X-Git-Url: https://code.delx.au/refind/blobdiff_plain/9a669ad3b5fb341500d76d487c38a7102eb01b3d..849bd62e3cc11418d8645c067dea5ec088b3c30a:/refind.conf-sample diff --git a/refind.conf-sample b/refind.conf-sample index e06c5c3..a1c57b5 100644 --- a/refind.conf-sample +++ b/refind.conf-sample @@ -4,7 +4,11 @@ # # Timeout in seconds for the main menu screen. Setting the timeout to 0 -# disables automatic booting (i.e., no timeout). +# disables automatic booting (i.e., no timeout). Setting it to -1 causes +# an immediate boot to the default OS *UNLESS* a keypress is in the buffer +# when rEFInd launches, in which case that keypress is interpreted as a +# shortcut key. If no matching shortcut is found, rEFInd displays its +# menu with no timeout. # timeout 20 @@ -26,6 +30,7 @@ timeout 20 # arrows - scroll arrows on the OS selection tag line # hints - brief command summary in the menu # editor - the options editor (+, F2, or Insert on boot options menu) +# badges - device-type badges for boot options # all - all of the above # Default is none of these (all elements active) # @@ -41,6 +46,7 @@ timeout 20 # Default is "icons". # #icons_dir myicons +#icons_dir icons/snowy # Use a custom title banner instead of the rEFInd icon and name. The file # path is relative to the directory where refind.efi is located. The color @@ -50,6 +56,7 @@ timeout 20 # #banner hostname.bmp #banner mybanner.png +#banner icons/snowy/banner-snowy.png # Specify how to handle banners that aren't exactly the same as the screen # size: @@ -129,6 +136,7 @@ timeout 20 # Default is "0 0" (use the system default resolution, usually 800x600). # #resolution 1024 768 +#resolution 1440 900 #resolution 3 # Launch specified OSes in graphics mode. By default, rEFInd switches @@ -163,6 +171,8 @@ timeout 20 # (see also the windows_recovery_files option) # mok_tool - makes available the Machine Owner Key (MOK) maintenance # tool, MokManager.efi, used on Secure Boot systems +# csr_rotate - adjusts Apple System Integrity Protection (SIP) +# policy. Requires "csr_values" to be set. # about - an "about this program" option # exit - a tag to exit from rEFInd # shutdown - shuts down the computer (a bug causes this to reboot @@ -170,9 +180,10 @@ timeout 20 # reboot - a tag to reboot the computer # firmware - a tag to reboot the computer into the firmware's # user interface (ignored on older computers) +# netboot - launch the ipxe.efi tool for network (PXE) booting # Default is shell,memtest,gdisk,apple_recovery,windows_recovery,mok_tool,about,shutdown,reboot,firmware # -#showtools shell, gdisk, memtest, mok_tool, about, reboot, exit, firmware +#showtools shell, gdisk, memtest, mok_tool, apple_recovery, windows_recovery, about, reboot, exit, firmware # Boot loaders that can launch a Windows restore or emergency system. # These tend to be OEM-specific. @@ -196,12 +207,15 @@ timeout 20 # internal - internal EFI disk-based boot loaders # external - external EFI disk-based boot loaders # optical - EFI optical discs (CD, DVD, etc.) +# netboot - EFI network (PXE) boot options # hdbios - BIOS disk-based boot loaders # biosexternal - BIOS external boot loaders (USB, eSATA, etc.) # cd - BIOS optical-disc boot loaders # manual - use stanzas later in this configuration file # Note that the legacy BIOS options require firmware support, which is # not present on all computers. +# The netboot option is experimental and relies on the ipxe.efi and +# ipxe_discover.efi program files. # On UEFI PCs, default is internal,external,optical,manual # On Macs, default is internal,hdbios,external,biosexternal,optical,cd,manual # @@ -209,12 +223,13 @@ timeout 20 # By default, rEFInd relies on the UEFI firmware to detect BIOS-mode boot # devices. This sometimes doesn't detect all the available devices, though. -# For these cases, deep_uefi_legacy_scan results in a forced scan and +# For these cases, uefi_deep_legacy_scan results in a forced scan and # modification of NVRAM variables on each boot. Adding "0", "off", or # "false" resets to the default value. This token has no effect on Macs or # when no BIOS-mode options are set via scanfor. -# Default is unset (or "deep_uefi_legacy_scan true") -#deep_uefi_legacy_scan +# Default is unset (or "uefi_deep_legacy_scan false") +# +#uefi_deep_legacy_scan # Delay for the specified number of seconds before scanning disks. # This can help some users who find that some of their disks @@ -246,26 +261,25 @@ timeout 20 # OSes' file browsers. # For legacy-mode scans, you can specify any subset of the boot loader # description shown when you highlight the option in rEFInd. -# The default is "Recovery HD,LRS_ESP". +# The default is "LRS_ESP". # #dont_scan_volumes "Recovery HD" # Directories that should NOT be scanned for boot loaders. By default, # rEFInd doesn't scan its own directory, the EFI/tools directory, the -# EFI/memtest directory, or the EFI/memtest86 directory. Using the -# dont_scan_dirs option enables you to "blacklist" other directories; -# but note that using this option removes the EFI/memtest and -# EFI/memtest86 directories, so if you don't want them scanned, be -# sure to include them in your new list. You might use this token to -# keep EFI/boot/bootx64.efi out of the menu if that's a duplicate of -# another boot loader or to exclude a directory that holds drivers -# or non-bootloader utilities provided by a hardware manufacturer. If -# a directory is listed both here and in also_scan_dirs, dont_scan_dirs -# takes precedence. Note that this blacklist applies to ALL the -# filesystems that rEFInd scans, not just the ESP, unless you precede -# the directory name by a filesystem name, as in "myvol:EFI/somedir" -# to exclude EFI/somedir from the scan on the myvol volume but not on -# other volumes. +# EFI/memtest directory, the EFI/memtest86 directory, or the +# com.apple.recovery.boot directory. Using the dont_scan_dirs option +# enables you to "blacklist" other directories; but be sure to use "+" +# as the first element if you want to continue blacklisting existing +# directories. You might use this token to keep EFI/boot/bootx64.efi out +# of the menu if that's a duplicate of another boot loader or to exclude +# a directory that holds drivers or non-bootloader utilities provided by +# a hardware manufacturer. If a directory is listed both here and in +# also_scan_dirs, dont_scan_dirs takes precedence. Note that this +# blacklist applies to ALL the filesystems that rEFInd scans, not just +# the ESP, unless you precede the directory name by a filesystem name, +# as in "myvol:EFI/somedir" to exclude EFI/somedir from the scan on the +# myvol volume but not on other volumes. # #dont_scan_dirs ESP:/EFI/boot,EFI/Dell,EFI/memtest86 @@ -291,16 +305,23 @@ timeout 20 # useful for better integration with Linux distributions that provide # kernels with EFI stub loaders but that don't give those kernels filenames # that end in ".efi", particularly if the kernels are stored on a -# filesystem that the EFI can read. When uncommented, this option causes -# all files in scanned directories with names that begin with "vmlinuz" -# or "bzImage" to be included as loaders, even if they lack ".efi" -# extensions. The drawback to this option is that it can pick up kernels -# that lack EFI stub loader support and other files. Passing this option -# a "0" value causes kernels without ".efi" extensions to NOT be scanned; -# passing it alone or with any other value causes all kernels to be scanned. -# Default is to NOT scan for kernels without ".efi" extensions. +# filesystem that the EFI can read. When set to "1", "true", or "on", this +# option causes all files in scanned directories with names that begin with +# "vmlinuz" or "bzImage" to be included as loaders, even if they lack ".efi" +# extensions. Passing this option a "0", "false", or "off" value causes +# kernels without ".efi" extensions to NOT be scanned. +# Default is "true" -- to scan for kernels without ".efi" extensions. +# +#scan_all_linux_kernels false + +# Combine all Linux kernels in a given directory into a single entry. +# When so set, the kernel with the most recent time stamp will be launched +# by default, and its filename will appear in the entry's description. +# To launch other kernels, the user must press F2 or Insert; alternate +# kernels then appear as options on the sub-menu. +# Default is "true" -- kernels are "folded" into a single menu entry. # -scan_all_linux_kernels +#fold_linux_kernels false # Set the maximum number of tags that can be displayed on the screen at # any time. If more loaders are discovered than this value, rEFInd shows @@ -316,10 +337,14 @@ scan_all_linux_kernels # default loader using: # - A digit between 1 and 9, in which case the Nth loader in the menu # will be the default. +# - A "+" symbol at the start of the string, which refers to the most +# recently booted loader. # - Any substring that corresponds to a portion of the loader's title -# (usually the OS's name or boot loader's path). +# (usually the OS's name, boot loader's path, or a volume or +# filesystem title). # You may also specify multiple selectors by separating them with commas -# and enclosing the list in quotes. +# and enclosing the list in quotes. (The "+" option is only meaningful in +# this context.) # If you follow the selector(s) with two times, in 24-hour format, the # default will apply only between those times. The times are in the # motherboard's time standard, whether that's UTC or local time, so if @@ -329,13 +354,56 @@ scan_all_linux_kernels # case the last one to match takes precedence. Thus, you can set a main # option without a time followed by one or more that include times to # set different defaults for different times of day. +# The default behavior is to boot the previously-booted OS. # #default_selection 1 #default_selection Microsoft -#default_selection "bzImage,vmlinuz" +#default_selection "+,bzImage,vmlinuz" #default_selection Maintenance 23:30 2:00 #default_selection "Maintenance,OS X" 1:00 2:30 +# Enable VMX bit and lock the CPU MSR if unlocked. +# On some Intel Apple computers, the firmware does not lock the MSR 0x3A. +# The symptom on Windows is Hyper-V not working even if the CPU +# meets the minimum requirements (HW assisted virtualization and SLAT) +# DO NOT SET THIS EXCEPT ON INTEL CPUs THAT SUPPORT VMX! See +# http://www.thomas-krenn.com/en/wiki/Activating_the_Intel_VT_Virtualization_Feature! +# for more on this subject. +# The default is false: Don't try to enable and lock the MSR. +# +#enable_and_lock_vmx false + +# Tell a Mac's EFI that OS X is about to be launched, even when it's not. +# This option causes some Macs to initialize their hardware differently than +# when a third-party OS is launched normally. In some cases (particularly on +# Macs with multiple video cards), using this option can cause hardware to +# work that would not otherwise work. On the other hand, using this option +# when it is not necessary can cause hardware (such as keyboards and mice) to +# become inaccessible. Therefore, you should not enable this option if your +# non-Apple OSes work correctly; enable it only if you have problems with +# some hardware devices. When needed, a value of "10.9" usually works, but +# you can experiment with other values. This feature has no effect on +# non-Apple computers. +# The default is inactive (no OS X spoofing is done). +# +#spoof_osx_version 10.9 + +# Set the CSR values for Apple's System Integrity Protection (SIP) feature. +# Values are one-byte (two-character) hexadecimal numbers. These values +# define which specific security features are enabled. Below are the codes +# for what the values mean. Add them up (in hexadecimal!) to set new values. +# Apple's "csrutil enable" and "csrutil disable" commands set values of 10 +# and 77, respectively. +# CSR_ALLOW_UNTRUSTED_KEXTS 0x01 +# CSR_ALLOW_UNRESTRICTED_FS 0x02 +# CSR_ALLOW_TASK_FOR_PID 0x04 +# CSR_ALLOW_KERNEL_DEBUGGER 0x08 +# CSR_ALLOW_APPLE_INTERNAL 0x10 +# CSR_ALLOW_UNRESTRICTED_DTRACE 0x20 +# CSR_ALLOW_UNRESTRICTED_NVRAM 0x40 +# +#csr_values 10,77 + # Include a secondary configuration file within this one. This secondary # file is loaded as if its options appeared at the point of the "include" # token itself, so if you want to override a setting in the main file, @@ -351,9 +419,9 @@ scan_all_linux_kernels # keywords within each stanza include: # # volume - identifies the filesystem from which subsequent files -# are loaded. You can specify the volume by label or by -# a number followed by a colon (as in "0:" for the first -# filesystem or "1:" for the second). +# are loaded. You can specify the volume by filesystem +# label, by partition label, or by partition GUID number +# (but NOT yet by filesystem UUID number). # loader - identifies the boot loader file # initrd - Specifies an initial RAM disk file # icon - specifies a custom boot loader icon @@ -385,42 +453,41 @@ scan_all_linux_kernels # Find one similar to what you need, copy it, remove the "disabled" line, # and adjust the entries to suit your needs. -# A sample entry for a Linux 3.3 kernel with its new EFI boot stub -# support on a filesystem called "KERNELS". This entry includes -# Linux-specific boot options and specification of an initial RAM disk. -# Note uses of Linux-style forward slashes, even in the initrd -# specification. Also note that a leading slash is optional in file -# specifications. +# A sample entry for a Linux 3.13 kernel with EFI boot stub support +# on a partition with a GUID of 904404F8-B481-440C-A1E3-11A5A954E601. +# This entry includes Linux-specific boot options and specification +# of an initial RAM disk. Note uses of Linux-style forward slashes. +# Also note that a leading slash is optional in file specifications. menuentry Linux { - icon EFI/refind/icons/os_linux.icns - volume KERNELS - loader bzImage-3.3.0-rc7 - initrd initrd-3.3.0.img - options "ro root=UUID=5f96cafa-e0a7-4057-b18f-fa709db5b837" - disabled + icon EFI/refind/icons/os_linux.png + volume 904404F8-B481-440C-A1E3-11A5A954E601 + loader bzImage-3.3.0-rc7 + initrd initrd-3.3.0.img + options "ro root=UUID=5f96cafa-e0a7-4057-b18f-fa709db5b837" + disabled } # A sample entry for loading Ubuntu using its standard name for # its GRUB 2 boot loader. Note uses of Linux-style forward slashes menuentry Ubuntu { - loader /EFI/ubuntu/grubx64.efi - icon /EFI/refined/icons/os_linux.icns - disabled + loader /EFI/ubuntu/grubx64.efi + icon /EFI/refind/icons/os_linux.png + disabled } # A minimal ELILO entry, which probably offers nothing that # auto-detection can't accomplish. menuentry "ELILO" { - loader \EFI\elilo\elilo.efi - disabled + loader \EFI\elilo\elilo.efi + disabled } # Like the ELILO entry, this one offers nothing that auto-detection # can't do; but you might use it if you want to disable auto-detection # but still boot Windows.... menuentry "Windows 7" { - loader \EFI\Microsoft\Boot\bootmgfw.efi - disabled + loader \EFI\Microsoft\Boot\bootmgfw.efi + disabled } # EFI shells are programs just like boot loaders, and can be @@ -429,10 +496,10 @@ menuentry "Windows 7" { # could initialize hardware and then launch an OS, or it could # do something entirely different. menuentry "Windows via shell script" { - icon \EFI\refind\icons\os_win.icns - loader \EFI\tools\shell.efi - options "fs0:\EFI\tools\launch_windows.nsh" - disabled + icon \EFI\refind\icons\os_win.png + loader \EFI\tools\shell.efi + options "fs0:\EFI\tools\launch_windows.nsh" + disabled } # Mac OS is normally detected and run automatically; however, @@ -442,8 +509,8 @@ menuentry "Windows via shell script" { # certainly need to change the "volume" line for this example # to work. menuentry "My Mac OS X" { - icon \EFI\refind\icons\os_mac.icns - volume "OS X boot" - loader \System\Library\CoreServices\boot.efi - disabled + icon \EFI\refind\icons\os_mac.png + volume "OS X boot" + loader \System\Library\CoreServices\boot.efi + disabled }