegacyExternal();
1765 break;
1766 case 'm': case 'M':
1767 ScanUserConfigured(GlobalConfig.ConfigFilename);
1768 break;
1769 case 'e': case 'E':
1770 ScanExternal();
1771 break;
1772 case 'i': case 'I':
1773 ScanInternal();
1774 break;
1775 case 'o': case 'O':
1776 ScanOptical();
1777 break;
1778 case 'n': case 'N':
1779 ScanNetboot();
1780 break;
1781 } // switch()
1782 } // for
1783
1784 // assign shortcut keys
1785 for (i = 0; i < MainMenu.EntryCount && MainMenu.Entries[i]->Row == 0 && i < 9; i++)
1786 MainMenu.Entries[i]->ShortcutDigit = (CHAR16)('1' + i);
1787
1788 // wait for user ACK when there were errors
1789 FinishTextScreen(FALSE);
1790 } // static VOID ScanForBootloaders()
1791
1792 // Locate a single tool from the specified Locations using one of the
1793 // specified Names and add it to the menu.
1794 static VOID FindTool(CHAR16 *Locations, CHAR16 *Names, CHAR16 *Description, UINTN Icon) {
1795 UINTN j = 0, k, VolumeIndex;
1796 CHAR16 *DirName, *FileName, *PathName, FullDescription[256];
1797
1798 while ((DirName = FindCommaDelimited(Locations, j++)) != NULL) {
1799 k = 0;
1800 while ((FileName = FindCommaDelimited(Names, k++)) != NULL) {
1801 PathName = StrDuplicate(DirName);
1802 MergeStrings(&PathName, FileName, (StriCmp(PathName, L"\\") == 0) ? 0 : L'\\');
1803 for (VolumeIndex = 0; VolumeIndex < VolumesCount; VolumeIndex++) {
1804 if ((Volumes[VolumeIndex]->RootDir != NULL) && (FileExists(Volumes[VolumeIndex]->RootDir, PathName)) &&
1805 IsValidLoader(Volumes[VolumeIndex]->RootDir, PathName)) {
1806 SPrint(FullDescription, 255, L"%s at %s on %s", Description, PathName, Volumes[VolumeIndex]->VolName);
1807 AddToolEntry(Volumes[VolumeIndex]->DeviceHandle, PathName, FullDescription, BuiltinIcon(Icon), 'S', FALSE);
1808 } // if
1809 } // for
1810 MyFreePool(PathName);
1811 MyFreePool(FileName);
1812 } // while Names
1813 MyFreePool(DirName);
1814 } // while Locations
1815 } // VOID FindTool()
1816
1817 // Add the second-row tags containing built-in and external tools (EFI shell,
1818 // reboot, etc.)
1819 static VOID ScanForTools(VOID) {
1820 CHAR16 *FileName = NULL, *VolName = NULL, *MokLocations, Description[256];
1821 REFIT_MENU_ENTRY *TempMenuEntry;
1822 UINTN i, j, VolumeIndex;
1823 UINT64 osind;
1824 CHAR8 *b = 0;
1825
1826 MokLocations = StrDuplicate(MOK_LOCATIONS);
1827 if (MokLocations != NULL)
1828 MergeStrings(&MokLocations, SelfDirPath, L',');
1829
1830 for (i = 0; i < NUM_TOOLS; i++) {
1831 switch(GlobalConfig.ShowTools[i]) {
1832 // NOTE: Be sure that FileName is NULL at the end of each case.
1833 case TAG_SHUTDOWN:
1834 TempMenuEntry = CopyMenuEntry(&MenuEntryShutdown);
1835 TempMenuEntry->Image = BuiltinIcon(BUILTIN_ICON_FUNC_SHUTDOWN);
1836 AddMenuEntry(&MainMenu, TempMenuEntry);
1837 break;
1838
1839 case TAG_REBOOT:
1840 TempMenuEntry = CopyMenuEntry(&MenuEntryReset);
1841 TempMenuEntry->Image = BuiltinIcon(BUILTIN_ICON_FUNC_RESET);
1842 AddMenuEntry(&MainMenu, TempMenuEntry);
1843 break;
1844
1845 case TAG_ABOUT:
1846 TempMenuEntry = CopyMenuEntry(&MenuEntryAbout);
1847 TempMenuEntry->Image = BuiltinIcon(BUILTIN_ICON_FUNC_ABOUT);
1848 AddMenuEntry(&MainMenu, TempMenuEntry);
1849 break;
1850
1851 case TAG_EXIT:
1852 TempMenuEntry = CopyMenuEntry(&MenuEntryExit);
1853 TempMenuEntry->Image = BuiltinIcon(BUILTIN_ICON_FUNC_EXIT);
1854 AddMenuEntry(&MainMenu, TempMenuEntry);
1855 break;
1856
1857 case TAG_FIRMWARE:
1858 if (EfivarGetRaw(&GlobalGuid, L"OsIndicationsSupported", &b, &j) == EFI_SUCCESS) {
1859 osind = (UINT64)*b;
1860 if (osind & EFI_OS_INDICATIONS_BOOT_TO_FW_UI) {
1861 TempMenuEntry = CopyMenuEntry(&MenuEntryFirmware);
1862 TempMenuEntry->Image = BuiltinIcon(BUILTIN_ICON_FUNC_FIRMWARE);
1863 AddMenuEntry(&MainMenu, TempMenuEntry);
1864 } // if
1865 } // if
1866 break;
1867
1868 case TAG_SHELL:
1869 j = 0;
1870 while ((FileName = FindCommaDelimited(SHELL_NAMES, j++)) != NULL) {
1871 if (FileExists(SelfRootDir, FileName) && IsValidLoader(SelfRootDir, FileName)) {
1872 AddToolEntry(SelfLoadedImage->DeviceHandle, FileName, L"EFI Shell", BuiltinIcon(BUILTIN_ICON_TOOL_SHELL),
1873 'S', FALSE);
1874 }
1875 MyFreePool(FileName);
1876 } // while
1877 break;
1878
1879 case TAG_GPTSYNC:
1880 j = 0;
1881 while ((FileName = FindCommaDelimited(GPTSYNC_NAMES, j++)) != NULL) {
1882 if (FileExists(SelfRootDir, FileName) && IsValidLoader(SelfRootDir, FileName)) {
1883 AddToolEntry(SelfLoadedImage->DeviceHandle, FileName, L"Hybrid MBR tool", BuiltinIcon(BUILTIN_ICON_TOOL_PART),
1884 'P', FALSE);
1885 } // if
1886 MyFreePool(FileName);
1887 } // while
1888 FileName = NULL;
1889 break;
1890
1891 case TAG_GDISK:
1892 j = 0;
1893 while ((FileName = FindCommaDelimited(GDISK_NAMES, j++)) != NULL) {
1894 if (FileExists(SelfRootDir, FileName) && IsValidLoader(SelfRootDir, FileName)) {
1895 AddToolEntry(SelfLoadedImage->DeviceHandle, FileName, L"disk partitioning tool",
1896 BuiltinIcon(BUILTIN_ICON_TOOL_PART), 'G', FALSE);
1897 } // if
1898 MyFreePool(FileName);
1899 } // while
1900 FileName = NULL;
1901 break;
1902
1903 case TAG_NETBOOT:
1904 j = 0;
1905 while ((FileName = FindCommaDelimited(NETBOOT_NAMES, j++)) != NULL) {
1906 if (FileExists(SelfRootDir, FileName) && IsValidLoader(SelfRootDir, FileName)) {
1907 AddToolEntry(SelfLoadedImage->DeviceHandle, FileName, L"Netboot",
1908 BuiltinIcon(BUILTIN_ICON_TOOL_NETBOOT), 'N', FALSE);
1909 } // if
1910 MyFreePool(FileName);
1911 } // while
1912 FileName = NULL;
1913 break;
1914
1915 case TAG_APPLE_RECOVERY:
1916 FileName = StrDuplicate(L"\\com.apple.recovery.boot\\boot.efi");
1917 for (VolumeIndex = 0; VolumeIndex < VolumesCount; VolumeIndex++) {
1918 if ((Volumes[VolumeIndex]->RootDir != NULL) && (FileExists(Volumes[VolumeIndex]->RootDir, FileName)) &&
1919 IsValidLoader(Volumes[VolumeIndex]->RootDir, FileName)) {
1920 SPrint(Description, 255, L"Apple Recovery on %s", Volumes[VolumeIndex]->VolName);
1921 AddToolEntry(Volumes[VolumeIndex]->DeviceHandle, FileName, Description,
1922 BuiltinIcon(BUILTIN_ICON_TOOL_APPLE_RESCUE), 'R', TRUE);
1923 } // if
1924 } // for
1925 MyFreePool(FileName);
1926 FileName = NULL;
1927 break;
1928
1929 case TAG_WINDOWS_RECOVERY:
1930 j = 0;
1931 while ((FileName = FindCommaDelimited(GlobalConfig.WindowsRecoveryFiles, j++)) != NULL) {
1932 SplitVolumeAndFilename(&FileName, &VolName);
1933 for (VolumeIndex = 0; VolumeIndex < VolumesCount; VolumeIndex++) {
1934 if ((Volumes[VolumeIndex]->RootDir != NULL) && (FileExists(Volumes[VolumeIndex]->RootDir, FileName)) &&
1935 IsValidLoader(Volumes[VolumeIndex]->RootDir, FileName) &&
1936 ((VolName == NULL) || (StriCmp(VolName, Volumes[VolumeIndex]->VolName) == 0))) {
1937 SPrint(Description, 255, L"Microsoft Recovery on %s", Volumes[VolumeIndex]->VolName);
1938 AddToolEntry(Volumes[VolumeIndex]->DeviceHandle, FileName, Description,
1939 BuiltinIcon(BUILTIN_ICON_TOOL_WINDOWS_RESCUE), 'R', TRUE);
1940 } // if
1941 } // for
1942 } // while
1943 MyFreePool(FileName);
1944 FileName = NULL;
1945 MyFreePool(VolName);
1946 VolName = NULL;
1947 break;
1948
1949 case TAG_MOK_TOOL:
1950 FindTool(MokLocations, MOK_NAMES, L"MOK utility", BUILTIN_ICON_TOOL_MOK_TOOL);
1951 break;
1952
1953 case TAG_MEMTEST:
1954 FindTool(MEMTEST_LOCATIONS, MEMTEST_NAMES, L"Memory test utility", BUILTIN_ICON_TOOL_MEMTEST);
1955 break;
1956
1957 } // switch()
1958 } // for
1959 } // static VOID ScanForTools
1960
1961 // Rescan for boot loaders
1962 static VOID RescanAll(BOOLEAN DisplayMessage) {
1963 EG_PIXEL BGColor;
1964
1965 BGColor.b = 255;
1966 BGColor.g = 175;
1967 BGColor.r = 100;
1968 BGColor.a = 0;
1969 if (DisplayMessage)
1970 egDisplayMessage(L"Scanning for new boot loaders; please wait....", &BGColor);
1971 FreeList((VOID ***) &(MainMenu.Entries), &MainMenu.EntryCount);
1972 MainMenu.Entries = NULL;
1973 MainMenu.EntryCount = 0;
1974 ReadConfig(GlobalConfig.ConfigFilename);
1975 ConnectAllDriversToAllControllers();
1976 ScanVolumes();
1977 ScanForBootloaders();
1978 ScanForTools();
1979 SetupScreen();
1980 } // VOID RescanAll()
1981
1982 #ifdef __MAKEWITH_TIANO
1983
1984 // Minimal initialization function
1985 static VOID InitializeLib(IN EFI_HANDLE ImageHandle, IN EFI_SYSTEM_TABLE *SystemTable) {
1986 gST = SystemTable;
1987 // gImageHandle = ImageHandle;
1988 gBS = SystemTable->BootServices;
1989 // gRS = SystemTable->RuntimeServices;
1990 gRT = SystemTable->RuntimeServices; // Some BDS functions need gRT to be set
1991 EfiGetSystemConfigurationTable (&gEfiDxeServicesTableGuid, (VOID **) &gDS);
1992
1993 // InitializeConsoleSim();
1994 }
1995
1996 #endif
1997
1998 // Set up our own Secure Boot extensions....
1999 // Returns TRUE on success, FALSE otherwise
2000 static BOOLEAN SecureBootSetup(VOID) {
2001 EFI_STATUS Status;
2002 BOOLEAN Success = FALSE;
2003
2004 if (secure_mode() && ShimLoaded()) {
2005 Status = security_policy_install();
2006 if (Status == EFI_SUCCESS) {
2007 Success = TRUE;
2008 } else {
2009 Print(L"Failed to install MOK Secure Boot extensions");
2010 }
2011 }
2012 return Success;
2013 } // VOID SecureBootSetup()
2014
2015 // Remove our own Secure Boot extensions....
2016 // Returns TRUE on success, FALSE otherwise
2017 static BOOLEAN SecureBootUninstall(VOID) {
2018 EFI_STATUS Status;
2019 BOOLEAN Success = TRUE;
2020
2021 if (secure_mode()) {
2022 Status = security_policy_uninstall();
2023 if (Status != EFI_SUCCESS) {
2024 Success = FALSE;
2025 BeginTextScreen(L"Secure Boot Policy Failure");
2026 Print(L"Failed to uninstall MOK Secure Boot extensions; forcing a reboot.");
2027 PauseForKey();
2028 refit_call4_wrapper(RT->ResetSystem, EfiResetCold, EFI_SUCCESS, 0, NULL);
2029 }
2030 }
2031 return Success;
2032 } // VOID SecureBootUninstall
2033
2034 // Sets the global configuration filename; will be CONFIG_FILE_NAME unless the
2035 // "-c" command-line option is set, in which case that takes precedence.
2036 // If an error is encountered, leaves the value alone (it should be set to
2037 // CONFIG_FILE_NAME when GlobalConfig is initialized).
2038 static VOID SetConfigFilename(EFI_HANDLE ImageHandle) {
2039 EFI_LOADED_IMAGE *Info;
2040 CHAR16 *Options, *FileName;
2041 EFI_STATUS Status;
2042 INTN Where;
2043
2044 Status = refit_call3_wrapper(BS->HandleProtocol, ImageHandle, &LoadedImageProtocol, (VOID **) &Info);
2045 if ((Status == EFI_SUCCESS) && (Info->LoadOptionsSize > 0)) {
2046 Options = (CHAR16 *) Info->LoadOptions;
2047 Where = FindSubString(L" -c ", Options);
2048 if (Where >= 0) {
2049 FileName = StrDuplicate(&Options[Where + 4]);
2050 Where = FindSubString(L" ", FileName);
2051 if (Where > 0)
2052 FileName[Where] = L'\0';
2053
2054 if (FileExists(SelfDir, FileName)) {
2055 GlobalConfig.ConfigFilename = FileName;
2056 } else {
2057 Print(L"Specified configuration file (%s) doesn't exist; using\n'refind.conf' default\n", FileName);
2058 MyFreePool(FileName);
2059 } // if/else
2060 } // if
2061 } // if
2062 } // VOID SetConfigFilename()
2063
2064 //
2065 // main entry point
2066 //
2067 EFI_STATUS
2068 EFIAPI
2069 efi_main (EFI_HANDLE ImageHandle, EFI_SYSTEM_TABLE *SystemTable)
2070 {
2071 EFI_STATUS Status;
2072 BOOLEAN MainLoopRunning = TRUE;
2073 BOOLEAN MokProtocol;
2074 REFIT_MENU_ENTRY *ChosenEntry;
2075 UINTN MenuExit, i;
2076 CHAR16 *SelectionName = NULL;
2077 EG_PIXEL BGColor;
2078
2079 // bootstrap
2080 InitializeLib(ImageHandle, SystemTable);
2081 Status = InitRefitLib(ImageHandle);
2082 if (EFI_ERROR(Status))
2083 return Status;
2084
2085 // read configuration
2086 CopyMem(GlobalConfig.ScanFor, "ieom ", NUM_SCAN_OPTIONS);
2087 FindLegacyBootType();
2088 if (GlobalConfig.LegacyType == LEGACY_TYPE_MAC)
2089 CopyMem(GlobalConfig.ScanFor, "ihebocm ", NUM_SCAN_OPTIONS);
2090 SetConfigFilename(ImageHandle);
2091 ReadConfig(GlobalConfig.ConfigFilename);
2092
2093 InitScreen();
2094 WarnIfLegacyProblems();
2095 MainMenu.TimeoutSeconds = GlobalConfig.Timeout;
2096
2097 // disable EFI watchdog timer
2098 refit_call4_wrapper(BS->SetWatchdogTimer, 0x0000, 0x0000, 0x0000, NULL);
2099
2100 // further bootstrap (now with config available)
2101 MokProtocol = SecureBootSetup();
2102 LoadDrivers();
2103 ScanVolumes();
2104 ScanForBootloaders();
2105 ScanForTools();
2106 SetupScreen();
2107
2108 if (GlobalConfig.ScanDelay > 0) {
2109 BGColor.b = 255;
2110 BGColor.g = 175;
2111 BGColor.r = 100;
2112 BGColor.a = 0;
2113 if (GlobalConfig.ScanDelay > 1)
2114 egDisplayMessage(L"Pausing before disk scan; please wait....", &BGColor);
2115 for (i = 0; i < GlobalConfig.ScanDelay; i++)
2116 refit_call1_wrapper(BS->Stall, 1000000);
2117 RescanAll(GlobalConfig.ScanDelay > 1);
2118 } // if
2119
2120 if (GlobalConfig.DefaultSelection)
2121 SelectionName = StrDuplicate(GlobalConfig.DefaultSelection);
2122
2123 while (MainLoopRunning) {
2124 MenuExit = RunMainMenu(&MainMenu, &SelectionName, &ChosenEntry);
2125
2126 // The Escape key triggers a re-scan operation....
2127 if (MenuExit == MENU_EXIT_ESCAPE) {
2128 MenuExit = 0;
2129 RescanAll(TRUE);
2130 continue;
2131 }
2132
2133 switch (ChosenEntry->Tag) {
2134
2135 case TAG_REBOOT: // Reboot
2136 TerminateScreen();
2137 refit_call4_wrapper(RT->ResetSystem, EfiResetCold, EFI_SUCCESS, 0, NULL);
2138 MainLoopRunning = FALSE; // just in case we get this far
2139 break;
2140
2141 case TAG_SHUTDOWN: // Shut Down
2142 TerminateScreen();
2143 refit_call4_wrapper(RT->ResetSystem, EfiResetShutdown, EFI_SUCCESS, 0, NULL);
2144 MainLoopRunning = FALSE; // just in case we get this far
2145 break;
2146
2147 case TAG_ABOUT: // About rEFInd
2148 AboutrEFInd();
2149 break;
2150
2151 case TAG_LOADER: // Boot OS via .EFI loader
2152 StartLoader((LOADER_ENTRY *)ChosenEntry, SelectionName);
2153 break;
2154
2155 case TAG_LEGACY: // Boot legacy OS
2156 StartLegacy((LEGACY_ENTRY *)ChosenEntry, SelectionName);
2157 break;
2158
2159 case TAG_LEGACY_UEFI: // Boot a legacy OS on a non-Mac
2160 StartLegacyUEFI((LEGACY_ENTRY *)ChosenEntry, SelectionName);
2161 break;
2162
2163 case TAG_TOOL: // Start a EFI tool
2164 StartTool((LOADER_ENTRY *)ChosenEntry);
2165 break;
2166
2167 case TAG_EXIT: // Terminate rEFInd
2168 if ((MokProtocol) && !SecureBootUninstall()) {
2169 MainLoopRunning = FALSE; // just in case we get this far
2170 } else {
2171 BeginTextScreen(L" ");
2172 return EFI_SUCCESS;
2173 }
2174 break;
2175
2176 case TAG_FIRMWARE: // Reboot into firmware's user interface
2177 RebootIntoFirmware();
2178 break;
2179
2180 } // switch()
2181 } // while()
2182
2183 // If we end up here, things have gone wrong. Try to reboot, and if that
2184 // fails, go into an endless loop.
2185 refit_call4_wrapper(RT->ResetSystem, EfiResetCold, EFI_SUCCESS, 0, NULL);
2186 EndlessIdleLoop();
2187
2188 return EFI_SUCCESS;
2189 } /* efi_main() */