mirror of
https://github.com/dortania/OpenCore-Legacy-Patcher.git
synced 2026-04-23 19:40:15 +10:00
Update binaries to release build
This commit is contained in:
@@ -1,6 +1,9 @@
|
|||||||
# OpenCore Legacy Patcher changelog
|
# OpenCore Legacy Patcher changelog
|
||||||
|
|
||||||
## 0.3.1
|
## 0.3.1
|
||||||
|
- Increment Binaries:
|
||||||
|
- OpenCorePkg 0.7.4 release
|
||||||
|
- RestrictEvents 1.0.5 release
|
||||||
|
|
||||||
## 0.3.0
|
## 0.3.0
|
||||||
- Fix Nvidia Tesla Acceleration in Monterey Beta 7+
|
- Fix Nvidia Tesla Acceleration in Monterey Beta 7+
|
||||||
|
|||||||
@@ -1540,7 +1540,7 @@
|
|||||||
<key>ScanPolicy</key>
|
<key>ScanPolicy</key>
|
||||||
<integer>0</integer>
|
<integer>0</integer>
|
||||||
<key>SecureBootModel</key>
|
<key>SecureBootModel</key>
|
||||||
<string>j137</string>
|
<string>Default</string>
|
||||||
<key>Vault</key>
|
<key>Vault</key>
|
||||||
<string>Optional</string>
|
<string>Optional</string>
|
||||||
</dict>
|
</dict>
|
||||||
@@ -1849,6 +1849,8 @@
|
|||||||
<key>Drivers</key>
|
<key>Drivers</key>
|
||||||
<array>
|
<array>
|
||||||
<dict>
|
<dict>
|
||||||
|
<key>Comment</key>
|
||||||
|
<string></string>
|
||||||
<key>Path</key>
|
<key>Path</key>
|
||||||
<string>OpenRuntime.efi</string>
|
<string>OpenRuntime.efi</string>
|
||||||
<key>Enabled</key>
|
<key>Enabled</key>
|
||||||
@@ -1857,6 +1859,8 @@
|
|||||||
<string></string>
|
<string></string>
|
||||||
</dict>
|
</dict>
|
||||||
<dict>
|
<dict>
|
||||||
|
<key>Comment</key>
|
||||||
|
<string></string>
|
||||||
<key>Path</key>
|
<key>Path</key>
|
||||||
<string>OpenCanopy.efi</string>
|
<string>OpenCanopy.efi</string>
|
||||||
<key>Enabled</key>
|
<key>Enabled</key>
|
||||||
@@ -1865,6 +1869,8 @@
|
|||||||
<string></string>
|
<string></string>
|
||||||
</dict>
|
</dict>
|
||||||
<dict>
|
<dict>
|
||||||
|
<key>Comment</key>
|
||||||
|
<string></string>
|
||||||
<key>Path</key>
|
<key>Path</key>
|
||||||
<string>NvmExpressDxe.efi</string>
|
<string>NvmExpressDxe.efi</string>
|
||||||
<key>Enabled</key>
|
<key>Enabled</key>
|
||||||
@@ -1873,6 +1879,8 @@
|
|||||||
<string></string>
|
<string></string>
|
||||||
</dict>
|
</dict>
|
||||||
<dict>
|
<dict>
|
||||||
|
<key>Comment</key>
|
||||||
|
<string></string>
|
||||||
<key>Path</key>
|
<key>Path</key>
|
||||||
<string>ExFatDxeLegacy.efi</string>
|
<string>ExFatDxeLegacy.efi</string>
|
||||||
<key>Enabled</key>
|
<key>Enabled</key>
|
||||||
@@ -1881,6 +1889,8 @@
|
|||||||
<string></string>
|
<string></string>
|
||||||
</dict>
|
</dict>
|
||||||
<dict>
|
<dict>
|
||||||
|
<key>Comment</key>
|
||||||
|
<string></string>
|
||||||
<key>Path</key>
|
<key>Path</key>
|
||||||
<string>XhciDxe.efi</string>
|
<string>XhciDxe.efi</string>
|
||||||
<key>Enabled</key>
|
<key>Enabled</key>
|
||||||
@@ -1889,6 +1899,8 @@
|
|||||||
<string></string>
|
<string></string>
|
||||||
</dict>
|
</dict>
|
||||||
<dict>
|
<dict>
|
||||||
|
<key>Comment</key>
|
||||||
|
<string></string>
|
||||||
<key>Path</key>
|
<key>Path</key>
|
||||||
<string>OpenLinuxBoot.efi</string>
|
<string>OpenLinuxBoot.efi</string>
|
||||||
<key>Enabled</key>
|
<key>Enabled</key>
|
||||||
|
|||||||
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
@@ -100,8 +100,6 @@ class BuildOpenCore:
|
|||||||
("Lilu.kext", self.constants.lilu_version, self.constants.lilu_path, lambda: True),
|
("Lilu.kext", self.constants.lilu_version, self.constants.lilu_path, lambda: True),
|
||||||
("WhateverGreen.kext", self.constants.whatevergreen_version, self.constants.whatevergreen_path, lambda: self.constants.allow_oc_everywhere is False and self.constants.serial_settings != "None"),
|
("WhateverGreen.kext", self.constants.whatevergreen_version, self.constants.whatevergreen_path, lambda: self.constants.allow_oc_everywhere is False and self.constants.serial_settings != "None"),
|
||||||
("RestrictEvents.kext", self.constants.restrictevents_version, self.constants.restrictevents_path, lambda: self.model in model_array.MacPro),
|
("RestrictEvents.kext", self.constants.restrictevents_version, self.constants.restrictevents_path, lambda: self.model in model_array.MacPro),
|
||||||
# Modded RestrictEvents with displaypolicyd blocked to fix dGPU switching
|
|
||||||
("RestrictEvents.kext", self.constants.restrictevents_mbp_version, self.constants.restrictevents_mbp_path, lambda: self.model in ["MacBookPro6,1", "MacBookPro6,2", "MacBookPro9,1"]),
|
|
||||||
("SMC-Spoof.kext", self.constants.smcspoof_version, self.constants.smcspoof_path, lambda: self.constants.allow_oc_everywhere is False and self.constants.serial_settings != "None"),
|
("SMC-Spoof.kext", self.constants.smcspoof_version, self.constants.smcspoof_path, lambda: self.constants.allow_oc_everywhere is False and self.constants.serial_settings != "None"),
|
||||||
# CPU patches
|
# CPU patches
|
||||||
("AppleMCEReporterDisabler.kext", self.constants.mce_version, self.constants.mce_path, lambda: (self.model.startswith("MacPro") or self.model.startswith("Xserve")) and self.constants.serial_settings != "None"),
|
("AppleMCEReporterDisabler.kext", self.constants.mce_version, self.constants.mce_path, lambda: (self.model.startswith("MacPro") or self.model.startswith("Xserve")) and self.constants.serial_settings != "None"),
|
||||||
@@ -167,6 +165,14 @@ class BuildOpenCore:
|
|||||||
# Required for Lilu in 11.0+
|
# Required for Lilu in 11.0+
|
||||||
self.config["Kernel"]["Quirks"]["DisableLinkeditJettison"] = True
|
self.config["Kernel"]["Quirks"]["DisableLinkeditJettison"] = True
|
||||||
|
|
||||||
|
if self.model in ["MacBookPro6,1", "MacBookPro6,2", "MacBookPro9,1", "MacBookPro10,1"]:
|
||||||
|
# Modded RestrictEvents with displaypolicyd blocked to fix dGPU switching
|
||||||
|
if self.model in ["MacBookPro6,1", "MacBookPro6,2", "MacBookPro9,1"]:
|
||||||
|
self.enable_kext("RestrictEvents.kext", self.constants.restrictevents_version, self.constants.restrictevents_path)
|
||||||
|
elif self.constants.serial_settings == "None":
|
||||||
|
# MacBookPro10,1 without SMBIOS spoof needs RestrictEvents
|
||||||
|
self.enable_kext("RestrictEvents.kext", self.constants.restrictevents_version, self.constants.restrictevents_path)
|
||||||
|
|
||||||
# Ethernet Patch Sets
|
# Ethernet Patch Sets
|
||||||
if smbios_data.smbios_dictionary[self.model]["Ethernet Chipset"] == "Broadcom":
|
if smbios_data.smbios_dictionary[self.model]["Ethernet Chipset"] == "Broadcom":
|
||||||
if smbios_data.smbios_dictionary[self.model]["CPU Generation"] < cpu_data.cpu_data.ivy_bridge.value:
|
if smbios_data.smbios_dictionary[self.model]["CPU Generation"] < cpu_data.cpu_data.ivy_bridge.value:
|
||||||
@@ -174,13 +180,6 @@ class BuildOpenCore:
|
|||||||
# Applicable for pre-Ivy Bridge models
|
# Applicable for pre-Ivy Bridge models
|
||||||
self.enable_kext("CatalinaBCM5701Ethernet.kext", self.constants.bcm570_version, self.constants.bcm570_path)
|
self.enable_kext("CatalinaBCM5701Ethernet.kext", self.constants.bcm570_version, self.constants.bcm570_path)
|
||||||
|
|
||||||
if self.constants.allow_oc_everywhere is False and self.constants.serial_settings != "None":
|
|
||||||
if (smbios_data.smbios_dictionary[generate_smbios.set_smbios_model_spoof(self.model) or self.constants.override_smbios]["SecureBootModel"]) != None:
|
|
||||||
# Monterey T2 SMBIOS don't get OS updates without a T2 SBM
|
|
||||||
# Forces VMM patch instead
|
|
||||||
if self.get_kext_by_bundle_path("RestrictEvents.kext")["Enabled"] is False:
|
|
||||||
self.enable_kext("RestrictEvents.kext", self.constants.restrictevents_version, self.constants.restrictevents_path)
|
|
||||||
|
|
||||||
if smbios_data.smbios_dictionary[self.model]["CPU Generation"] <= cpu_data.cpu_data.sandy_bridge.value:
|
if smbios_data.smbios_dictionary[self.model]["CPU Generation"] <= cpu_data.cpu_data.sandy_bridge.value:
|
||||||
# Ref: https://github.com/reenigneorcim/SurPlus
|
# Ref: https://github.com/reenigneorcim/SurPlus
|
||||||
# Enable for all systems missing RDRAND support
|
# Enable for all systems missing RDRAND support
|
||||||
@@ -740,6 +739,10 @@ class BuildOpenCore:
|
|||||||
if self.constants.secure_status is False:
|
if self.constants.secure_status is False:
|
||||||
print("- Disabling SecureBootModel")
|
print("- Disabling SecureBootModel")
|
||||||
self.config["Misc"]["Security"]["SecureBootModel"] = "Disabled"
|
self.config["Misc"]["Security"]["SecureBootModel"] = "Disabled"
|
||||||
|
if self.constants.force_vmm is True:
|
||||||
|
print("- Forcing VMM patchset to support OTA updates")
|
||||||
|
self.get_item_by_kv(self.config["Kernel"]["Patch"], "Comment", "Reroute kern.hv_vmm_present patch (1)")["Enabled"] = True
|
||||||
|
self.get_item_by_kv(self.config["Kernel"]["Patch"], "Comment", "Reroute kern.hv_vmm_present patch (2)")["Enabled"] = True
|
||||||
if self.constants.serial_settings in ["Moderate", "Advanced"]:
|
if self.constants.serial_settings in ["Moderate", "Advanced"]:
|
||||||
print("- Enabling USB Rename Patches")
|
print("- Enabling USB Rename Patches")
|
||||||
self.get_item_by_kv(self.config["ACPI"]["Patch"], "Comment", "XHC1 to SHC1")["Enabled"] = True
|
self.get_item_by_kv(self.config["ACPI"]["Patch"], "Comment", "XHC1 to SHC1")["Enabled"] = True
|
||||||
|
|||||||
@@ -20,8 +20,8 @@ class Constants:
|
|||||||
|
|
||||||
# OpenCore Versioning
|
# OpenCore Versioning
|
||||||
# https://github.com/acidanthera/OpenCorePkg
|
# https://github.com/acidanthera/OpenCorePkg
|
||||||
self.opencore_commit = "ff4b099 - 09-06-2021"
|
self.opencore_commit = "bd3f7a1 - 10-04-2021"
|
||||||
self.opencore_version = "0.7.3"
|
self.opencore_version = "0.7.4"
|
||||||
|
|
||||||
# Kext Versioning
|
# Kext Versioning
|
||||||
## Acidanthera
|
## Acidanthera
|
||||||
@@ -157,6 +157,7 @@ class Constants:
|
|||||||
self.force_latest_psp = False # Force latest PatcherSupportPkg
|
self.force_latest_psp = False # Force latest PatcherSupportPkg
|
||||||
self.disable_msr_power_ctl = False # Disable MSR Power Control (missing battery throttling)
|
self.disable_msr_power_ctl = False # Disable MSR Power Control (missing battery throttling)
|
||||||
self.software_demux = False # Enable Software Demux patch set
|
self.software_demux = False # Enable Software Demux patch set
|
||||||
|
self.force_vmm = False # Force VMM patch
|
||||||
|
|
||||||
# OS Versions
|
# OS Versions
|
||||||
## Based off Major Kernel Version
|
## Based off Major Kernel Version
|
||||||
|
|||||||
@@ -1,6 +1,6 @@
|
|||||||
# Generate Default Data
|
# Generate Default Data
|
||||||
from resources import utilities, device_probe
|
from resources import utilities, device_probe, generate_smbios
|
||||||
from data import model_array
|
from data import model_array, smbios_data
|
||||||
|
|
||||||
|
|
||||||
class generate_defaults:
|
class generate_defaults:
|
||||||
@@ -52,10 +52,6 @@ class generate_defaults:
|
|||||||
settings.sip_status = False
|
settings.sip_status = False
|
||||||
# settings.secure_status = True # Monterey
|
# settings.secure_status = True # Monterey
|
||||||
settings.allow_fv_root = True # Allow FileVault on broken seal
|
settings.allow_fv_root = True # Allow FileVault on broken seal
|
||||||
else:
|
|
||||||
settings.sip_status = True
|
|
||||||
# settings.secure_status = True # Monterey
|
|
||||||
settings.amfi_status = True
|
|
||||||
else:
|
else:
|
||||||
settings.sip_status = False # Unsigned kexts
|
settings.sip_status = False # Unsigned kexts
|
||||||
settings.secure_status = False # Root volume modified
|
settings.secure_status = False # Root volume modified
|
||||||
@@ -87,3 +83,22 @@ class generate_defaults:
|
|||||||
|
|
||||||
# Check if running in RecoveryOS
|
# Check if running in RecoveryOS
|
||||||
settings.recovery_status = utilities.check_recovery()
|
settings.recovery_status = utilities.check_recovery()
|
||||||
|
|
||||||
|
# Check if model uses T2 SMBIOS, if so see if it needs root patching (determined earlier on via SIP variable)
|
||||||
|
# If not, allow SecureBootModel usage, otherwise force VMM patching
|
||||||
|
# Needed for macOS Monterey to allow OTA updates
|
||||||
|
try:
|
||||||
|
spoof_model = generate_smbios.set_smbios_model_spoof(model)
|
||||||
|
except:
|
||||||
|
# Native Macs (mainly M1s) will error out as they don't know what SMBIOS to spoof to
|
||||||
|
# As we don't spoof on native models, we can safely ignore this
|
||||||
|
spoof_model = model
|
||||||
|
if smbios_data.smbios_dictionary[spoof_model]["SecureBootModel"] is not None:
|
||||||
|
if settings.sip_status is False:
|
||||||
|
# Force VMM as root patching is
|
||||||
|
settings.secure_status = False
|
||||||
|
settings.force_vmm = True
|
||||||
|
else:
|
||||||
|
# Allow SecureBootModel
|
||||||
|
settings.secure_status = True
|
||||||
|
settings.force_vmm = False
|
||||||
|
|||||||
Reference in New Issue
Block a user