mirror of
https://github.com/dortania/OpenCore-Legacy-Patcher.git
synced 2026-04-24 03:50:14 +10:00
Implement EFICheckDisabler
Closes https://github.com/dortania/OpenCore-Legacy-Patcher/issues/552 Closes https://github.com/dortania/OpenCore-Legacy-Patcher/issues/551
This commit is contained in:
@@ -39,6 +39,8 @@
|
|||||||
- Resolves Brightness control
|
- Resolves Brightness control
|
||||||
- Add AppleGVA patch set for HD3000 machines
|
- Add AppleGVA patch set for HD3000 machines
|
||||||
- Mainly applicable for iMac12,x and iGPU-only MacBooks
|
- Mainly applicable for iMac12,x and iGPU-only MacBooks
|
||||||
|
- Add EFICheckDisabler
|
||||||
|
- Based off stripped RestrictEvents.kext
|
||||||
|
|
||||||
## 0.2.5
|
## 0.2.5
|
||||||
|
|
||||||
|
|||||||
@@ -610,6 +610,24 @@
|
|||||||
<key>PlistPath</key>
|
<key>PlistPath</key>
|
||||||
<string>Contents/Info.plist</string>
|
<string>Contents/Info.plist</string>
|
||||||
</dict>
|
</dict>
|
||||||
|
<dict>
|
||||||
|
<key>Arch</key>
|
||||||
|
<string>x86_64</string>
|
||||||
|
<key>Comment</key>
|
||||||
|
<string>Disable EFI Checks</string>
|
||||||
|
<key>Enabled</key>
|
||||||
|
<false/>
|
||||||
|
<key>MaxKernel</key>
|
||||||
|
<string></string>
|
||||||
|
<key>MinKernel</key>
|
||||||
|
<string></string>
|
||||||
|
<key>BundlePath</key>
|
||||||
|
<string>EFICheckDisabler.kext</string>
|
||||||
|
<key>ExecutablePath</key>
|
||||||
|
<string></string>
|
||||||
|
<key>PlistPath</key>
|
||||||
|
<string>Contents/Info.plist</string>
|
||||||
|
</dict>
|
||||||
<dict>
|
<dict>
|
||||||
<key>Arch</key>
|
<key>Arch</key>
|
||||||
<string>x86_64</string>
|
<string>x86_64</string>
|
||||||
|
|||||||
BIN
payloads/Kexts/Acidanthera/EFICheckDisabler-v1.0.5.zip
Normal file
BIN
payloads/Kexts/Acidanthera/EFICheckDisabler-v1.0.5.zip
Normal file
Binary file not shown.
1
payloads/Kexts/Acidanthera/EFICheckDisabler.md
Normal file
1
payloads/Kexts/Acidanthera/EFICheckDisabler.md
Normal file
@@ -0,0 +1 @@
|
|||||||
|
Based off RestrictEvents.kext, stripped binary to block Apple's EFICheck driver
|
||||||
@@ -708,6 +708,10 @@ class BuildOpenCore:
|
|||||||
self.get_item_by_kv(self.config["Kernel"]["Patch"], "Identifier", "com.apple.filesystems.apfs")["Enabled"] = True
|
self.get_item_by_kv(self.config["Kernel"]["Patch"], "Identifier", "com.apple.filesystems.apfs")["Enabled"] = True
|
||||||
# Lets us check in sys_patch.py if config supports FileVault
|
# Lets us check in sys_patch.py if config supports FileVault
|
||||||
self.config["NVRAM"]["Add"]["4D1FDA02-38C7-4A6A-9CC6-4BCCA8B30102"]["OCLP-Settings"] += " -allow_fv"
|
self.config["NVRAM"]["Add"]["4D1FDA02-38C7-4A6A-9CC6-4BCCA8B30102"]["OCLP-Settings"] += " -allow_fv"
|
||||||
|
if self.get_kext_by_bundle_path("RestrictEvents.kext")["Enabled"] is False:
|
||||||
|
# Ensure this is done at the end so all previous RestrictEvents patches are applied
|
||||||
|
# RestrictEvents and EFICheckDisabler will confilict if both are injected
|
||||||
|
self.enable_kext("EFICheckDisabler.kext", self.constants.restrictevents_version, self.constants.efi_disabler_path)
|
||||||
|
|
||||||
def set_smbios(self):
|
def set_smbios(self):
|
||||||
spoofed_model = self.model
|
spoofed_model = self.model
|
||||||
|
|||||||
@@ -854,7 +854,7 @@ system_profiler SPHardwareDataType | grep 'Model Identifier'
|
|||||||
# MenuOptions(self.constants.custom_model or self.constants.computer.real_model, self.constants).set_amfi,
|
# MenuOptions(self.constants.custom_model or self.constants.computer.real_model, self.constants).set_amfi,
|
||||||
# ],
|
# ],
|
||||||
[
|
[
|
||||||
f"Set System Intrgity Protection (SIP):\tCurrently {self.constants.sip_status}",
|
f"Set System Integrity Protection (SIP):\tCurrently {self.constants.sip_status}",
|
||||||
MenuOptions(self.constants.custom_model or self.constants.computer.real_model, self.constants).change_sip,
|
MenuOptions(self.constants.custom_model or self.constants.computer.real_model, self.constants).change_sip,
|
||||||
],
|
],
|
||||||
[
|
[
|
||||||
|
|||||||
@@ -257,6 +257,10 @@ class Constants:
|
|||||||
def restrictevents_path(self):
|
def restrictevents_path(self):
|
||||||
return self.payload_kexts_path / Path(f"Acidanthera/RestrictEvents-v{self.restrictevents_version}.zip")
|
return self.payload_kexts_path / Path(f"Acidanthera/RestrictEvents-v{self.restrictevents_version}.zip")
|
||||||
|
|
||||||
|
@property
|
||||||
|
def efi_disabler_path(self):
|
||||||
|
return self.payload_kexts_path / Path(f"Acidanthera/EFICheckDisabler-v{self.restrictevents_version}.zip")
|
||||||
|
|
||||||
@property
|
@property
|
||||||
def restrictevents_mbp_path(self):
|
def restrictevents_mbp_path(self):
|
||||||
return self.payload_kexts_path / Path(f"Acidanthera/RestrictEvents-MBP91-v{self.restrictevents_mbp_version}.zip")
|
return self.payload_kexts_path / Path(f"Acidanthera/RestrictEvents-MBP91-v{self.restrictevents_mbp_version}.zip")
|
||||||
|
|||||||
Reference in New Issue
Block a user