commit 3ea1ca231a9813380ff1b597d9b1706c7974f185 Author: Images Group <> Date: Sun Oct 27 17:17:07 2024 +0100 Initial commit diff --git a/.github/build-canary-v3-cosmo-iso b/.github/build-canary-v3-cosmo-iso new file mode 100644 index 0000000..56a6051 --- /dev/null +++ b/.github/build-canary-v3-cosmo-iso @@ -0,0 +1 @@ +1 \ No newline at end of file diff --git a/.github/build-canary-v3-iso b/.github/build-canary-v3-iso new file mode 100644 index 0000000..56a6051 --- /dev/null +++ b/.github/build-canary-v3-iso @@ -0,0 +1 @@ +1 \ No newline at end of file diff --git a/.github/build-canary-v3-nvidia-iso b/.github/build-canary-v3-nvidia-iso new file mode 100644 index 0000000..56a6051 --- /dev/null +++ b/.github/build-canary-v3-nvidia-iso @@ -0,0 +1 @@ +1 \ No newline at end of file diff --git a/.github/build-nest-v3-cosmo-iso b/.github/build-nest-v3-cosmo-iso new file mode 100644 index 0000000..56a6051 --- /dev/null +++ b/.github/build-nest-v3-cosmo-iso @@ -0,0 +1 @@ +1 \ No newline at end of file diff --git a/.github/build-nest-v3-iso b/.github/build-nest-v3-iso new file mode 100644 index 0000000..56a6051 --- /dev/null +++ b/.github/build-nest-v3-iso @@ -0,0 +1 @@ +1 \ No newline at end of file diff --git a/.github/build-nest-v3-nvidia-iso b/.github/build-nest-v3-nvidia-iso new file mode 100644 index 0000000..d8263ee --- /dev/null +++ b/.github/build-nest-v3-nvidia-iso @@ -0,0 +1 @@ +2 \ No newline at end of file diff --git a/.github/release-canary-v3-cosmo-iso b/.github/release-canary-v3-cosmo-iso new file mode 100644 index 0000000..56a6051 --- /dev/null +++ b/.github/release-canary-v3-cosmo-iso @@ -0,0 +1 @@ +1 \ No newline at end of file diff --git a/.github/release-canary-v3-iso b/.github/release-canary-v3-iso new file mode 100644 index 0000000..56a6051 --- /dev/null +++ b/.github/release-canary-v3-iso @@ -0,0 +1 @@ +1 \ No newline at end of file diff --git a/.github/release-canary-v3-nvidia-iso b/.github/release-canary-v3-nvidia-iso new file mode 100644 index 0000000..56a6051 --- /dev/null +++ b/.github/release-canary-v3-nvidia-iso @@ -0,0 +1 @@ +1 \ No newline at end of file diff --git a/.github/release-nest-v3-cosmo-iso b/.github/release-nest-v3-cosmo-iso new file mode 100644 index 0000000..0cfbf08 --- /dev/null +++ b/.github/release-nest-v3-cosmo-iso @@ -0,0 +1 @@ +2 diff --git a/.github/release-nest-v3-iso b/.github/release-nest-v3-iso new file mode 100644 index 0000000..d8263ee --- /dev/null +++ b/.github/release-nest-v3-iso @@ -0,0 +1 @@ +2 \ No newline at end of file diff --git a/.github/release-nest-v3-nvidia-iso b/.github/release-nest-v3-nvidia-iso new file mode 100644 index 0000000..56a6051 --- /dev/null +++ b/.github/release-nest-v3-nvidia-iso @@ -0,0 +1 @@ +1 \ No newline at end of file diff --git a/.github/workflows/build-canary-v3-cosmo-iso.yml b/.github/workflows/build-canary-v3-cosmo-iso.yml new file mode 100644 index 0000000..6bc05f8 --- /dev/null +++ b/.github/workflows/build-canary-v3-cosmo-iso.yml @@ -0,0 +1,49 @@ +name: Build Canary COSMO amd64-v3 ISO + +on: + push: + branches: + - main + paths: + - '.github/build-canary-v3-cosmo-iso' + +jobs: + build: + runs-on: ubuntu-latest + container: + image: ubuntu:latest + volumes: + - /proc:/proc + options: --privileged -it --cap-add=sys_admin --cap-add mknod --device=/dev/fuse --security-opt seccomp=unconfined --security-opt label=disable + + steps: + - name: Install Some essentials + run: apt-get update -y && apt-get install -y wget npm rsync nodejs + + - uses: actions/checkout@v3 + + - name: Install SSH key + uses: shimataro/ssh-key-action@v2 + with: + key: ${{ secrets.SSH_KEY }} + name: id_rsa + known_hosts: ${{ secrets.KNOWN_HOSTS }} + if_key_exists: replace + + - name: Set ISO Info + run: sed "s/#DISTNAME#/PikaOS-Canary-COSMO/g" -i ./info.sh && sed "s/#ARCH#/amd64-v3/g" -i ./info.sh + + - name: Get ISO Build Dependencies + run: ./get_iso_build_dep.sh + + - name: Enable NVIDIA Enablement + run: cp -rvf ./nvidia-enablement/* ./ + + - name: Enable COSMO Enablement + run: cp -rvf ./cosmo-enablement/* ./ + + - name: Generate Image ROOTFS from PikaOS Docker image + run: ./generate_roofs_from_canaryv3_docker.sh + + - name: Build ISO + run: ./build.sh diff --git a/.github/workflows/build-canary-v3-iso.yml b/.github/workflows/build-canary-v3-iso.yml new file mode 100644 index 0000000..b9ae31a --- /dev/null +++ b/.github/workflows/build-canary-v3-iso.yml @@ -0,0 +1,43 @@ +name: Build Canary amd64-v3 ISO + +on: + push: + branches: + - main + paths: + - '.github/build-canary-v3-iso' + +jobs: + build: + runs-on: ubuntu-latest + container: + image: ubuntu:latest + volumes: + - /proc:/proc + options: --privileged -it --cap-add=sys_admin --cap-add mknod --device=/dev/fuse --security-opt seccomp=unconfined --security-opt label=disable + + steps: + - name: Install Some essentials + run: apt-get update -y && apt-get install -y wget npm rsync nodejs + + - uses: actions/checkout@v3 + + - name: Install SSH key + uses: shimataro/ssh-key-action@v2 + with: + key: ${{ secrets.SSH_KEY }} + name: id_rsa + known_hosts: ${{ secrets.KNOWN_HOSTS }} + if_key_exists: replace + + - name: Set ISO Info + run: sed "s/#DISTNAME#/PikaOS-Canary/g" -i ./info.sh && sed "s/#ARCH#/amd64-v3/g" -i ./info.sh + + - name: Get ISO Build Dependencies + run: ./get_iso_build_dep.sh + + - name: Generate Image ROOTFS from PikaOS Docker image + run: ./generate_roofs_from_canaryv3_docker.sh + + - name: Build ISO + run: ./build.sh diff --git a/.github/workflows/build-canary-v3-nvidia-iso.yml b/.github/workflows/build-canary-v3-nvidia-iso.yml new file mode 100644 index 0000000..9377c97 --- /dev/null +++ b/.github/workflows/build-canary-v3-nvidia-iso.yml @@ -0,0 +1,46 @@ +name: Build Canary NVIDIA amd64-v3 ISO + +on: + push: + branches: + - main + paths: + - '.github/build-canary-v3-nvidia-iso' + +jobs: + build: + runs-on: ubuntu-latest + container: + image: ubuntu:latest + volumes: + - /proc:/proc + options: --privileged -it --cap-add=sys_admin --cap-add mknod --device=/dev/fuse --security-opt seccomp=unconfined --security-opt label=disable + + steps: + - name: Install Some essentials + run: apt-get update -y && apt-get install -y wget npm rsync nodejs + + - uses: actions/checkout@v3 + + - name: Install SSH key + uses: shimataro/ssh-key-action@v2 + with: + key: ${{ secrets.SSH_KEY }} + name: id_rsa + known_hosts: ${{ secrets.KNOWN_HOSTS }} + if_key_exists: replace + + - name: Set ISO Info + run: sed "s/#DISTNAME#/PikaOS-Canary-NVIDIA/g" -i ./info.sh && sed "s/#ARCH#/amd64-v3/g" -i ./info.sh + + - name: Get ISO Build Dependencies + run: ./get_iso_build_dep.sh + + - name: Enable NVIDIA Enablement + run: cp -rvf ./nvidia-enablement/* ./ + + - name: Generate Image ROOTFS from PikaOS Docker image + run: ./generate_roofs_from_canaryv3_docker.sh + + - name: Build ISO + run: ./build.sh diff --git a/.github/workflows/build-nest-v3-cosmo-iso.yml b/.github/workflows/build-nest-v3-cosmo-iso.yml new file mode 100644 index 0000000..9bc02b4 --- /dev/null +++ b/.github/workflows/build-nest-v3-cosmo-iso.yml @@ -0,0 +1,49 @@ +name: Build Nest COSMO amd64-v3 ISO + +on: + push: + branches: + - main + paths: + - '.github/build-nest-v3-cosmo-iso' + +jobs: + build: + runs-on: ubuntu-latest + container: + image: ubuntu:latest + volumes: + - /proc:/proc + options: --privileged -it --cap-add=sys_admin --cap-add mknod --device=/dev/fuse --security-opt seccomp=unconfined --security-opt label=disable + + steps: + - name: Install Some essentials + run: apt-get update -y && apt-get install -y wget npm rsync nodejs + + - uses: actions/checkout@v3 + + - name: Install SSH key + uses: shimataro/ssh-key-action@v2 + with: + key: ${{ secrets.SSH_KEY }} + name: id_rsa + known_hosts: ${{ secrets.KNOWN_HOSTS }} + if_key_exists: replace + + - name: Set ISO Info + run: sed "s/#DISTNAME#/PikaOS-Nest-COSMO/g" -i ./info.sh && sed "s/#ARCH#/amd64-v3/g" -i ./info.sh + + - name: Get ISO Build Dependencies + run: ./get_iso_build_dep.sh + + - name: Enable NVIDIA Enablement + run: cp -rvf ./nvidia-enablement/* ./ + + - name: Enable COSMO Enablement + run: cp -rvf ./cosmo-enablement/* ./ + + - name: Generate Image ROOTFS from PikaOS Docker image + run: ./generate_roofs_from_nestv3_docker.sh + + - name: Build ISO + run: ./build.sh diff --git a/.github/workflows/build-nest-v3-iso.yml b/.github/workflows/build-nest-v3-iso.yml new file mode 100644 index 0000000..60960bd --- /dev/null +++ b/.github/workflows/build-nest-v3-iso.yml @@ -0,0 +1,43 @@ +name: Build Nest amd64-v3 ISO + +on: + push: + branches: + - main + paths: + - '.github/build-nest-v3-iso' + +jobs: + build: + runs-on: ubuntu-latest + container: + image: ubuntu:latest + volumes: + - /proc:/proc + options: --privileged -it --cap-add=sys_admin --cap-add mknod --device=/dev/fuse --security-opt seccomp=unconfined --security-opt label=disable + + steps: + - name: Install Some essentials + run: apt-get update -y && apt-get install -y wget npm rsync nodejs + + - uses: actions/checkout@v3 + + - name: Install SSH key + uses: shimataro/ssh-key-action@v2 + with: + key: ${{ secrets.SSH_KEY }} + name: id_rsa + known_hosts: ${{ secrets.KNOWN_HOSTS }} + if_key_exists: replace + + - name: Set ISO Info + run: sed "s/#DISTNAME#/PikaOS-Nest/g" -i ./info.sh && sed "s/#ARCH#/amd64-v3/g" -i ./info.sh + + - name: Get ISO Build Dependencies + run: ./get_iso_build_dep.sh + + - name: Generate Image ROOTFS from PikaOS Docker image + run: ./generate_roofs_from_nestv3_docker.sh + + - name: Build ISO + run: ./build.sh diff --git a/.github/workflows/build-nest-v3-nvidia-iso.yml b/.github/workflows/build-nest-v3-nvidia-iso.yml new file mode 100644 index 0000000..7c0a1cf --- /dev/null +++ b/.github/workflows/build-nest-v3-nvidia-iso.yml @@ -0,0 +1,46 @@ +name: Build Nest NVIDIA amd64-v3 ISO + +on: + push: + branches: + - main + paths: + - '.github/build-nest-v3-nvidia-iso' + +jobs: + build: + runs-on: ubuntu-latest + container: + image: ubuntu:latest + volumes: + - /proc:/proc + options: --privileged -it --cap-add=sys_admin --cap-add mknod --device=/dev/fuse --security-opt seccomp=unconfined --security-opt label=disable + + steps: + - name: Install Some essentials + run: apt-get update -y && apt-get install -y wget npm rsync nodejs + + - uses: actions/checkout@v3 + + - name: Install SSH key + uses: shimataro/ssh-key-action@v2 + with: + key: ${{ secrets.SSH_KEY }} + name: id_rsa + known_hosts: ${{ secrets.KNOWN_HOSTS }} + if_key_exists: replace + + - name: Set ISO Info + run: sed "s/#DISTNAME#/PikaOS-Nest-NVIDIA/g" -i ./info.sh && sed "s/#ARCH#/amd64-v3/g" -i ./info.sh + + - name: Get ISO Build Dependencies + run: ./get_iso_build_dep.sh + + - name: Enable NVIDIA Enablement + run: cp -rvf ./nvidia-enablement/* ./ + + - name: Generate Image ROOTFS from PikaOS Docker image + run: ./generate_roofs_from_nestv3_docker.sh + + - name: Build ISO + run: ./build.sh diff --git a/.github/workflows/release-canary-v3-cosmo-iso.yml b/.github/workflows/release-canary-v3-cosmo-iso.yml new file mode 100644 index 0000000..28dd23d --- /dev/null +++ b/.github/workflows/release-canary-v3-cosmo-iso.yml @@ -0,0 +1,52 @@ +name: Release Canary COSMO amd64-v3 ISO + +on: + push: + branches: + - main + paths: + - '.github/release-canary-v3-cosmo-iso' + +jobs: + build: + runs-on: ubuntu-latest + container: + image: ubuntu:latest + volumes: + - /proc:/proc + options: --privileged -it --cap-add=sys_admin --cap-add mknod --device=/dev/fuse --security-opt seccomp=unconfined --security-opt label=disable + + steps: + - name: Install Some essentials + run: apt-get update -y && apt-get install -y wget npm rsync nodejs + + - uses: actions/checkout@v3 + + - name: Install SSH key + uses: shimataro/ssh-key-action@v2 + with: + key: ${{ secrets.SSH_KEY }} + name: id_rsa + known_hosts: ${{ secrets.KNOWN_HOSTS }} + if_key_exists: replace + + - name: Set ISO Info + run: sed "s/#DISTNAME#/PikaOS-Canary-COSMO/g" -i ./info.sh && sed "s/#ARCH#/amd64-v3/g" -i ./info.sh + + - name: Get ISO Build Dependencies + run: ./get_iso_build_dep.sh + + - name: Enable NVIDIA Enablement + run: cp -rvf ./nvidia-enablement/* ./ + + - name: Enable COSMO Enablement + run: cp -rvf ./cosmo-enablement/* ./ + + - name: Generate Image ROOTFS from PikaOS Docker image + run: ./generate_roofs_from_canaryv3_docker.sh + + - name: Build ISO + run: ./build.sh + + - name: Release ISO + run: ./release.sh diff --git a/.github/workflows/release-canary-v3-iso.yml b/.github/workflows/release-canary-v3-iso.yml new file mode 100644 index 0000000..fb5d359 --- /dev/null +++ b/.github/workflows/release-canary-v3-iso.yml @@ -0,0 +1,46 @@ +name: Release Canary amd64-v3 ISO + +on: + push: + branches: + - main + paths: + - '.github/release-canary-v3-iso' + +jobs: + build: + runs-on: ubuntu-latest + container: + image: ubuntu:latest + volumes: + - /proc:/proc + options: --privileged -it --cap-add=sys_admin --cap-add mknod --device=/dev/fuse --security-opt seccomp=unconfined --security-opt label=disable + + steps: + - name: Install Some essentials + run: apt-get update -y && apt-get install -y wget npm rsync nodejs + + - uses: actions/checkout@v3 + + - name: Install SSH key + uses: shimataro/ssh-key-action@v2 + with: + key: ${{ secrets.SSH_KEY }} + name: id_rsa + known_hosts: ${{ secrets.KNOWN_HOSTS }} + if_key_exists: replace + + - name: Set ISO Info + run: sed "s/#DISTNAME#/PikaOS-Canary/g" -i ./info.sh && sed "s/#ARCH#/amd64-v3/g" -i ./info.sh + + - name: Get ISO Build Dependencies + run: ./get_iso_build_dep.sh + + - name: Generate Image ROOTFS from PikaOS Docker image + run: ./generate_roofs_from_canaryv3_docker.sh + + - name: Build ISO + run: ./build.sh + + - name: Release ISO + run: ./release.sh diff --git a/.github/workflows/release-canary-v3-nvidia-iso.yml b/.github/workflows/release-canary-v3-nvidia-iso.yml new file mode 100644 index 0000000..a1dcfd3 --- /dev/null +++ b/.github/workflows/release-canary-v3-nvidia-iso.yml @@ -0,0 +1,49 @@ +name: Release Canary NVIDIA amd64-v3 ISO + +on: + push: + branches: + - main + paths: + - '.github/release-canary-v3-nvidia-iso' + +jobs: + build: + runs-on: ubuntu-latest + container: + image: ubuntu:latest + volumes: + - /proc:/proc + options: --privileged -it --cap-add=sys_admin --cap-add mknod --device=/dev/fuse --security-opt seccomp=unconfined --security-opt label=disable + + steps: + - name: Install Some essentials + run: apt-get update -y && apt-get install -y wget npm rsync nodejs + + - uses: actions/checkout@v3 + + - name: Install SSH key + uses: shimataro/ssh-key-action@v2 + with: + key: ${{ secrets.SSH_KEY }} + name: id_rsa + known_hosts: ${{ secrets.KNOWN_HOSTS }} + if_key_exists: replace + + - name: Set ISO Info + run: sed "s/#DISTNAME#/PikaOS-Canary-NVIDIA/g" -i ./info.sh && sed "s/#ARCH#/amd64-v3/g" -i ./info.sh + + - name: Get ISO Build Dependencies + run: ./get_iso_build_dep.sh + + - name: Enable NVIDIA Enablement + run: cp -rvf ./nvidia-enablement/* ./ + + - name: Generate Image ROOTFS from PikaOS Docker image + run: ./generate_roofs_from_canaryv3_docker.sh + + - name: Build ISO + run: ./build.sh + + - name: Release ISO + run: ./release.sh diff --git a/.github/workflows/release-nest-v3-cosmo-iso.yml b/.github/workflows/release-nest-v3-cosmo-iso.yml new file mode 100644 index 0000000..53d3516 --- /dev/null +++ b/.github/workflows/release-nest-v3-cosmo-iso.yml @@ -0,0 +1,52 @@ +name: Release Nest COSMO amd64-v3 ISO + +on: + push: + branches: + - main + paths: + - '.github/release-nest-v3-cosmo-iso' + +jobs: + build: + runs-on: ubuntu-latest + container: + image: ubuntu:latest + volumes: + - /proc:/proc + options: --privileged -it --cap-add=sys_admin --cap-add mknod --device=/dev/fuse --security-opt seccomp=unconfined --security-opt label=disable + + steps: + - name: Install Some essentials + run: apt-get update -y && apt-get install -y wget npm rsync nodejs + + - uses: actions/checkout@v3 + + - name: Install SSH key + uses: shimataro/ssh-key-action@v2 + with: + key: ${{ secrets.SSH_KEY }} + name: id_rsa + known_hosts: ${{ secrets.KNOWN_HOSTS }} + if_key_exists: replace + + - name: Set ISO Info + run: sed "s/#DISTNAME#/PikaOS-Nest-COSMO/g" -i ./info.sh && sed "s/#ARCH#/amd64-v3/g" -i ./info.sh + + - name: Get ISO Build Dependencies + run: ./get_iso_build_dep.sh + + - name: Enable NVIDIA Enablement + run: cp -rvf ./nvidia-enablement/* ./ + + - name: Enable COSMO Enablement + run: cp -rvf ./cosmo-enablement/* ./ + + - name: Generate Image ROOTFS from PikaOS Docker image + run: ./generate_roofs_from_nestv3_docker.sh + + - name: Build ISO + run: ./build.sh + + - name: Release ISO + run: ./release.sh diff --git a/.github/workflows/release-nest-v3-iso.yml b/.github/workflows/release-nest-v3-iso.yml new file mode 100644 index 0000000..76abaeb --- /dev/null +++ b/.github/workflows/release-nest-v3-iso.yml @@ -0,0 +1,46 @@ +name: Release Nest amd64-v3 ISO + +on: + push: + branches: + - main + paths: + - '.github/release-nest-v3-iso' + +jobs: + build: + runs-on: ubuntu-latest + container: + image: ubuntu:latest + volumes: + - /proc:/proc + options: --privileged -it --cap-add=sys_admin --cap-add mknod --device=/dev/fuse --security-opt seccomp=unconfined --security-opt label=disable + + steps: + - name: Install Some essentials + run: apt-get update -y && apt-get install -y wget npm rsync nodejs + + - uses: actions/checkout@v3 + + - name: Install SSH key + uses: shimataro/ssh-key-action@v2 + with: + key: ${{ secrets.SSH_KEY }} + name: id_rsa + known_hosts: ${{ secrets.KNOWN_HOSTS }} + if_key_exists: replace + + - name: Set ISO Info + run: sed "s/#DISTNAME#/PikaOS-Nest/g" -i ./info.sh && sed "s/#ARCH#/amd64-v3/g" -i ./info.sh + + - name: Get ISO Build Dependencies + run: ./get_iso_build_dep.sh + + - name: Generate Image ROOTFS from PikaOS Docker image + run: ./generate_roofs_from_nestv3_docker.sh + + - name: Build ISO + run: ./build.sh + + - name: Release ISO + run: ./release.sh diff --git a/.github/workflows/release-nest-v3-nvidia-iso.yml b/.github/workflows/release-nest-v3-nvidia-iso.yml new file mode 100644 index 0000000..d45f694 --- /dev/null +++ b/.github/workflows/release-nest-v3-nvidia-iso.yml @@ -0,0 +1,49 @@ +name: Release Nest NVIDIA amd64-v3 ISO + +on: + push: + branches: + - main + paths: + - '.github/release-nest-v3-nvidia-iso' + +jobs: + build: + runs-on: ubuntu-latest + container: + image: ubuntu:latest + volumes: + - /proc:/proc + options: --privileged -it --cap-add=sys_admin --cap-add mknod --device=/dev/fuse --security-opt seccomp=unconfined --security-opt label=disable + + steps: + - name: Install Some essentials + run: apt-get update -y && apt-get install -y wget npm rsync nodejs + + - uses: actions/checkout@v3 + + - name: Install SSH key + uses: shimataro/ssh-key-action@v2 + with: + key: ${{ secrets.SSH_KEY }} + name: id_rsa + known_hosts: ${{ secrets.KNOWN_HOSTS }} + if_key_exists: replace + + - name: Set ISO Info + run: sed "s/#DISTNAME#/PikaOS-Nest-NVIDIA/g" -i ./info.sh && sed "s/#ARCH#/amd64-v3/g" -i ./info.sh + + - name: Get ISO Build Dependencies + run: ./get_iso_build_dep.sh + + - name: Enable NVIDIA Enablement + run: cp -rvf ./nvidia-enablement/* ./ + + - name: Generate Image ROOTFS from PikaOS Docker image + run: ./generate_roofs_from_nestv3_docker.sh + + - name: Build ISO + run: ./build.sh + + - name: Release ISO + run: ./release.sh diff --git a/LICENSE b/LICENSE new file mode 100644 index 0000000..3fdc9c5 --- /dev/null +++ b/LICENSE @@ -0,0 +1,9 @@ +MIT License + +Copyright (c) 2024 images + +Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: + +The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. + +THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. diff --git a/README.md b/README.md new file mode 100644 index 0000000..ea6241a --- /dev/null +++ b/README.md @@ -0,0 +1,3 @@ +# live-iso-gnome + +Live ISO Builder for PikaOS GNOME \ No newline at end of file diff --git a/build.sh b/build.sh new file mode 100755 index 0000000..fbdc649 --- /dev/null +++ b/build.sh @@ -0,0 +1,103 @@ +#! /bin/bash + +set -e + +source ./info.sh + +if [[ -z $ROOTFS_PATH ]] +then + echo "Error: ROOTFS PATH is not set!" + exit 1 +fi + +# Mount + +mount --bind /dev "$ROOTFS_PATH/dev" +mount -t tmpfs run "$ROOTFS_PATH/run" -o mode=0755,nosuid,nodev +mount -t proc proc "$ROOTFS_PATH/proc" -o nosuid,nodev,noexec +mount -t sysfs sys "$ROOTFS_PATH/sys" -o nosuid,nodev,noexec,ro + +# Setup Chroot scripts + +cp -rvf ./chroot_scripts "$ROOTFS_PATH/" +cp -rvf ./hooks "$ROOTFS_PATH/chroot_scripts/" +cp -rvf ./live-lists "$ROOTFS_PATH/chroot_scripts/" +cp -rvf ./pool-lists "$ROOTFS_PATH/chroot_scripts/" +cp -rvf ./rem-lists "$ROOTFS_PATH/chroot_scripts/" +cp -rvf ./info.sh "$ROOTFS_PATH/chroot_scripts/" + +# Run chroot_script inside ROOTFS + +chroot "$ROOTFS_PATH" bash -c "/chroot_scripts/0-chroot.sh" +rm -rfv "$ROOTFS_PATH/chroot_scripts" + +# Unmount + +umount "$ROOTFS_PATH/dev" || umount -lf "$ROOTFS_PATH/dev" || true +umount "$ROOTFS_PATH/run" || umount -lf "$ROOTFS_PATH/run" || true +umount "$ROOTFS_PATH/proc" || umount -lf "$ROOTFS_PATH/proc" || true +umount "$ROOTFS_PATH/sys" || umount -lf "$ROOTFS_PATH/sys" || true + +# Generate Squashfs image + +mksquashfs \ + "$ROOTFS_PATH" \ + "$LIVE_BOOT_LIVE_PATH/filesystem.squashfs" \ + -noappend \ + -comp zstd \ + -Xcompression-level 19 \ + -b 1M + +# Copy Kernel to live (Disabled, Copy Kernels to refind instead) +#cp "$ROOTFS_PATH/boot"/vmlinuz-* \ +# "$LIVE_BOOT_LIVE_PATH/vmlinuz" && \ +#cp "$ROOTFS_PATH/boot"/initrd.img-* \ +# "$LIVE_BOOT_LIVE_PATH/initrd" && \ +#cp ./data/refind/refind_linux.conf \ +# "$LIVE_BOOT_LIVE_PATH/refind_linux.conf" + +# Generate bootable EFI Image from refind + +# Copy kernel to refind +mkdir -p ./data/refind/EFI +cp -vf "$ROOTFS_PATH/boot"/vmlinuz-"$ISO_KERNEL" "./data/refind/EFI/vmlinuz" +cp -vf "$ROOTFS_PATH/boot"/initrd.img-"$ISO_KERNEL" "./data/refind/EFI/initrd" + +EFI_BOOT_IMAGE_SIZE=$(($(du -s -B1048576 ./data/refind | cut -f1) + 10)) +EFI_BOOT_IMAGE="$LIVE_BOOT_PATH/efiboot.img" + +# Create Refind Boot Image +dd if=/dev/zero of="$EFI_BOOT_IMAGE" bs=1M count=$EFI_BOOT_IMAGE_SIZE +mkfs.vfat -F 32 "$EFI_BOOT_IMAGE" + +for directory in $(find ./data/refind/EFI/ -type d | cut -d'/' -f4-) +do + echo "creating directory $directory in $EFI_BOOT_IMAGE" + mmd -i "$EFI_BOOT_IMAGE" ::"$(echo $directory | tr '[:lower:]' '[:upper:]' | sed 's:/*$::')" +done + +for file in $(find ./data/refind/EFI/ -type f) +do + echo "copying file $file to $EFI_BOOT_IMAGE" + mcopy -i "$EFI_BOOT_IMAGE" $file ::"$(echo $file | cut -d'/' -f4- | tr '[:lower:]' '[:upper:]')" +done + +# Create ISO Image +mkdir -p ./output + +xorriso \ + -as mkisofs \ + -iso-level 3 \ + -V "PikaOS 4" \ + -partition_offset 16 \ + -appended_part_as_gpt \ + -no-pad \ + -no-emul-boot \ + -append_partition 2 0xef "$EFI_BOOT_IMAGE" \ + --efi-boot --interval:appended_partition_2:all:: \ + -o "./output/$ISO_IMAGE".iso \ + "$LIVE_BOOT_DATA_PATH" + +# Generate an integrity sum +touch "./output/$ISO_IMAGE".md5 +md5sum "./output/$ISO_IMAGE".iso > "./output/$ISO_IMAGE".md5 diff --git a/chroot_scripts/0-chroot.sh b/chroot_scripts/0-chroot.sh new file mode 100755 index 0000000..587f251 --- /dev/null +++ b/chroot_scripts/0-chroot.sh @@ -0,0 +1,41 @@ +#! /bin/bash + +set -e + +export DEBIAN_FRONTEND="noninteractive" + +dpkg --add-architecture i386 + +# Update APT Caches + +apt-get update -y +apt-get install pika-sources -y --no-install-recommends + +# Actions to do before package lists +apt-get install initramfs-tools adwaita-icon-theme amdgpu-drm --yes --option Dpkg::Options::="--force-confnew" --option Dpkg::Options::="--force-overwrite" --no-install-recommends +apt-get install desktop-file-utils --yes --option Dpkg::Options::="--force-confnew" --option Dpkg::Options::="--force-overwrite" --no-install-recommends +apt-get install kernel-pika --yes --option Dpkg::Options::="--force-confnew" --option Dpkg::Options::="--force-overwrite" --no-install-recommends +apt-get install booster-placeholder --yes --option Dpkg::Options::="--force-confnew" --option Dpkg::Options::="--force-overwrite" --no-install-recommends + +# Upgrade system with new cache + +apt-get full-upgrade --yes --option Dpkg::Options::="--force-confnew" --option Dpkg::Options::="--force-overwrite" + +# Install Absolute Live Boot Basics + +apt-get install --yes --option Dpkg::Options::="--force-confnew" --option Dpkg::Options::="--force-overwrite" --no-install-recommends \ + live-boot \ + systemd-sysv \ + iwd \ + curl openssh-client \ + xserver-xorg-core \ + xserver-xorg \ + xinit xterm \ + nano + +# Run chroot steps +/chroot_scripts/1-baseos.sh +/chroot_scripts/2-install-live-lists.sh +/chroot_scripts/3-download-pool.sh +/chroot_scripts/4-uninstall-rem-lists.sh +/chroot_scripts/5-run-hooks.sh diff --git a/chroot_scripts/1-baseos.sh b/chroot_scripts/1-baseos.sh new file mode 100755 index 0000000..3edc18f --- /dev/null +++ b/chroot_scripts/1-baseos.sh @@ -0,0 +1,71 @@ +#! /bin/bash + +set -e + +export DEBIAN_FRONTEND="noninteractive" + +# Install PikaOS Basics + +apt-get install --yes --option Dpkg::Options::="--force-confnew" --option Dpkg::Options::="--force-overwrite" --no-install-recommends \ + pika-baseos \ + console-setup \ + console-setup-linux \ + sudo \ + nano \ + vim-tiny \ + pika-audio-pipewire \ + dialog \ + locales \ + locales-all + +# Setup Locales + +## Uncomment en_US.UTF-8 for inclusion in generation +sed -i 's/^# *\(en_US.UTF-8\)/\1/' /etc/locale.gen + +## Generate locale +locale-gen + +## Setup locale config +update-locale LANG="en_US.UTF-8" + +tee /etc/default/keyboard <<'EOF' +XKBMODEL="pc105" +XKBLAYOUT="us" +XKBVARIANT="" +XKBOPTIONS="" +BACKSPACE="guess" +KEYMAP=us +EOF + +cp -fv /etc/default/keyboard /etc/vconsole.conf || true + +tee /etc/default/locale <<'EOF' +# File generated by update-locale +LANG=en_US.UTF-8 +EOF + +cp -fv /etc/default/locale /etc/locale.conf || true + +# Setup console-setup + +cat > /etc/default/console-setup <> /chroot_scripts/live_list + fi + done +done + +apt-get install --yes --no-install-recommends --option Dpkg::Options::="--force-confnew" --option Dpkg::Options::="--force-overwrite" $(cat /chroot_scripts/live_list | tr "\n" " ") + +systemctl mask fwupd || true +systemctl mask nmdb || true diff --git a/chroot_scripts/3-download-pool.sh b/chroot_scripts/3-download-pool.sh new file mode 100755 index 0000000..8c4e3be --- /dev/null +++ b/chroot_scripts/3-download-pool.sh @@ -0,0 +1,23 @@ +#! /bin/bash + +set -e + +export DEBIAN_FRONTEND="noninteractive" + +touch /chroot_scripts/pool_list + +for pool_list in /chroot_scripts/pool-lists/*.list +do + for pkg in $(cat $pool_list) + do + if [[ $pkg != "#"* ]] + then + echo $pkg >> /chroot_scripts/pool_list + fi + done +done + +mkdir -p /cdrom/pool/main/ +pushd /cdrom/pool/main/ +apt-get download --yes $(cat /chroot_scripts/pool_list | tr "\n" " ") +popd \ No newline at end of file diff --git a/chroot_scripts/4-uninstall-rem-lists.sh b/chroot_scripts/4-uninstall-rem-lists.sh new file mode 100755 index 0000000..f8521e1 --- /dev/null +++ b/chroot_scripts/4-uninstall-rem-lists.sh @@ -0,0 +1,20 @@ +#! /bin/bash + +set -e + +export DEBIAN_FRONTEND="noninteractive" + +touch /chroot_scripts/rem_list + +for rem_list in /chroot_scripts/rem-lists/*.list +do + for pkg in $(cat $rem_list) + do + if [[ $pkg != "#"* ]] + then + apt-get purge --yes --option Dpkg::Options::="--force-confnew" --option Dpkg::Options::="--force-overwrite" $pkg || true + fi + done +done + +apt-get autoremove --yes --option Dpkg::Options::="--force-confnew" --option Dpkg::Options::="--force-overwrite" \ No newline at end of file diff --git a/chroot_scripts/5-run-hooks.sh b/chroot_scripts/5-run-hooks.sh new file mode 100755 index 0000000..e36d762 --- /dev/null +++ b/chroot_scripts/5-run-hooks.sh @@ -0,0 +1,13 @@ +#! /bin/bash + +set -e + +export DEBIAN_FRONTEND="noninteractive" + +export ORIGINAL_WORKINGDIR=$(pwd) + +for hook in /chroot_scripts/hooks/* +do + $hook + cd $ORIGINAL_WORKINGDIR +done \ No newline at end of file diff --git a/cosmo-enablement/hooks/3-install-nvidia-driver.chroot b/cosmo-enablement/hooks/3-install-nvidia-driver.chroot new file mode 100755 index 0000000..6a10768 --- /dev/null +++ b/cosmo-enablement/hooks/3-install-nvidia-driver.chroot @@ -0,0 +1,4 @@ +#!/bin/bash + +apt-get install --yes --option Dpkg::Options::="--force-confnew" --option Dpkg::Options::="--force-overwrite" \ + nvidia-open-driver-560 diff --git a/cosmo-enablement/hooks/4-install-cosmo-packages.chroot b/cosmo-enablement/hooks/4-install-cosmo-packages.chroot new file mode 100755 index 0000000..b40b6f7 --- /dev/null +++ b/cosmo-enablement/hooks/4-install-cosmo-packages.chroot @@ -0,0 +1,4 @@ +#!/bin/bash + +apt-get install --yes --option Dpkg::Options::="--force-confnew" --option Dpkg::Options::="--force-overwrite" \ + pika-gameutils-meta diff --git a/data/refind/EFI/boot/bootaa64.efi b/data/refind/EFI/boot/bootaa64.efi new file mode 100644 index 0000000..bee0165 Binary files /dev/null and b/data/refind/EFI/boot/bootaa64.efi differ diff --git a/data/refind/EFI/boot/bootia32.efi b/data/refind/EFI/boot/bootia32.efi new file mode 100644 index 0000000..e89354b Binary files /dev/null and b/data/refind/EFI/boot/bootia32.efi differ diff --git a/data/refind/EFI/boot/bootx64.efi b/data/refind/EFI/boot/bootx64.efi new file mode 100644 index 0000000..ccd345d Binary files /dev/null and b/data/refind/EFI/boot/bootx64.efi differ diff --git a/data/refind/EFI/boot/drivers_aa64/LICENSE.txt b/data/refind/EFI/boot/drivers_aa64/LICENSE.txt new file mode 100644 index 0000000..cdeae2b --- /dev/null +++ b/data/refind/EFI/boot/drivers_aa64/LICENSE.txt @@ -0,0 +1,47 @@ +Licensing for the filesystem drivers is complex. Three different licenses +apply to various parts of the code: + +* Christoph Pfisterer's original file system wrapper (FSW) code is covered + by a BSD-style license. Many of the source files with names that take the + form fsw_*.[ch] are so licensed, but this is NOT generally true of + filesystem-specific files (e.g., fsw_ext2.c or fsw_btrfs.c). + +* Certain filesystem drivers are licensed under the GPLv2, either because + they borrow code from the Linux kernel or because a developer (typically + Oracle) applied the GPLv2 license to them. This is true of the ext2fs, + ext4fs, ReiserFS, HFS+, and ISO-9660 drivers. + +* At least one filesystem driver (Btrfs) uses code taken from GRUB, and so + uses the GPLv3 (or later) license. + +Note that the GPLv2 and GPLv3 are, ironically, not compatible licenses. +Thus, code from GPLv2 and GPLv3 projects should not be mixed. The BSD +license used by Pfisterer's original code is compatible with both versions +of the GPL, so the fact that both GPLv2 and GPLv3 drivers is built upon it +is OK. If you intend to contribute to this project's drivers or use the +code yourself, please keep this fact in mind. + +The below was written by Christoph Pfisterer with respect to his original +code: + + File System Wrapper License +============================= + +The various parts of the File System Wrapper source code come from +different sources and may carry different licenses. Here's a quick +account of the situation: + + * The core code was written from scratch and is covered by a + BSD-style license. + + * The EFI host driver was written from scratch, possibly using code + from the TianoCore project and Intel's EFI Application Toolkit. It + is covered by a BSD-style license. + + * The ext2 and reiserfs file system drivers use definitions from the + Linux kernel source. The actual code was written from scratch, + using multiple sources for reference. These drivers are covered by + the GNU GPL. + +For more details, see each file's boilerplate comment. The full text +of the GNU GPL is in the file LICENSE_GPL.txt. diff --git a/data/refind/EFI/boot/drivers_aa64/LICENSE_GPL.txt b/data/refind/EFI/boot/drivers_aa64/LICENSE_GPL.txt new file mode 100644 index 0000000..d60c31a --- /dev/null +++ b/data/refind/EFI/boot/drivers_aa64/LICENSE_GPL.txt @@ -0,0 +1,340 @@ + GNU GENERAL PUBLIC LICENSE + Version 2, June 1991 + + Copyright (C) 1989, 1991 Free Software Foundation, Inc. + 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA + Everyone is permitted to copy and distribute verbatim copies + of this license document, but changing it is not allowed. + + Preamble + + The licenses for most software are designed to take away your +freedom to share and change it. By contrast, the GNU General Public +License is intended to guarantee your freedom to share and change free +software--to make sure the software is free for all its users. This +General Public License applies to most of the Free Software +Foundation's software and to any other program whose authors commit to +using it. (Some other Free Software Foundation software is covered by +the GNU Library General Public License instead.) You can apply it to +your programs, too. + + When we speak of free software, we are referring to freedom, not +price. Our General Public Licenses are designed to make sure that you +have the freedom to distribute copies of free software (and charge for +this service if you wish), that you receive source code or can get it +if you want it, that you can change the software or use pieces of it +in new free programs; and that you know you can do these things. + + To protect your rights, we need to make restrictions that forbid +anyone to deny you these rights or to ask you to surrender the rights. +These restrictions translate to certain responsibilities for you if you +distribute copies of the software, or if you modify it. + + For example, if you distribute copies of such a program, whether +gratis or for a fee, you must give the recipients all the rights that +you have. You must make sure that they, too, receive or can get the +source code. And you must show them these terms so they know their +rights. + + We protect your rights with two steps: (1) copyright the software, and +(2) offer you this license which gives you legal permission to copy, +distribute and/or modify the software. + + Also, for each author's protection and ours, we want to make certain +that everyone understands that there is no warranty for this free +software. If the software is modified by someone else and passed on, we +want its recipients to know that what they have is not the original, so +that any problems introduced by others will not reflect on the original +authors' reputations. + + Finally, any free program is threatened constantly by software +patents. We wish to avoid the danger that redistributors of a free +program will individually obtain patent licenses, in effect making the +program proprietary. To prevent this, we have made it clear that any +patent must be licensed for everyone's free use or not licensed at all. + + The precise terms and conditions for copying, distribution and +modification follow. + + GNU GENERAL PUBLIC LICENSE + TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION + + 0. This License applies to any program or other work which contains +a notice placed by the copyright holder saying it may be distributed +under the terms of this General Public License. The "Program", below, +refers to any such program or work, and a "work based on the Program" +means either the Program or any derivative work under copyright law: +that is to say, a work containing the Program or a portion of it, +either verbatim or with modifications and/or translated into another +language. (Hereinafter, translation is included without limitation in +the term "modification".) Each licensee is addressed as "you". + +Activities other than copying, distribution and modification are not +covered by this License; they are outside its scope. The act of +running the Program is not restricted, and the output from the Program +is covered only if its contents constitute a work based on the +Program (independent of having been made by running the Program). +Whether that is true depends on what the Program does. + + 1. You may copy and distribute verbatim copies of the Program's +source code as you receive it, in any medium, provided that you +conspicuously and appropriately publish on each copy an appropriate +copyright notice and disclaimer of warranty; keep intact all the +notices that refer to this License and to the absence of any warranty; +and give any other recipients of the Program a copy of this License +along with the Program. + +You may charge a fee for the physical act of transferring a copy, and +you may at your option offer warranty protection in exchange for a fee. + + 2. You may modify your copy or copies of the Program or any portion +of it, thus forming a work based on the Program, and copy and +distribute such modifications or work under the terms of Section 1 +above, provided that you also meet all of these conditions: + + a) You must cause the modified files to carry prominent notices + stating that you changed the files and the date of any change. + + b) You must cause any work that you distribute or publish, that in + whole or in part contains or is derived from the Program or any + part thereof, to be licensed as a whole at no charge to all third + parties under the terms of this License. + + c) If the modified program normally reads commands interactively + when run, you must cause it, when started running for such + interactive use in the most ordinary way, to print or display an + announcement including an appropriate copyright notice and a + notice that there is no warranty (or else, saying that you provide + a warranty) and that users may redistribute the program under + these conditions, and telling the user how to view a copy of this + License. (Exception: if the Program itself is interactive but + does not normally print such an announcement, your work based on + the Program is not required to print an announcement.) + +These requirements apply to the modified work as a whole. If +identifiable sections of that work are not derived from the Program, +and can be reasonably considered independent and separate works in +themselves, then this License, and its terms, do not apply to those +sections when you distribute them as separate works. But when you +distribute the same sections as part of a whole which is a work based +on the Program, the distribution of the whole must be on the terms of +this License, whose permissions for other licensees extend to the +entire whole, and thus to each and every part regardless of who wrote it. + +Thus, it is not the intent of this section to claim rights or contest +your rights to work written entirely by you; rather, the intent is to +exercise the right to control the distribution of derivative or +collective works based on the Program. + +In addition, mere aggregation of another work not based on the Program +with the Program (or with a work based on the Program) on a volume of +a storage or distribution medium does not bring the other work under +the scope of this License. + + 3. You may copy and distribute the Program (or a work based on it, +under Section 2) in object code or executable form under the terms of +Sections 1 and 2 above provided that you also do one of the following: + + a) Accompany it with the complete corresponding machine-readable + source code, which must be distributed under the terms of Sections + 1 and 2 above on a medium customarily used for software interchange; or, + + b) Accompany it with a written offer, valid for at least three + years, to give any third party, for a charge no more than your + cost of physically performing source distribution, a complete + machine-readable copy of the corresponding source code, to be + distributed under the terms of Sections 1 and 2 above on a medium + customarily used for software interchange; or, + + c) Accompany it with the information you received as to the offer + to distribute corresponding source code. (This alternative is + allowed only for noncommercial distribution and only if you + received the program in object code or executable form with such + an offer, in accord with Subsection b above.) + +The source code for a work means the preferred form of the work for +making modifications to it. For an executable work, complete source +code means all the source code for all modules it contains, plus any +associated interface definition files, plus the scripts used to +control compilation and installation of the executable. However, as a +special exception, the source code distributed need not include +anything that is normally distributed (in either source or binary +form) with the major components (compiler, kernel, and so on) of the +operating system on which the executable runs, unless that component +itself accompanies the executable. + +If distribution of executable or object code is made by offering +access to copy from a designated place, then offering equivalent +access to copy the source code from the same place counts as +distribution of the source code, even though third parties are not +compelled to copy the source along with the object code. + + 4. You may not copy, modify, sublicense, or distribute the Program +except as expressly provided under this License. Any attempt +otherwise to copy, modify, sublicense or distribute the Program is +void, and will automatically terminate your rights under this License. +However, parties who have received copies, or rights, from you under +this License will not have their licenses terminated so long as such +parties remain in full compliance. + + 5. You are not required to accept this License, since you have not +signed it. However, nothing else grants you permission to modify or +distribute the Program or its derivative works. These actions are +prohibited by law if you do not accept this License. Therefore, by +modifying or distributing the Program (or any work based on the +Program), you indicate your acceptance of this License to do so, and +all its terms and conditions for copying, distributing or modifying +the Program or works based on it. + + 6. Each time you redistribute the Program (or any work based on the +Program), the recipient automatically receives a license from the +original licensor to copy, distribute or modify the Program subject to +these terms and conditions. You may not impose any further +restrictions on the recipients' exercise of the rights granted herein. +You are not responsible for enforcing compliance by third parties to +this License. + + 7. If, as a consequence of a court judgment or allegation of patent +infringement or for any other reason (not limited to patent issues), +conditions are imposed on you (whether by court order, agreement or +otherwise) that contradict the conditions of this License, they do not +excuse you from the conditions of this License. If you cannot +distribute so as to satisfy simultaneously your obligations under this +License and any other pertinent obligations, then as a consequence you +may not distribute the Program at all. For example, if a patent +license would not permit royalty-free redistribution of the Program by +all those who receive copies directly or indirectly through you, then +the only way you could satisfy both it and this License would be to +refrain entirely from distribution of the Program. + +If any portion of this section is held invalid or unenforceable under +any particular circumstance, the balance of the section is intended to +apply and the section as a whole is intended to apply in other +circumstances. + +It is not the purpose of this section to induce you to infringe any +patents or other property right claims or to contest validity of any +such claims; this section has the sole purpose of protecting the +integrity of the free software distribution system, which is +implemented by public license practices. Many people have made +generous contributions to the wide range of software distributed +through that system in reliance on consistent application of that +system; it is up to the author/donor to decide if he or she is willing +to distribute software through any other system and a licensee cannot +impose that choice. + +This section is intended to make thoroughly clear what is believed to +be a consequence of the rest of this License. + + 8. If the distribution and/or use of the Program is restricted in +certain countries either by patents or by copyrighted interfaces, the +original copyright holder who places the Program under this License +may add an explicit geographical distribution limitation excluding +those countries, so that distribution is permitted only in or among +countries not thus excluded. In such case, this License incorporates +the limitation as if written in the body of this License. + + 9. The Free Software Foundation may publish revised and/or new versions +of the General Public License from time to time. Such new versions will +be similar in spirit to the present version, but may differ in detail to +address new problems or concerns. + +Each version is given a distinguishing version number. If the Program +specifies a version number of this License which applies to it and "any +later version", you have the option of following the terms and conditions +either of that version or of any later version published by the Free +Software Foundation. If the Program does not specify a version number of +this License, you may choose any version ever published by the Free Software +Foundation. + + 10. If you wish to incorporate parts of the Program into other free +programs whose distribution conditions are different, write to the author +to ask for permission. For software which is copyrighted by the Free +Software Foundation, write to the Free Software Foundation; we sometimes +make exceptions for this. Our decision will be guided by the two goals +of preserving the free status of all derivatives of our free software and +of promoting the sharing and reuse of software generally. + + NO WARRANTY + + 11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY +FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN +OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES +PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED +OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF +MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS +TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE +PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, +REPAIR OR CORRECTION. + + 12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING +WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR +REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, +INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING +OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED +TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY +YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER +PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE +POSSIBILITY OF SUCH DAMAGES. + + END OF TERMS AND CONDITIONS + + How to Apply These Terms to Your New Programs + + If you develop a new program, and you want it to be of the greatest +possible use to the public, the best way to achieve this is to make it +free software which everyone can redistribute and change under these terms. + + To do so, attach the following notices to the program. It is safest +to attach them to the start of each source file to most effectively +convey the exclusion of warranty; and each file should have at least +the "copyright" line and a pointer to where the full notice is found. + + + Copyright (C) + + This program is free software; you can redistribute it and/or modify + it under the terms of the GNU General Public License as published by + the Free Software Foundation; either version 2 of the License, or + (at your option) any later version. + + This program is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU General Public License for more details. + + You should have received a copy of the GNU General Public License + along with this program; if not, write to the Free Software + Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA + + +Also add information on how to contact you by electronic and paper mail. + +If the program is interactive, make it output a short notice like this +when it starts in an interactive mode: + + Gnomovision version 69, Copyright (C) year name of author + Gnomovision comes with ABSOLUTELY NO WARRANTY; for details type `show w'. + This is free software, and you are welcome to redistribute it + under certain conditions; type `show c' for details. + +The hypothetical commands `show w' and `show c' should show the appropriate +parts of the General Public License. Of course, the commands you use may +be called something other than `show w' and `show c'; they could even be +mouse-clicks or menu items--whatever suits your program. + +You should also get your employer (if you work as a programmer) or your +school, if any, to sign a "copyright disclaimer" for the program, if +necessary. Here is a sample; alter the names: + + Yoyodyne, Inc., hereby disclaims all copyright interest in the program + `Gnomovision' (which makes passes at compilers) written by James Hacker. + + , 1 April 1989 + Ty Coon, President of Vice + +This General Public License does not permit incorporating your program into +proprietary programs. If your program is a subroutine library, you may +consider it more useful to permit linking proprietary applications with the +library. If this is what you want to do, use the GNU Library General +Public License instead of this License. diff --git a/data/refind/EFI/boot/drivers_aa64/btrfs_aa64.efi b/data/refind/EFI/boot/drivers_aa64/btrfs_aa64.efi new file mode 100644 index 0000000..5d4574f Binary files /dev/null and b/data/refind/EFI/boot/drivers_aa64/btrfs_aa64.efi differ diff --git a/data/refind/EFI/boot/drivers_aa64/ext2_aa64.efi b/data/refind/EFI/boot/drivers_aa64/ext2_aa64.efi new file mode 100644 index 0000000..14c9845 Binary files /dev/null and b/data/refind/EFI/boot/drivers_aa64/ext2_aa64.efi differ diff --git a/data/refind/EFI/boot/drivers_aa64/ext4_aa64.efi b/data/refind/EFI/boot/drivers_aa64/ext4_aa64.efi new file mode 100644 index 0000000..e7ed3ad Binary files /dev/null and b/data/refind/EFI/boot/drivers_aa64/ext4_aa64.efi differ diff --git a/data/refind/EFI/boot/drivers_aa64/hfs_aa64.efi b/data/refind/EFI/boot/drivers_aa64/hfs_aa64.efi new file mode 100644 index 0000000..2561845 Binary files /dev/null and b/data/refind/EFI/boot/drivers_aa64/hfs_aa64.efi differ diff --git a/data/refind/EFI/boot/drivers_aa64/iso9660_aa64.efi b/data/refind/EFI/boot/drivers_aa64/iso9660_aa64.efi new file mode 100644 index 0000000..d60cc27 Binary files /dev/null and b/data/refind/EFI/boot/drivers_aa64/iso9660_aa64.efi differ diff --git a/data/refind/EFI/boot/drivers_aa64/reiserfs_aa64.efi b/data/refind/EFI/boot/drivers_aa64/reiserfs_aa64.efi new file mode 100644 index 0000000..a1da1cb Binary files /dev/null and b/data/refind/EFI/boot/drivers_aa64/reiserfs_aa64.efi differ diff --git a/data/refind/EFI/boot/drivers_ia32/LICENSE.txt b/data/refind/EFI/boot/drivers_ia32/LICENSE.txt new file mode 100644 index 0000000..cdeae2b --- /dev/null +++ b/data/refind/EFI/boot/drivers_ia32/LICENSE.txt @@ -0,0 +1,47 @@ +Licensing for the filesystem drivers is complex. Three different licenses +apply to various parts of the code: + +* Christoph Pfisterer's original file system wrapper (FSW) code is covered + by a BSD-style license. Many of the source files with names that take the + form fsw_*.[ch] are so licensed, but this is NOT generally true of + filesystem-specific files (e.g., fsw_ext2.c or fsw_btrfs.c). + +* Certain filesystem drivers are licensed under the GPLv2, either because + they borrow code from the Linux kernel or because a developer (typically + Oracle) applied the GPLv2 license to them. This is true of the ext2fs, + ext4fs, ReiserFS, HFS+, and ISO-9660 drivers. + +* At least one filesystem driver (Btrfs) uses code taken from GRUB, and so + uses the GPLv3 (or later) license. + +Note that the GPLv2 and GPLv3 are, ironically, not compatible licenses. +Thus, code from GPLv2 and GPLv3 projects should not be mixed. The BSD +license used by Pfisterer's original code is compatible with both versions +of the GPL, so the fact that both GPLv2 and GPLv3 drivers is built upon it +is OK. If you intend to contribute to this project's drivers or use the +code yourself, please keep this fact in mind. + +The below was written by Christoph Pfisterer with respect to his original +code: + + File System Wrapper License +============================= + +The various parts of the File System Wrapper source code come from +different sources and may carry different licenses. Here's a quick +account of the situation: + + * The core code was written from scratch and is covered by a + BSD-style license. + + * The EFI host driver was written from scratch, possibly using code + from the TianoCore project and Intel's EFI Application Toolkit. It + is covered by a BSD-style license. + + * The ext2 and reiserfs file system drivers use definitions from the + Linux kernel source. The actual code was written from scratch, + using multiple sources for reference. These drivers are covered by + the GNU GPL. + +For more details, see each file's boilerplate comment. The full text +of the GNU GPL is in the file LICENSE_GPL.txt. diff --git a/data/refind/EFI/boot/drivers_ia32/LICENSE_GPL.txt b/data/refind/EFI/boot/drivers_ia32/LICENSE_GPL.txt new file mode 100644 index 0000000..d60c31a --- /dev/null +++ b/data/refind/EFI/boot/drivers_ia32/LICENSE_GPL.txt @@ -0,0 +1,340 @@ + GNU GENERAL PUBLIC LICENSE + Version 2, June 1991 + + Copyright (C) 1989, 1991 Free Software Foundation, Inc. + 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA + Everyone is permitted to copy and distribute verbatim copies + of this license document, but changing it is not allowed. + + Preamble + + The licenses for most software are designed to take away your +freedom to share and change it. By contrast, the GNU General Public +License is intended to guarantee your freedom to share and change free +software--to make sure the software is free for all its users. This +General Public License applies to most of the Free Software +Foundation's software and to any other program whose authors commit to +using it. (Some other Free Software Foundation software is covered by +the GNU Library General Public License instead.) You can apply it to +your programs, too. + + When we speak of free software, we are referring to freedom, not +price. Our General Public Licenses are designed to make sure that you +have the freedom to distribute copies of free software (and charge for +this service if you wish), that you receive source code or can get it +if you want it, that you can change the software or use pieces of it +in new free programs; and that you know you can do these things. + + To protect your rights, we need to make restrictions that forbid +anyone to deny you these rights or to ask you to surrender the rights. +These restrictions translate to certain responsibilities for you if you +distribute copies of the software, or if you modify it. + + For example, if you distribute copies of such a program, whether +gratis or for a fee, you must give the recipients all the rights that +you have. You must make sure that they, too, receive or can get the +source code. And you must show them these terms so they know their +rights. + + We protect your rights with two steps: (1) copyright the software, and +(2) offer you this license which gives you legal permission to copy, +distribute and/or modify the software. + + Also, for each author's protection and ours, we want to make certain +that everyone understands that there is no warranty for this free +software. If the software is modified by someone else and passed on, we +want its recipients to know that what they have is not the original, so +that any problems introduced by others will not reflect on the original +authors' reputations. + + Finally, any free program is threatened constantly by software +patents. We wish to avoid the danger that redistributors of a free +program will individually obtain patent licenses, in effect making the +program proprietary. To prevent this, we have made it clear that any +patent must be licensed for everyone's free use or not licensed at all. + + The precise terms and conditions for copying, distribution and +modification follow. + + GNU GENERAL PUBLIC LICENSE + TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION + + 0. This License applies to any program or other work which contains +a notice placed by the copyright holder saying it may be distributed +under the terms of this General Public License. The "Program", below, +refers to any such program or work, and a "work based on the Program" +means either the Program or any derivative work under copyright law: +that is to say, a work containing the Program or a portion of it, +either verbatim or with modifications and/or translated into another +language. (Hereinafter, translation is included without limitation in +the term "modification".) Each licensee is addressed as "you". + +Activities other than copying, distribution and modification are not +covered by this License; they are outside its scope. The act of +running the Program is not restricted, and the output from the Program +is covered only if its contents constitute a work based on the +Program (independent of having been made by running the Program). +Whether that is true depends on what the Program does. + + 1. You may copy and distribute verbatim copies of the Program's +source code as you receive it, in any medium, provided that you +conspicuously and appropriately publish on each copy an appropriate +copyright notice and disclaimer of warranty; keep intact all the +notices that refer to this License and to the absence of any warranty; +and give any other recipients of the Program a copy of this License +along with the Program. + +You may charge a fee for the physical act of transferring a copy, and +you may at your option offer warranty protection in exchange for a fee. + + 2. You may modify your copy or copies of the Program or any portion +of it, thus forming a work based on the Program, and copy and +distribute such modifications or work under the terms of Section 1 +above, provided that you also meet all of these conditions: + + a) You must cause the modified files to carry prominent notices + stating that you changed the files and the date of any change. + + b) You must cause any work that you distribute or publish, that in + whole or in part contains or is derived from the Program or any + part thereof, to be licensed as a whole at no charge to all third + parties under the terms of this License. + + c) If the modified program normally reads commands interactively + when run, you must cause it, when started running for such + interactive use in the most ordinary way, to print or display an + announcement including an appropriate copyright notice and a + notice that there is no warranty (or else, saying that you provide + a warranty) and that users may redistribute the program under + these conditions, and telling the user how to view a copy of this + License. (Exception: if the Program itself is interactive but + does not normally print such an announcement, your work based on + the Program is not required to print an announcement.) + +These requirements apply to the modified work as a whole. If +identifiable sections of that work are not derived from the Program, +and can be reasonably considered independent and separate works in +themselves, then this License, and its terms, do not apply to those +sections when you distribute them as separate works. But when you +distribute the same sections as part of a whole which is a work based +on the Program, the distribution of the whole must be on the terms of +this License, whose permissions for other licensees extend to the +entire whole, and thus to each and every part regardless of who wrote it. + +Thus, it is not the intent of this section to claim rights or contest +your rights to work written entirely by you; rather, the intent is to +exercise the right to control the distribution of derivative or +collective works based on the Program. + +In addition, mere aggregation of another work not based on the Program +with the Program (or with a work based on the Program) on a volume of +a storage or distribution medium does not bring the other work under +the scope of this License. + + 3. You may copy and distribute the Program (or a work based on it, +under Section 2) in object code or executable form under the terms of +Sections 1 and 2 above provided that you also do one of the following: + + a) Accompany it with the complete corresponding machine-readable + source code, which must be distributed under the terms of Sections + 1 and 2 above on a medium customarily used for software interchange; or, + + b) Accompany it with a written offer, valid for at least three + years, to give any third party, for a charge no more than your + cost of physically performing source distribution, a complete + machine-readable copy of the corresponding source code, to be + distributed under the terms of Sections 1 and 2 above on a medium + customarily used for software interchange; or, + + c) Accompany it with the information you received as to the offer + to distribute corresponding source code. (This alternative is + allowed only for noncommercial distribution and only if you + received the program in object code or executable form with such + an offer, in accord with Subsection b above.) + +The source code for a work means the preferred form of the work for +making modifications to it. For an executable work, complete source +code means all the source code for all modules it contains, plus any +associated interface definition files, plus the scripts used to +control compilation and installation of the executable. However, as a +special exception, the source code distributed need not include +anything that is normally distributed (in either source or binary +form) with the major components (compiler, kernel, and so on) of the +operating system on which the executable runs, unless that component +itself accompanies the executable. + +If distribution of executable or object code is made by offering +access to copy from a designated place, then offering equivalent +access to copy the source code from the same place counts as +distribution of the source code, even though third parties are not +compelled to copy the source along with the object code. + + 4. You may not copy, modify, sublicense, or distribute the Program +except as expressly provided under this License. Any attempt +otherwise to copy, modify, sublicense or distribute the Program is +void, and will automatically terminate your rights under this License. +However, parties who have received copies, or rights, from you under +this License will not have their licenses terminated so long as such +parties remain in full compliance. + + 5. You are not required to accept this License, since you have not +signed it. However, nothing else grants you permission to modify or +distribute the Program or its derivative works. These actions are +prohibited by law if you do not accept this License. Therefore, by +modifying or distributing the Program (or any work based on the +Program), you indicate your acceptance of this License to do so, and +all its terms and conditions for copying, distributing or modifying +the Program or works based on it. + + 6. Each time you redistribute the Program (or any work based on the +Program), the recipient automatically receives a license from the +original licensor to copy, distribute or modify the Program subject to +these terms and conditions. You may not impose any further +restrictions on the recipients' exercise of the rights granted herein. +You are not responsible for enforcing compliance by third parties to +this License. + + 7. If, as a consequence of a court judgment or allegation of patent +infringement or for any other reason (not limited to patent issues), +conditions are imposed on you (whether by court order, agreement or +otherwise) that contradict the conditions of this License, they do not +excuse you from the conditions of this License. If you cannot +distribute so as to satisfy simultaneously your obligations under this +License and any other pertinent obligations, then as a consequence you +may not distribute the Program at all. For example, if a patent +license would not permit royalty-free redistribution of the Program by +all those who receive copies directly or indirectly through you, then +the only way you could satisfy both it and this License would be to +refrain entirely from distribution of the Program. + +If any portion of this section is held invalid or unenforceable under +any particular circumstance, the balance of the section is intended to +apply and the section as a whole is intended to apply in other +circumstances. + +It is not the purpose of this section to induce you to infringe any +patents or other property right claims or to contest validity of any +such claims; this section has the sole purpose of protecting the +integrity of the free software distribution system, which is +implemented by public license practices. Many people have made +generous contributions to the wide range of software distributed +through that system in reliance on consistent application of that +system; it is up to the author/donor to decide if he or she is willing +to distribute software through any other system and a licensee cannot +impose that choice. + +This section is intended to make thoroughly clear what is believed to +be a consequence of the rest of this License. + + 8. If the distribution and/or use of the Program is restricted in +certain countries either by patents or by copyrighted interfaces, the +original copyright holder who places the Program under this License +may add an explicit geographical distribution limitation excluding +those countries, so that distribution is permitted only in or among +countries not thus excluded. In such case, this License incorporates +the limitation as if written in the body of this License. + + 9. The Free Software Foundation may publish revised and/or new versions +of the General Public License from time to time. Such new versions will +be similar in spirit to the present version, but may differ in detail to +address new problems or concerns. + +Each version is given a distinguishing version number. If the Program +specifies a version number of this License which applies to it and "any +later version", you have the option of following the terms and conditions +either of that version or of any later version published by the Free +Software Foundation. If the Program does not specify a version number of +this License, you may choose any version ever published by the Free Software +Foundation. + + 10. If you wish to incorporate parts of the Program into other free +programs whose distribution conditions are different, write to the author +to ask for permission. For software which is copyrighted by the Free +Software Foundation, write to the Free Software Foundation; we sometimes +make exceptions for this. Our decision will be guided by the two goals +of preserving the free status of all derivatives of our free software and +of promoting the sharing and reuse of software generally. + + NO WARRANTY + + 11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY +FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN +OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES +PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED +OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF +MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS +TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE +PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, +REPAIR OR CORRECTION. + + 12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING +WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR +REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, +INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING +OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED +TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY +YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER +PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE +POSSIBILITY OF SUCH DAMAGES. + + END OF TERMS AND CONDITIONS + + How to Apply These Terms to Your New Programs + + If you develop a new program, and you want it to be of the greatest +possible use to the public, the best way to achieve this is to make it +free software which everyone can redistribute and change under these terms. + + To do so, attach the following notices to the program. It is safest +to attach them to the start of each source file to most effectively +convey the exclusion of warranty; and each file should have at least +the "copyright" line and a pointer to where the full notice is found. + + + Copyright (C) + + This program is free software; you can redistribute it and/or modify + it under the terms of the GNU General Public License as published by + the Free Software Foundation; either version 2 of the License, or + (at your option) any later version. + + This program is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU General Public License for more details. + + You should have received a copy of the GNU General Public License + along with this program; if not, write to the Free Software + Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA + + +Also add information on how to contact you by electronic and paper mail. + +If the program is interactive, make it output a short notice like this +when it starts in an interactive mode: + + Gnomovision version 69, Copyright (C) year name of author + Gnomovision comes with ABSOLUTELY NO WARRANTY; for details type `show w'. + This is free software, and you are welcome to redistribute it + under certain conditions; type `show c' for details. + +The hypothetical commands `show w' and `show c' should show the appropriate +parts of the General Public License. Of course, the commands you use may +be called something other than `show w' and `show c'; they could even be +mouse-clicks or menu items--whatever suits your program. + +You should also get your employer (if you work as a programmer) or your +school, if any, to sign a "copyright disclaimer" for the program, if +necessary. Here is a sample; alter the names: + + Yoyodyne, Inc., hereby disclaims all copyright interest in the program + `Gnomovision' (which makes passes at compilers) written by James Hacker. + + , 1 April 1989 + Ty Coon, President of Vice + +This General Public License does not permit incorporating your program into +proprietary programs. If your program is a subroutine library, you may +consider it more useful to permit linking proprietary applications with the +library. If this is what you want to do, use the GNU Library General +Public License instead of this License. diff --git a/data/refind/EFI/boot/drivers_ia32/btrfs_ia32.efi b/data/refind/EFI/boot/drivers_ia32/btrfs_ia32.efi new file mode 100644 index 0000000..fdf57e9 Binary files /dev/null and b/data/refind/EFI/boot/drivers_ia32/btrfs_ia32.efi differ diff --git a/data/refind/EFI/boot/drivers_ia32/ext2_ia32.efi b/data/refind/EFI/boot/drivers_ia32/ext2_ia32.efi new file mode 100644 index 0000000..0f9729a Binary files /dev/null and b/data/refind/EFI/boot/drivers_ia32/ext2_ia32.efi differ diff --git a/data/refind/EFI/boot/drivers_ia32/ext4_ia32.efi b/data/refind/EFI/boot/drivers_ia32/ext4_ia32.efi new file mode 100644 index 0000000..050e0b3 Binary files /dev/null and b/data/refind/EFI/boot/drivers_ia32/ext4_ia32.efi differ diff --git a/data/refind/EFI/boot/drivers_ia32/hfs_ia32.efi b/data/refind/EFI/boot/drivers_ia32/hfs_ia32.efi new file mode 100644 index 0000000..e394e5d Binary files /dev/null and b/data/refind/EFI/boot/drivers_ia32/hfs_ia32.efi differ diff --git a/data/refind/EFI/boot/drivers_ia32/iso9660_ia32.efi b/data/refind/EFI/boot/drivers_ia32/iso9660_ia32.efi new file mode 100644 index 0000000..ae64de5 Binary files /dev/null and b/data/refind/EFI/boot/drivers_ia32/iso9660_ia32.efi differ diff --git a/data/refind/EFI/boot/drivers_ia32/reiserfs_ia32.efi b/data/refind/EFI/boot/drivers_ia32/reiserfs_ia32.efi new file mode 100644 index 0000000..c5adf7e Binary files /dev/null and b/data/refind/EFI/boot/drivers_ia32/reiserfs_ia32.efi differ diff --git a/data/refind/EFI/boot/drivers_x64/LICENSE.txt b/data/refind/EFI/boot/drivers_x64/LICENSE.txt new file mode 100644 index 0000000..cdeae2b --- /dev/null +++ b/data/refind/EFI/boot/drivers_x64/LICENSE.txt @@ -0,0 +1,47 @@ +Licensing for the filesystem drivers is complex. Three different licenses +apply to various parts of the code: + +* Christoph Pfisterer's original file system wrapper (FSW) code is covered + by a BSD-style license. Many of the source files with names that take the + form fsw_*.[ch] are so licensed, but this is NOT generally true of + filesystem-specific files (e.g., fsw_ext2.c or fsw_btrfs.c). + +* Certain filesystem drivers are licensed under the GPLv2, either because + they borrow code from the Linux kernel or because a developer (typically + Oracle) applied the GPLv2 license to them. This is true of the ext2fs, + ext4fs, ReiserFS, HFS+, and ISO-9660 drivers. + +* At least one filesystem driver (Btrfs) uses code taken from GRUB, and so + uses the GPLv3 (or later) license. + +Note that the GPLv2 and GPLv3 are, ironically, not compatible licenses. +Thus, code from GPLv2 and GPLv3 projects should not be mixed. The BSD +license used by Pfisterer's original code is compatible with both versions +of the GPL, so the fact that both GPLv2 and GPLv3 drivers is built upon it +is OK. If you intend to contribute to this project's drivers or use the +code yourself, please keep this fact in mind. + +The below was written by Christoph Pfisterer with respect to his original +code: + + File System Wrapper License +============================= + +The various parts of the File System Wrapper source code come from +different sources and may carry different licenses. Here's a quick +account of the situation: + + * The core code was written from scratch and is covered by a + BSD-style license. + + * The EFI host driver was written from scratch, possibly using code + from the TianoCore project and Intel's EFI Application Toolkit. It + is covered by a BSD-style license. + + * The ext2 and reiserfs file system drivers use definitions from the + Linux kernel source. The actual code was written from scratch, + using multiple sources for reference. These drivers are covered by + the GNU GPL. + +For more details, see each file's boilerplate comment. The full text +of the GNU GPL is in the file LICENSE_GPL.txt. diff --git a/data/refind/EFI/boot/drivers_x64/LICENSE_GPL.txt b/data/refind/EFI/boot/drivers_x64/LICENSE_GPL.txt new file mode 100644 index 0000000..d60c31a --- /dev/null +++ b/data/refind/EFI/boot/drivers_x64/LICENSE_GPL.txt @@ -0,0 +1,340 @@ + GNU GENERAL PUBLIC LICENSE + Version 2, June 1991 + + Copyright (C) 1989, 1991 Free Software Foundation, Inc. + 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA + Everyone is permitted to copy and distribute verbatim copies + of this license document, but changing it is not allowed. + + Preamble + + The licenses for most software are designed to take away your +freedom to share and change it. By contrast, the GNU General Public +License is intended to guarantee your freedom to share and change free +software--to make sure the software is free for all its users. This +General Public License applies to most of the Free Software +Foundation's software and to any other program whose authors commit to +using it. (Some other Free Software Foundation software is covered by +the GNU Library General Public License instead.) You can apply it to +your programs, too. + + When we speak of free software, we are referring to freedom, not +price. Our General Public Licenses are designed to make sure that you +have the freedom to distribute copies of free software (and charge for +this service if you wish), that you receive source code or can get it +if you want it, that you can change the software or use pieces of it +in new free programs; and that you know you can do these things. + + To protect your rights, we need to make restrictions that forbid +anyone to deny you these rights or to ask you to surrender the rights. +These restrictions translate to certain responsibilities for you if you +distribute copies of the software, or if you modify it. + + For example, if you distribute copies of such a program, whether +gratis or for a fee, you must give the recipients all the rights that +you have. You must make sure that they, too, receive or can get the +source code. And you must show them these terms so they know their +rights. + + We protect your rights with two steps: (1) copyright the software, and +(2) offer you this license which gives you legal permission to copy, +distribute and/or modify the software. + + Also, for each author's protection and ours, we want to make certain +that everyone understands that there is no warranty for this free +software. If the software is modified by someone else and passed on, we +want its recipients to know that what they have is not the original, so +that any problems introduced by others will not reflect on the original +authors' reputations. + + Finally, any free program is threatened constantly by software +patents. We wish to avoid the danger that redistributors of a free +program will individually obtain patent licenses, in effect making the +program proprietary. To prevent this, we have made it clear that any +patent must be licensed for everyone's free use or not licensed at all. + + The precise terms and conditions for copying, distribution and +modification follow. + + GNU GENERAL PUBLIC LICENSE + TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION + + 0. This License applies to any program or other work which contains +a notice placed by the copyright holder saying it may be distributed +under the terms of this General Public License. The "Program", below, +refers to any such program or work, and a "work based on the Program" +means either the Program or any derivative work under copyright law: +that is to say, a work containing the Program or a portion of it, +either verbatim or with modifications and/or translated into another +language. (Hereinafter, translation is included without limitation in +the term "modification".) Each licensee is addressed as "you". + +Activities other than copying, distribution and modification are not +covered by this License; they are outside its scope. The act of +running the Program is not restricted, and the output from the Program +is covered only if its contents constitute a work based on the +Program (independent of having been made by running the Program). +Whether that is true depends on what the Program does. + + 1. You may copy and distribute verbatim copies of the Program's +source code as you receive it, in any medium, provided that you +conspicuously and appropriately publish on each copy an appropriate +copyright notice and disclaimer of warranty; keep intact all the +notices that refer to this License and to the absence of any warranty; +and give any other recipients of the Program a copy of this License +along with the Program. + +You may charge a fee for the physical act of transferring a copy, and +you may at your option offer warranty protection in exchange for a fee. + + 2. You may modify your copy or copies of the Program or any portion +of it, thus forming a work based on the Program, and copy and +distribute such modifications or work under the terms of Section 1 +above, provided that you also meet all of these conditions: + + a) You must cause the modified files to carry prominent notices + stating that you changed the files and the date of any change. + + b) You must cause any work that you distribute or publish, that in + whole or in part contains or is derived from the Program or any + part thereof, to be licensed as a whole at no charge to all third + parties under the terms of this License. + + c) If the modified program normally reads commands interactively + when run, you must cause it, when started running for such + interactive use in the most ordinary way, to print or display an + announcement including an appropriate copyright notice and a + notice that there is no warranty (or else, saying that you provide + a warranty) and that users may redistribute the program under + these conditions, and telling the user how to view a copy of this + License. (Exception: if the Program itself is interactive but + does not normally print such an announcement, your work based on + the Program is not required to print an announcement.) + +These requirements apply to the modified work as a whole. If +identifiable sections of that work are not derived from the Program, +and can be reasonably considered independent and separate works in +themselves, then this License, and its terms, do not apply to those +sections when you distribute them as separate works. But when you +distribute the same sections as part of a whole which is a work based +on the Program, the distribution of the whole must be on the terms of +this License, whose permissions for other licensees extend to the +entire whole, and thus to each and every part regardless of who wrote it. + +Thus, it is not the intent of this section to claim rights or contest +your rights to work written entirely by you; rather, the intent is to +exercise the right to control the distribution of derivative or +collective works based on the Program. + +In addition, mere aggregation of another work not based on the Program +with the Program (or with a work based on the Program) on a volume of +a storage or distribution medium does not bring the other work under +the scope of this License. + + 3. You may copy and distribute the Program (or a work based on it, +under Section 2) in object code or executable form under the terms of +Sections 1 and 2 above provided that you also do one of the following: + + a) Accompany it with the complete corresponding machine-readable + source code, which must be distributed under the terms of Sections + 1 and 2 above on a medium customarily used for software interchange; or, + + b) Accompany it with a written offer, valid for at least three + years, to give any third party, for a charge no more than your + cost of physically performing source distribution, a complete + machine-readable copy of the corresponding source code, to be + distributed under the terms of Sections 1 and 2 above on a medium + customarily used for software interchange; or, + + c) Accompany it with the information you received as to the offer + to distribute corresponding source code. (This alternative is + allowed only for noncommercial distribution and only if you + received the program in object code or executable form with such + an offer, in accord with Subsection b above.) + +The source code for a work means the preferred form of the work for +making modifications to it. For an executable work, complete source +code means all the source code for all modules it contains, plus any +associated interface definition files, plus the scripts used to +control compilation and installation of the executable. However, as a +special exception, the source code distributed need not include +anything that is normally distributed (in either source or binary +form) with the major components (compiler, kernel, and so on) of the +operating system on which the executable runs, unless that component +itself accompanies the executable. + +If distribution of executable or object code is made by offering +access to copy from a designated place, then offering equivalent +access to copy the source code from the same place counts as +distribution of the source code, even though third parties are not +compelled to copy the source along with the object code. + + 4. You may not copy, modify, sublicense, or distribute the Program +except as expressly provided under this License. Any attempt +otherwise to copy, modify, sublicense or distribute the Program is +void, and will automatically terminate your rights under this License. +However, parties who have received copies, or rights, from you under +this License will not have their licenses terminated so long as such +parties remain in full compliance. + + 5. You are not required to accept this License, since you have not +signed it. However, nothing else grants you permission to modify or +distribute the Program or its derivative works. These actions are +prohibited by law if you do not accept this License. Therefore, by +modifying or distributing the Program (or any work based on the +Program), you indicate your acceptance of this License to do so, and +all its terms and conditions for copying, distributing or modifying +the Program or works based on it. + + 6. Each time you redistribute the Program (or any work based on the +Program), the recipient automatically receives a license from the +original licensor to copy, distribute or modify the Program subject to +these terms and conditions. You may not impose any further +restrictions on the recipients' exercise of the rights granted herein. +You are not responsible for enforcing compliance by third parties to +this License. + + 7. If, as a consequence of a court judgment or allegation of patent +infringement or for any other reason (not limited to patent issues), +conditions are imposed on you (whether by court order, agreement or +otherwise) that contradict the conditions of this License, they do not +excuse you from the conditions of this License. If you cannot +distribute so as to satisfy simultaneously your obligations under this +License and any other pertinent obligations, then as a consequence you +may not distribute the Program at all. For example, if a patent +license would not permit royalty-free redistribution of the Program by +all those who receive copies directly or indirectly through you, then +the only way you could satisfy both it and this License would be to +refrain entirely from distribution of the Program. + +If any portion of this section is held invalid or unenforceable under +any particular circumstance, the balance of the section is intended to +apply and the section as a whole is intended to apply in other +circumstances. + +It is not the purpose of this section to induce you to infringe any +patents or other property right claims or to contest validity of any +such claims; this section has the sole purpose of protecting the +integrity of the free software distribution system, which is +implemented by public license practices. Many people have made +generous contributions to the wide range of software distributed +through that system in reliance on consistent application of that +system; it is up to the author/donor to decide if he or she is willing +to distribute software through any other system and a licensee cannot +impose that choice. + +This section is intended to make thoroughly clear what is believed to +be a consequence of the rest of this License. + + 8. If the distribution and/or use of the Program is restricted in +certain countries either by patents or by copyrighted interfaces, the +original copyright holder who places the Program under this License +may add an explicit geographical distribution limitation excluding +those countries, so that distribution is permitted only in or among +countries not thus excluded. In such case, this License incorporates +the limitation as if written in the body of this License. + + 9. The Free Software Foundation may publish revised and/or new versions +of the General Public License from time to time. Such new versions will +be similar in spirit to the present version, but may differ in detail to +address new problems or concerns. + +Each version is given a distinguishing version number. If the Program +specifies a version number of this License which applies to it and "any +later version", you have the option of following the terms and conditions +either of that version or of any later version published by the Free +Software Foundation. If the Program does not specify a version number of +this License, you may choose any version ever published by the Free Software +Foundation. + + 10. If you wish to incorporate parts of the Program into other free +programs whose distribution conditions are different, write to the author +to ask for permission. For software which is copyrighted by the Free +Software Foundation, write to the Free Software Foundation; we sometimes +make exceptions for this. Our decision will be guided by the two goals +of preserving the free status of all derivatives of our free software and +of promoting the sharing and reuse of software generally. + + NO WARRANTY + + 11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY +FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN +OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES +PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED +OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF +MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS +TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE +PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, +REPAIR OR CORRECTION. + + 12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING +WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR +REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, +INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING +OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED +TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY +YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER +PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE +POSSIBILITY OF SUCH DAMAGES. + + END OF TERMS AND CONDITIONS + + How to Apply These Terms to Your New Programs + + If you develop a new program, and you want it to be of the greatest +possible use to the public, the best way to achieve this is to make it +free software which everyone can redistribute and change under these terms. + + To do so, attach the following notices to the program. It is safest +to attach them to the start of each source file to most effectively +convey the exclusion of warranty; and each file should have at least +the "copyright" line and a pointer to where the full notice is found. + + + Copyright (C) + + This program is free software; you can redistribute it and/or modify + it under the terms of the GNU General Public License as published by + the Free Software Foundation; either version 2 of the License, or + (at your option) any later version. + + This program is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU General Public License for more details. + + You should have received a copy of the GNU General Public License + along with this program; if not, write to the Free Software + Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA + + +Also add information on how to contact you by electronic and paper mail. + +If the program is interactive, make it output a short notice like this +when it starts in an interactive mode: + + Gnomovision version 69, Copyright (C) year name of author + Gnomovision comes with ABSOLUTELY NO WARRANTY; for details type `show w'. + This is free software, and you are welcome to redistribute it + under certain conditions; type `show c' for details. + +The hypothetical commands `show w' and `show c' should show the appropriate +parts of the General Public License. Of course, the commands you use may +be called something other than `show w' and `show c'; they could even be +mouse-clicks or menu items--whatever suits your program. + +You should also get your employer (if you work as a programmer) or your +school, if any, to sign a "copyright disclaimer" for the program, if +necessary. Here is a sample; alter the names: + + Yoyodyne, Inc., hereby disclaims all copyright interest in the program + `Gnomovision' (which makes passes at compilers) written by James Hacker. + + , 1 April 1989 + Ty Coon, President of Vice + +This General Public License does not permit incorporating your program into +proprietary programs. If your program is a subroutine library, you may +consider it more useful to permit linking proprietary applications with the +library. If this is what you want to do, use the GNU Library General +Public License instead of this License. diff --git a/data/refind/EFI/boot/drivers_x64/btrfs_x64.efi b/data/refind/EFI/boot/drivers_x64/btrfs_x64.efi new file mode 100644 index 0000000..413eb77 Binary files /dev/null and b/data/refind/EFI/boot/drivers_x64/btrfs_x64.efi differ diff --git a/data/refind/EFI/boot/drivers_x64/ext2_x64.efi b/data/refind/EFI/boot/drivers_x64/ext2_x64.efi new file mode 100644 index 0000000..052a391 Binary files /dev/null and b/data/refind/EFI/boot/drivers_x64/ext2_x64.efi differ diff --git a/data/refind/EFI/boot/drivers_x64/ext4_x64.efi b/data/refind/EFI/boot/drivers_x64/ext4_x64.efi new file mode 100644 index 0000000..d9f78fe Binary files /dev/null and b/data/refind/EFI/boot/drivers_x64/ext4_x64.efi differ diff --git a/data/refind/EFI/boot/drivers_x64/hfs_x64.efi b/data/refind/EFI/boot/drivers_x64/hfs_x64.efi new file mode 100644 index 0000000..b1a33a6 Binary files /dev/null and b/data/refind/EFI/boot/drivers_x64/hfs_x64.efi differ diff --git a/data/refind/EFI/boot/drivers_x64/iso9660_x64.efi b/data/refind/EFI/boot/drivers_x64/iso9660_x64.efi new file mode 100644 index 0000000..e143e8c Binary files /dev/null and b/data/refind/EFI/boot/drivers_x64/iso9660_x64.efi differ diff --git a/data/refind/EFI/boot/drivers_x64/reiserfs_x64.efi b/data/refind/EFI/boot/drivers_x64/reiserfs_x64.efi new file mode 100644 index 0000000..72ebe7a Binary files /dev/null and b/data/refind/EFI/boot/drivers_x64/reiserfs_x64.efi differ diff --git a/data/refind/EFI/boot/icons/README b/data/refind/EFI/boot/icons/README new file mode 100644 index 0000000..bad6fab --- /dev/null +++ b/data/refind/EFI/boot/icons/README @@ -0,0 +1,193 @@ +This directory holds icons used by rEFInd. This file describes their +sources, both in overview and in file-by-file detail, and provides pointers +to the relevant licenses under which the icons are distributed. + +Icon Sources (Overview) +----------------------- + +- The AwOken 2.5 icon set + - Source: http://alecive.deviantart.com/art/AwOken-163570862 + - Copyright (c) 2013 by Alessandro Roncone (aka alecive on DeviantArt) + - License: Creative Commons Attribution-Share Alike 3.0 (CC-SA 3.0) + +- Original work for rEFInd + - Source: https://sourceforge.net/p/refind (this archive) + - Copyright (c) 2015-2017 by Roderick W. Smith + - License: LGPLv3+ or CC-SA 3.0 + +- Debian OS icon + - Source: https://commons.wikimedia.org/wiki/File:Debian-OpenLogo.svg + - Copyright (c) 1999 Debian Project + - License: LGPLv3+ or CC-SA 3.0 + +- Devuan OS icon + - Source: https://devuan.org/ui/img/devuan-emblem.svg + - Copyright (c) 2017 Dyne.org foundation + - License: CC-BY-SA 4.0 + +- Elementary OS icon + - Source: https://commons.wikimedia.org/wiki/File:Elementary_logo.svg + - Copyright (c) 2008 Dan Rabbit + - License: GPLv2+ + +- Endeavour OS icon + - Source: https://github.com/endeavouros-team/artwork-images-logo/blob/master/endeavouros-icon.png + - License: GPLv3 + +- Manjaro OS icon + - Source: https://commons.wikimedia.org/wiki/File:Manjaro-logo.svg + - Public domain + +- Ubuntu "animal" icons (through os_xenial.png) + - Source: https://wiki.ubuntu.com/Artwork/Official + - Copyright (c) 2014-2017 Canonical Ltd. + - License: CC-BY-SA 3.0 + +- Ubuntu "animal" icons (os_artful.png and os_bionic.png) + - Source: frank.heimes.canonical.com + - Copyright (c) 2017-2018 Canonical Ltd. + - License: CC-BY-SA-3.0 + +- Ubuntu standard icon (os_ubuntu.png) + - Source: https://logos.fandom.com/wiki/Ubuntu?file=Ubuntu_%25282022%2529.svg + - Copyright (c) 2022 Canonical Ltd. + - License: CC-BY-SA 3.0 + +- Void Linux icon + - Source: https://commons.wikimedia.org/wiki/File:Void_Linux_logo.svg + - Copyright: Public Domain + +Some icons have been altered from their original forms -- normally +conversion from SVG to PNG format, resizing, changes in coloration, or +addition of "drop shadow" effects. Details follow.... + +The "svg" subdirectory holds SVG versions of some icons (notably absent are +those based on the AwOken icon set). + +Icon Sources (Detail) +--------------------- + +Icons unchanged from AwOken 2.5: + +os_centos.png -- AwOken/clear/128x128/start-here/start-here-centos.png +os_chakra.png -- AwOken/clear/128x128/start-here/start-here-chakra.png +os_chrome.png -- AwOken/clear/128x128/apps/google-chrome1.png +os_crunchbang.png -- AwOken/clear/128x128/start-here/start-here-crunchbang3.png +os_fedora.png -- AwOken/clear/128x128/start-here/start-here-fedora5.png +os_frugalware.png -- AwOken/clear/128x128/start-here/start-here-frugalware1.png +os_kubuntu.png -- AwOken/clear/128x128/start-here/start-here-kubuntu.png +os_lubuntu.png -- AwOken/clear/128x128/start-here/start-here-lubuntu.png +os_mageia.png -- AwOken/clear/128x128/start-here/start-here-mageia.png +os_mandriva.png -- AwOken/clear/128x128/start-here/start-here-mandriva5.png +os_network.png -- AwOken/clear/128x128/places/network-workgroup1.png +os_uefi.png -- AwOkenWhite/clear/128x128/start-here/start-here-umbrella3.png +os_unknown.png -- AwOken/clear/128x128/actions/color-line1.png +os_win8.png -- AwOken/clear/128x128/apps/live1.png + + +Icons modified from AwOken 2.5: + +arrow_left.png -- AwOken/clear/128x128/actions/go-previous.png +arrow_right.png -- AwOken/clear/128x128/actions/go-next.png +boot_linux.png -- AwOken/clear/128x128/apps/supertux.png +func_about.png -- AwOkenWhite/clear/128x128/actions/info2.png +func_install.png -- AwOken/AwOkenWhite/clear/24x24/actions/document-import.png +func_bootorder.png -- AwOkenWhite/clear/128x128/actions/format-list-ordered.png +func_exit.png -- AwOkenWhite/clear/128x128/actions/application-exit2.png +func_firmware.png -- AwOkenWhite/clear/128x128/status/indicator-cpufreq.png +func_reset.png -- AwOkenWhite/clear/128x128/apps/gnome-session-reboot2.png +func_shutdown.png -- AwOkenWhite/clear/128x128/apps/gnome-session-halt2.png +os_arch.png -- AwOkenWhite/clear/128x128/start-here/start-here-arch3.png +os_clover.png -- AwOkenWhite/clear/128x128/actions/tools-wizard.png +os_gentoo.png -- AwOken/clear/128x128/start-here/start-here-gentoo.png +os_hwtest.png -- AwOkenWhite/clear/128x128/apps/hw.png +os_linux.png -- AwOkenWhite/clear/128x128/apps/supertux.png +os_linuxmint.png -- AwOkenWhite/clear/128x128/start-here/start-here-mint3.png +os_opensuse.png -- AwOkenWhite/clear/128x128/start-here/start-here-suse3.png +os_slackware.png -- AwOkenWhite/clear/128x128/start-here/start-here-slackware1.png +os_suse.png -- AwOkenWhite/clear/128x128/start-here/start-here-suse3.png +os_xubuntu.png -- AwOkenWhite/clear/128x128/start-here/start-here-xubuntu1.png +tool_mok_tool.png -- AwOkenWhite/clear/128x128/apps/gnome-keyring-manager.png +tool_netboot.png -- AwOken/clear/128x128/places/network-workgroup1.png +tool_shell.png -- AwOken/clear/128x128/apps/terminal3.png +vol_efi.png -- AwOkenWhite/clear/128x128/status/indicator-cpufreq.png +vol_external.png -- AwOkenWhite/clear/128x128/devices/drive-removable-media-usb2.png +vol_internal.png -- AwOken/clear/128/128/drive-harddisk/Internal.png +vol_net.png -- AwOken/clear/128/128/drive-harddisk/Server.png +vol_optical.png - AwOken/clear/128x128/devices/media-optical-cd1.png + + +Modified Elementary OS icon: + +os_elementary.png (GPLv2+) + + +Modified Debian OS icon: + +os_debian.png (LGPLv3+ or CC-BY-SA 3.0) + + +Modified Void Linux icon: + +os_void.png (public domain) + + +Modified EndeavourOS icon: + +os_endeavouros.png + + +Modified Ubuntu icons: + +os_trusty.png +os_ubuntu.png +os_xenial.png +os_zesty.png + + +Icons created by me (Roderick W. Smith): + +boot_win.png +func_csr_rotate.png +mouse.png +os_clover.png +os_freebsd.png +os_gummiboot.png +os_haiku.png +os_legacy.png +os_mac.png +os_netbsd.png +os_redhat.png +os_refind.png +os_refit.png +os_win.png +tool_apple_rescue.png +tool_fwupdate.png +tool_memtest.png +tool_rescue.png +transparent.png + + +In addition, some icons are combinations of two other icons from different +sources: + +tool_part.png -- vol_internal.png with AwOken's gparted2.png +tool_windows_rescue.png: os_win8.png with AwOken's gnome_network_preferences.png + + +Licneses +-------- + +The "licenses" subdirectory contains the text of the relevant licenses: + +CC-SA 3.0: Creative Commons Legal Code.html + (See also https://creativecommons.org/licenses/by-sa/3.0/us/) + +GPLv2: gpl-2.0.txt + (see also https://www.gnu.org/licenses/old-licenses/gpl-2.0.en.html) + +GPLv3: gpl-3.0.txt + (see also https://www.gnu.org/licenses/gpl-3.0.html) + +LGPLv3: lgpl-3.0.txt + (see also http://www.gnu.org/licenses/lgpl-3.0.en.html) diff --git a/data/refind/EFI/boot/icons/arrow_left.png b/data/refind/EFI/boot/icons/arrow_left.png new file mode 100644 index 0000000..0f75265 Binary files /dev/null and b/data/refind/EFI/boot/icons/arrow_left.png differ diff --git a/data/refind/EFI/boot/icons/arrow_right.png b/data/refind/EFI/boot/icons/arrow_right.png new file mode 100644 index 0000000..9942eff Binary files /dev/null and b/data/refind/EFI/boot/icons/arrow_right.png differ diff --git a/data/refind/EFI/boot/icons/boot_linux.png b/data/refind/EFI/boot/icons/boot_linux.png new file mode 100644 index 0000000..4f52d7d Binary files /dev/null and b/data/refind/EFI/boot/icons/boot_linux.png differ diff --git a/data/refind/EFI/boot/icons/boot_win.png b/data/refind/EFI/boot/icons/boot_win.png new file mode 100644 index 0000000..f86202c Binary files /dev/null and b/data/refind/EFI/boot/icons/boot_win.png differ diff --git a/data/refind/EFI/boot/icons/func_about.png b/data/refind/EFI/boot/icons/func_about.png new file mode 100644 index 0000000..ad35390 Binary files /dev/null and b/data/refind/EFI/boot/icons/func_about.png differ diff --git a/data/refind/EFI/boot/icons/func_bootorder.png b/data/refind/EFI/boot/icons/func_bootorder.png new file mode 100644 index 0000000..ecce133 Binary files /dev/null and b/data/refind/EFI/boot/icons/func_bootorder.png differ diff --git a/data/refind/EFI/boot/icons/func_csr_rotate.png b/data/refind/EFI/boot/icons/func_csr_rotate.png new file mode 100644 index 0000000..a88ee75 Binary files /dev/null and b/data/refind/EFI/boot/icons/func_csr_rotate.png differ diff --git a/data/refind/EFI/boot/icons/func_exit.png b/data/refind/EFI/boot/icons/func_exit.png new file mode 100644 index 0000000..9306492 Binary files /dev/null and b/data/refind/EFI/boot/icons/func_exit.png differ diff --git a/data/refind/EFI/boot/icons/func_firmware.png b/data/refind/EFI/boot/icons/func_firmware.png new file mode 100644 index 0000000..ca86be4 Binary files /dev/null and b/data/refind/EFI/boot/icons/func_firmware.png differ diff --git a/data/refind/EFI/boot/icons/func_hidden.png b/data/refind/EFI/boot/icons/func_hidden.png new file mode 100644 index 0000000..3334270 Binary files /dev/null and b/data/refind/EFI/boot/icons/func_hidden.png differ diff --git a/data/refind/EFI/boot/icons/func_install.png b/data/refind/EFI/boot/icons/func_install.png new file mode 100644 index 0000000..3fe2059 Binary files /dev/null and b/data/refind/EFI/boot/icons/func_install.png differ diff --git a/data/refind/EFI/boot/icons/func_reset.png b/data/refind/EFI/boot/icons/func_reset.png new file mode 100644 index 0000000..872f624 Binary files /dev/null and b/data/refind/EFI/boot/icons/func_reset.png differ diff --git a/data/refind/EFI/boot/icons/func_shutdown.png b/data/refind/EFI/boot/icons/func_shutdown.png new file mode 100644 index 0000000..c18b989 Binary files /dev/null and b/data/refind/EFI/boot/icons/func_shutdown.png differ diff --git a/data/refind/EFI/boot/icons/mouse.png b/data/refind/EFI/boot/icons/mouse.png new file mode 100644 index 0000000..7d6bd18 Binary files /dev/null and b/data/refind/EFI/boot/icons/mouse.png differ diff --git a/data/refind/EFI/boot/icons/os_arch.png b/data/refind/EFI/boot/icons/os_arch.png new file mode 100644 index 0000000..0d387b7 Binary files /dev/null and b/data/refind/EFI/boot/icons/os_arch.png differ diff --git a/data/refind/EFI/boot/icons/os_artful.png b/data/refind/EFI/boot/icons/os_artful.png new file mode 100644 index 0000000..2114e66 Binary files /dev/null and b/data/refind/EFI/boot/icons/os_artful.png differ diff --git a/data/refind/EFI/boot/icons/os_bionic.png b/data/refind/EFI/boot/icons/os_bionic.png new file mode 100644 index 0000000..14c2cad Binary files /dev/null and b/data/refind/EFI/boot/icons/os_bionic.png differ diff --git a/data/refind/EFI/boot/icons/os_centos.png b/data/refind/EFI/boot/icons/os_centos.png new file mode 100644 index 0000000..d2a65b3 Binary files /dev/null and b/data/refind/EFI/boot/icons/os_centos.png differ diff --git a/data/refind/EFI/boot/icons/os_chakra.png b/data/refind/EFI/boot/icons/os_chakra.png new file mode 100644 index 0000000..365f3d5 Binary files /dev/null and b/data/refind/EFI/boot/icons/os_chakra.png differ diff --git a/data/refind/EFI/boot/icons/os_chrome.png b/data/refind/EFI/boot/icons/os_chrome.png new file mode 100644 index 0000000..158c829 Binary files /dev/null and b/data/refind/EFI/boot/icons/os_chrome.png differ diff --git a/data/refind/EFI/boot/icons/os_clover.png b/data/refind/EFI/boot/icons/os_clover.png new file mode 100644 index 0000000..b4c3b0f Binary files /dev/null and b/data/refind/EFI/boot/icons/os_clover.png differ diff --git a/data/refind/EFI/boot/icons/os_crunchbang.png b/data/refind/EFI/boot/icons/os_crunchbang.png new file mode 100644 index 0000000..9e192d3 Binary files /dev/null and b/data/refind/EFI/boot/icons/os_crunchbang.png differ diff --git a/data/refind/EFI/boot/icons/os_debian.png b/data/refind/EFI/boot/icons/os_debian.png new file mode 100644 index 0000000..8645db1 Binary files /dev/null and b/data/refind/EFI/boot/icons/os_debian.png differ diff --git a/data/refind/EFI/boot/icons/os_devuan.png b/data/refind/EFI/boot/icons/os_devuan.png new file mode 100644 index 0000000..dd11296 Binary files /dev/null and b/data/refind/EFI/boot/icons/os_devuan.png differ diff --git a/data/refind/EFI/boot/icons/os_elementary.png b/data/refind/EFI/boot/icons/os_elementary.png new file mode 100644 index 0000000..cec5fff Binary files /dev/null and b/data/refind/EFI/boot/icons/os_elementary.png differ diff --git a/data/refind/EFI/boot/icons/os_endeavouros.png b/data/refind/EFI/boot/icons/os_endeavouros.png new file mode 100644 index 0000000..75e77d2 Binary files /dev/null and b/data/refind/EFI/boot/icons/os_endeavouros.png differ diff --git a/data/refind/EFI/boot/icons/os_fedora.png b/data/refind/EFI/boot/icons/os_fedora.png new file mode 100644 index 0000000..24c2bcc Binary files /dev/null and b/data/refind/EFI/boot/icons/os_fedora.png differ diff --git a/data/refind/EFI/boot/icons/os_freebsd.png b/data/refind/EFI/boot/icons/os_freebsd.png new file mode 100644 index 0000000..ddfcec0 Binary files /dev/null and b/data/refind/EFI/boot/icons/os_freebsd.png differ diff --git a/data/refind/EFI/boot/icons/os_frugalware.png b/data/refind/EFI/boot/icons/os_frugalware.png new file mode 100644 index 0000000..b4cb4e1 Binary files /dev/null and b/data/refind/EFI/boot/icons/os_frugalware.png differ diff --git a/data/refind/EFI/boot/icons/os_gentoo.png b/data/refind/EFI/boot/icons/os_gentoo.png new file mode 100644 index 0000000..8f80c9d Binary files /dev/null and b/data/refind/EFI/boot/icons/os_gentoo.png differ diff --git a/data/refind/EFI/boot/icons/os_gummiboot.png b/data/refind/EFI/boot/icons/os_gummiboot.png new file mode 100644 index 0000000..06713b3 Binary files /dev/null and b/data/refind/EFI/boot/icons/os_gummiboot.png differ diff --git a/data/refind/EFI/boot/icons/os_haiku.png b/data/refind/EFI/boot/icons/os_haiku.png new file mode 100644 index 0000000..9ed2fc9 Binary files /dev/null and b/data/refind/EFI/boot/icons/os_haiku.png differ diff --git a/data/refind/EFI/boot/icons/os_hwtest.png b/data/refind/EFI/boot/icons/os_hwtest.png new file mode 100644 index 0000000..907ad69 Binary files /dev/null and b/data/refind/EFI/boot/icons/os_hwtest.png differ diff --git a/data/refind/EFI/boot/icons/os_kubuntu.png b/data/refind/EFI/boot/icons/os_kubuntu.png new file mode 100644 index 0000000..2fb3262 Binary files /dev/null and b/data/refind/EFI/boot/icons/os_kubuntu.png differ diff --git a/data/refind/EFI/boot/icons/os_legacy.png b/data/refind/EFI/boot/icons/os_legacy.png new file mode 100644 index 0000000..56d1ef5 Binary files /dev/null and b/data/refind/EFI/boot/icons/os_legacy.png differ diff --git a/data/refind/EFI/boot/icons/os_linux.png b/data/refind/EFI/boot/icons/os_linux.png new file mode 100644 index 0000000..b08caa6 Binary files /dev/null and b/data/refind/EFI/boot/icons/os_linux.png differ diff --git a/data/refind/EFI/boot/icons/os_linuxmint.png b/data/refind/EFI/boot/icons/os_linuxmint.png new file mode 100644 index 0000000..94fac7c Binary files /dev/null and b/data/refind/EFI/boot/icons/os_linuxmint.png differ diff --git a/data/refind/EFI/boot/icons/os_lubuntu.png b/data/refind/EFI/boot/icons/os_lubuntu.png new file mode 100644 index 0000000..3545e90 Binary files /dev/null and b/data/refind/EFI/boot/icons/os_lubuntu.png differ diff --git a/data/refind/EFI/boot/icons/os_mac.png b/data/refind/EFI/boot/icons/os_mac.png new file mode 100644 index 0000000..bb03018 Binary files /dev/null and b/data/refind/EFI/boot/icons/os_mac.png differ diff --git a/data/refind/EFI/boot/icons/os_mageia.png b/data/refind/EFI/boot/icons/os_mageia.png new file mode 100644 index 0000000..bb21a52 Binary files /dev/null and b/data/refind/EFI/boot/icons/os_mageia.png differ diff --git a/data/refind/EFI/boot/icons/os_mandriva.png b/data/refind/EFI/boot/icons/os_mandriva.png new file mode 100644 index 0000000..ccab520 Binary files /dev/null and b/data/refind/EFI/boot/icons/os_mandriva.png differ diff --git a/data/refind/EFI/boot/icons/os_manjaro.png b/data/refind/EFI/boot/icons/os_manjaro.png new file mode 100644 index 0000000..70b2477 Binary files /dev/null and b/data/refind/EFI/boot/icons/os_manjaro.png differ diff --git a/data/refind/EFI/boot/icons/os_netbsd.png b/data/refind/EFI/boot/icons/os_netbsd.png new file mode 100644 index 0000000..5fa8286 Binary files /dev/null and b/data/refind/EFI/boot/icons/os_netbsd.png differ diff --git a/data/refind/EFI/boot/icons/os_network.png b/data/refind/EFI/boot/icons/os_network.png new file mode 100644 index 0000000..2f19d30 Binary files /dev/null and b/data/refind/EFI/boot/icons/os_network.png differ diff --git a/data/refind/EFI/boot/icons/os_opensuse.png b/data/refind/EFI/boot/icons/os_opensuse.png new file mode 100644 index 0000000..3ac3673 Binary files /dev/null and b/data/refind/EFI/boot/icons/os_opensuse.png differ diff --git a/data/refind/EFI/boot/icons/os_redhat.png b/data/refind/EFI/boot/icons/os_redhat.png new file mode 100644 index 0000000..02f6547 Binary files /dev/null and b/data/refind/EFI/boot/icons/os_redhat.png differ diff --git a/data/refind/EFI/boot/icons/os_refind.png b/data/refind/EFI/boot/icons/os_refind.png new file mode 100644 index 0000000..bad3ee4 Binary files /dev/null and b/data/refind/EFI/boot/icons/os_refind.png differ diff --git a/data/refind/EFI/boot/icons/os_refit.png b/data/refind/EFI/boot/icons/os_refit.png new file mode 100644 index 0000000..deb4f73 Binary files /dev/null and b/data/refind/EFI/boot/icons/os_refit.png differ diff --git a/data/refind/EFI/boot/icons/os_slackware.png b/data/refind/EFI/boot/icons/os_slackware.png new file mode 100644 index 0000000..67f6d7e Binary files /dev/null and b/data/refind/EFI/boot/icons/os_slackware.png differ diff --git a/data/refind/EFI/boot/icons/os_suse.png b/data/refind/EFI/boot/icons/os_suse.png new file mode 100644 index 0000000..3ac3673 Binary files /dev/null and b/data/refind/EFI/boot/icons/os_suse.png differ diff --git a/data/refind/EFI/boot/icons/os_systemd.png b/data/refind/EFI/boot/icons/os_systemd.png new file mode 100644 index 0000000..06713b3 Binary files /dev/null and b/data/refind/EFI/boot/icons/os_systemd.png differ diff --git a/data/refind/EFI/boot/icons/os_trusty.png b/data/refind/EFI/boot/icons/os_trusty.png new file mode 100644 index 0000000..09e09fd Binary files /dev/null and b/data/refind/EFI/boot/icons/os_trusty.png differ diff --git a/data/refind/EFI/boot/icons/os_ubuntu.png b/data/refind/EFI/boot/icons/os_ubuntu.png new file mode 100644 index 0000000..ed9ed3a Binary files /dev/null and b/data/refind/EFI/boot/icons/os_ubuntu.png differ diff --git a/data/refind/EFI/boot/icons/os_uefi.png b/data/refind/EFI/boot/icons/os_uefi.png new file mode 100644 index 0000000..5bb2c84 Binary files /dev/null and b/data/refind/EFI/boot/icons/os_uefi.png differ diff --git a/data/refind/EFI/boot/icons/os_unknown.png b/data/refind/EFI/boot/icons/os_unknown.png new file mode 100644 index 0000000..e76e97d Binary files /dev/null and b/data/refind/EFI/boot/icons/os_unknown.png differ diff --git a/data/refind/EFI/boot/icons/os_void.png b/data/refind/EFI/boot/icons/os_void.png new file mode 100644 index 0000000..f41e3c1 Binary files /dev/null and b/data/refind/EFI/boot/icons/os_void.png differ diff --git a/data/refind/EFI/boot/icons/os_win.png b/data/refind/EFI/boot/icons/os_win.png new file mode 100644 index 0000000..ccacfaf Binary files /dev/null and b/data/refind/EFI/boot/icons/os_win.png differ diff --git a/data/refind/EFI/boot/icons/os_win8.png b/data/refind/EFI/boot/icons/os_win8.png new file mode 100644 index 0000000..f01af72 Binary files /dev/null and b/data/refind/EFI/boot/icons/os_win8.png differ diff --git a/data/refind/EFI/boot/icons/os_xenial.png b/data/refind/EFI/boot/icons/os_xenial.png new file mode 100644 index 0000000..92f949a Binary files /dev/null and b/data/refind/EFI/boot/icons/os_xenial.png differ diff --git a/data/refind/EFI/boot/icons/os_xubuntu.png b/data/refind/EFI/boot/icons/os_xubuntu.png new file mode 100644 index 0000000..8ee623d Binary files /dev/null and b/data/refind/EFI/boot/icons/os_xubuntu.png differ diff --git a/data/refind/EFI/boot/icons/os_zesty.png b/data/refind/EFI/boot/icons/os_zesty.png new file mode 100644 index 0000000..9fcc131 Binary files /dev/null and b/data/refind/EFI/boot/icons/os_zesty.png differ diff --git a/data/refind/EFI/boot/icons/tool_apple_rescue.png b/data/refind/EFI/boot/icons/tool_apple_rescue.png new file mode 100644 index 0000000..c1c637d Binary files /dev/null and b/data/refind/EFI/boot/icons/tool_apple_rescue.png differ diff --git a/data/refind/EFI/boot/icons/tool_fwupdate.png b/data/refind/EFI/boot/icons/tool_fwupdate.png new file mode 100644 index 0000000..a4d845a Binary files /dev/null and b/data/refind/EFI/boot/icons/tool_fwupdate.png differ diff --git a/data/refind/EFI/boot/icons/tool_memtest.png b/data/refind/EFI/boot/icons/tool_memtest.png new file mode 100644 index 0000000..7892c55 Binary files /dev/null and b/data/refind/EFI/boot/icons/tool_memtest.png differ diff --git a/data/refind/EFI/boot/icons/tool_mok_tool.png b/data/refind/EFI/boot/icons/tool_mok_tool.png new file mode 100644 index 0000000..42bc488 Binary files /dev/null and b/data/refind/EFI/boot/icons/tool_mok_tool.png differ diff --git a/data/refind/EFI/boot/icons/tool_netboot.png b/data/refind/EFI/boot/icons/tool_netboot.png new file mode 100644 index 0000000..09d2294 Binary files /dev/null and b/data/refind/EFI/boot/icons/tool_netboot.png differ diff --git a/data/refind/EFI/boot/icons/tool_part.png b/data/refind/EFI/boot/icons/tool_part.png new file mode 100644 index 0000000..4b7a07b Binary files /dev/null and b/data/refind/EFI/boot/icons/tool_part.png differ diff --git a/data/refind/EFI/boot/icons/tool_rescue.png b/data/refind/EFI/boot/icons/tool_rescue.png new file mode 100644 index 0000000..45de046 Binary files /dev/null and b/data/refind/EFI/boot/icons/tool_rescue.png differ diff --git a/data/refind/EFI/boot/icons/tool_shell.png b/data/refind/EFI/boot/icons/tool_shell.png new file mode 100644 index 0000000..b7fa2a7 Binary files /dev/null and b/data/refind/EFI/boot/icons/tool_shell.png differ diff --git a/data/refind/EFI/boot/icons/tool_windows_rescue.png b/data/refind/EFI/boot/icons/tool_windows_rescue.png new file mode 100644 index 0000000..19d1dd2 Binary files /dev/null and b/data/refind/EFI/boot/icons/tool_windows_rescue.png differ diff --git a/data/refind/EFI/boot/icons/transparent.png b/data/refind/EFI/boot/icons/transparent.png new file mode 100644 index 0000000..433cc88 Binary files /dev/null and b/data/refind/EFI/boot/icons/transparent.png differ diff --git a/data/refind/EFI/boot/icons/vol_efi.png b/data/refind/EFI/boot/icons/vol_efi.png new file mode 100644 index 0000000..6b5e8e8 Binary files /dev/null and b/data/refind/EFI/boot/icons/vol_efi.png differ diff --git a/data/refind/EFI/boot/icons/vol_external.png b/data/refind/EFI/boot/icons/vol_external.png new file mode 100644 index 0000000..4240d90 Binary files /dev/null and b/data/refind/EFI/boot/icons/vol_external.png differ diff --git a/data/refind/EFI/boot/icons/vol_internal.png b/data/refind/EFI/boot/icons/vol_internal.png new file mode 100644 index 0000000..ec5918a Binary files /dev/null and b/data/refind/EFI/boot/icons/vol_internal.png differ diff --git a/data/refind/EFI/boot/icons/vol_net.png b/data/refind/EFI/boot/icons/vol_net.png new file mode 100644 index 0000000..31e1f37 Binary files /dev/null and b/data/refind/EFI/boot/icons/vol_net.png differ diff --git a/data/refind/EFI/boot/icons/vol_optical.png b/data/refind/EFI/boot/icons/vol_optical.png new file mode 100644 index 0000000..2a7488b Binary files /dev/null and b/data/refind/EFI/boot/icons/vol_optical.png differ diff --git a/data/refind/EFI/boot/refind-dark/banners/refind.png b/data/refind/EFI/boot/refind-dark/banners/refind.png new file mode 100644 index 0000000..09b0b38 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/banners/refind.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/arrow_left.png b/data/refind/EFI/boot/refind-dark/icons/arrow_left.png new file mode 100644 index 0000000..e9905f3 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/arrow_left.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/arrow_right.png b/data/refind/EFI/boot/refind-dark/icons/arrow_right.png new file mode 100644 index 0000000..deae524 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/arrow_right.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/func_about.png b/data/refind/EFI/boot/refind-dark/icons/func_about.png new file mode 100644 index 0000000..613c450 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/func_about.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/func_bootorder.png b/data/refind/EFI/boot/refind-dark/icons/func_bootorder.png new file mode 100644 index 0000000..83d74eb Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/func_bootorder.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/func_csr_rotate.png b/data/refind/EFI/boot/refind-dark/icons/func_csr_rotate.png new file mode 100644 index 0000000..7863760 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/func_csr_rotate.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/func_exit.png b/data/refind/EFI/boot/refind-dark/icons/func_exit.png new file mode 100644 index 0000000..b68675a Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/func_exit.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/func_firmware.png b/data/refind/EFI/boot/refind-dark/icons/func_firmware.png new file mode 100644 index 0000000..8df14e8 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/func_firmware.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/func_hidden.png b/data/refind/EFI/boot/refind-dark/icons/func_hidden.png new file mode 100644 index 0000000..dfba326 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/func_hidden.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/func_install.png b/data/refind/EFI/boot/refind-dark/icons/func_install.png new file mode 100644 index 0000000..d4308fd Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/func_install.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/func_reset.png b/data/refind/EFI/boot/refind-dark/icons/func_reset.png new file mode 100644 index 0000000..3e05a6c Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/func_reset.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/func_shutdown.png b/data/refind/EFI/boot/refind-dark/icons/func_shutdown.png new file mode 100644 index 0000000..c915f98 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/func_shutdown.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_absolute.png b/data/refind/EFI/boot/refind-dark/icons/os_absolute.png new file mode 100644 index 0000000..cc4f1b4 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_absolute.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_academix.png b/data/refind/EFI/boot/refind-dark/icons/os_academix.png new file mode 100644 index 0000000..cd81081 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_academix.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_aix.png b/data/refind/EFI/boot/refind-dark/icons/os_aix.png new file mode 100644 index 0000000..c6af569 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_aix.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_alpine.png b/data/refind/EFI/boot/refind-dark/icons/os_alpine.png new file mode 100644 index 0000000..a57995d Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_alpine.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_alt.png b/data/refind/EFI/boot/refind-dark/icons/os_alt.png new file mode 100644 index 0000000..edce0a1 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_alt.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_altlinux.png b/data/refind/EFI/boot/refind-dark/icons/os_altlinux.png new file mode 100644 index 0000000..b50ffbf Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_altlinux.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_android-x86.png b/data/refind/EFI/boot/refind-dark/icons/os_android-x86.png new file mode 100644 index 0000000..e31ac9b Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_android-x86.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_android.png b/data/refind/EFI/boot/refind-dark/icons/os_android.png new file mode 100644 index 0000000..9a54047 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_android.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_antergos.png b/data/refind/EFI/boot/refind-dark/icons/os_antergos.png new file mode 100644 index 0000000..3c32bd1 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_antergos.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_antix.png b/data/refind/EFI/boot/refind-dark/icons/os_antix.png new file mode 100644 index 0000000..a5422a1 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_antix.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_apricity.png b/data/refind/EFI/boot/refind-dark/icons/os_apricity.png new file mode 100644 index 0000000..178a80b Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_apricity.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_arch.png b/data/refind/EFI/boot/refind-dark/icons/os_arch.png new file mode 100644 index 0000000..18cffe3 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_arch.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_arcolinux.png b/data/refind/EFI/boot/refind-dark/icons/os_arcolinux.png new file mode 100644 index 0000000..5bf4f6a Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_arcolinux.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_aryalinux.png b/data/refind/EFI/boot/refind-dark/icons/os_aryalinux.png new file mode 100644 index 0000000..61bc9b3 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_aryalinux.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_backbox.png b/data/refind/EFI/boot/refind-dark/icons/os_backbox.png new file mode 100644 index 0000000..d00d6a6 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_backbox.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_blackarch.png b/data/refind/EFI/boot/refind-dark/icons/os_blackarch.png new file mode 100644 index 0000000..5b4a086 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_blackarch.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_bodhi.png b/data/refind/EFI/boot/refind-dark/icons/os_bodhi.png new file mode 100644 index 0000000..634cc15 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_bodhi.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_bunsenlabs.png b/data/refind/EFI/boot/refind-dark/icons/os_bunsenlabs.png new file mode 100644 index 0000000..093673e Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_bunsenlabs.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_calculate.png b/data/refind/EFI/boot/refind-dark/icons/os_calculate.png new file mode 100644 index 0000000..dfb8245 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_calculate.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_cent.png b/data/refind/EFI/boot/refind-dark/icons/os_cent.png new file mode 100644 index 0000000..955b65d Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_cent.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_centos.png b/data/refind/EFI/boot/refind-dark/icons/os_centos.png new file mode 100644 index 0000000..7d233d9 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_centos.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_chakra.png b/data/refind/EFI/boot/refind-dark/icons/os_chakra.png new file mode 100644 index 0000000..61021c6 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_chakra.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_chrome.png b/data/refind/EFI/boot/refind-dark/icons/os_chrome.png new file mode 100644 index 0000000..1d46a58 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_chrome.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_chromium.png b/data/refind/EFI/boot/refind-dark/icons/os_chromium.png new file mode 100644 index 0000000..ddacd80 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_chromium.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_clover.png b/data/refind/EFI/boot/refind-dark/icons/os_clover.png new file mode 100644 index 0000000..bead470 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_clover.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_condres.png b/data/refind/EFI/boot/refind-dark/icons/os_condres.png new file mode 100644 index 0000000..0809cc4 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_condres.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_core.png b/data/refind/EFI/boot/refind-dark/icons/os_core.png new file mode 100644 index 0000000..0024658 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_core.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_crunchbang.png b/data/refind/EFI/boot/refind-dark/icons/os_crunchbang.png new file mode 100644 index 0000000..25b3e12 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_crunchbang.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_debian.png b/data/refind/EFI/boot/refind-dark/icons/os_debian.png new file mode 100644 index 0000000..cab0a6b Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_debian.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_deepin.png b/data/refind/EFI/boot/refind-dark/icons/os_deepin.png new file mode 100644 index 0000000..e9cbdc1 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_deepin.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_devuan.png b/data/refind/EFI/boot/refind-dark/icons/os_devuan.png new file mode 100644 index 0000000..6003903 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_devuan.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_elementary.png b/data/refind/EFI/boot/refind-dark/icons/os_elementary.png new file mode 100644 index 0000000..ac3ed33 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_elementary.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_elilo.png b/data/refind/EFI/boot/refind-dark/icons/os_elilo.png new file mode 100644 index 0000000..67e02a7 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_elilo.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_endeavour.png b/data/refind/EFI/boot/refind-dark/icons/os_endeavour.png new file mode 100644 index 0000000..a75905d Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_endeavour.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_fatdog.png b/data/refind/EFI/boot/refind-dark/icons/os_fatdog.png new file mode 100644 index 0000000..e57d47c Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_fatdog.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_fedora.png b/data/refind/EFI/boot/refind-dark/icons/os_fedora.png new file mode 100644 index 0000000..5472c1a Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_fedora.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_freebsd.png b/data/refind/EFI/boot/refind-dark/icons/os_freebsd.png new file mode 100644 index 0000000..a5fe81a Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_freebsd.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_freedos.png b/data/refind/EFI/boot/refind-dark/icons/os_freedos.png new file mode 100644 index 0000000..153d6cf Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_freedos.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_frugalware.png b/data/refind/EFI/boot/refind-dark/icons/os_frugalware.png new file mode 100644 index 0000000..636d953 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_frugalware.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_gentoo.png b/data/refind/EFI/boot/refind-dark/icons/os_gentoo.png new file mode 100644 index 0000000..ebf20a5 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_gentoo.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_ghostbsd.png b/data/refind/EFI/boot/refind-dark/icons/os_ghostbsd.png new file mode 100644 index 0000000..02c5d1c Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_ghostbsd.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_goofiboot.png b/data/refind/EFI/boot/refind-dark/icons/os_goofiboot.png new file mode 100644 index 0000000..c4cf6e4 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_goofiboot.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_grub.png b/data/refind/EFI/boot/refind-dark/icons/os_grub.png new file mode 100644 index 0000000..6f7d2da Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_grub.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_grubfm.png b/data/refind/EFI/boot/refind-dark/icons/os_grubfm.png new file mode 100644 index 0000000..c39863e Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_grubfm.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_gummiboot.png b/data/refind/EFI/boot/refind-dark/icons/os_gummiboot.png new file mode 100644 index 0000000..bead470 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_gummiboot.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_haiku.png b/data/refind/EFI/boot/refind-dark/icons/os_haiku.png new file mode 100644 index 0000000..e49b79c Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_haiku.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_hwtest.png b/data/refind/EFI/boot/refind-dark/icons/os_hwtest.png new file mode 100644 index 0000000..bead470 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_hwtest.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_kali.png b/data/refind/EFI/boot/refind-dark/icons/os_kali.png new file mode 100644 index 0000000..f41ecd7 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_kali.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_kaos.png b/data/refind/EFI/boot/refind-dark/icons/os_kaos.png new file mode 100644 index 0000000..5d975d8 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_kaos.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_knoppix.png b/data/refind/EFI/boot/refind-dark/icons/os_knoppix.png new file mode 100644 index 0000000..7efc3ed Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_knoppix.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_korora.png b/data/refind/EFI/boot/refind-dark/icons/os_korora.png new file mode 100644 index 0000000..9e63440 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_korora.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_kubuntu.png b/data/refind/EFI/boot/refind-dark/icons/os_kubuntu.png new file mode 100644 index 0000000..03da956 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_kubuntu.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_legacy.png b/data/refind/EFI/boot/refind-dark/icons/os_legacy.png new file mode 100644 index 0000000..bd2bb92 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_legacy.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_linux.png b/data/refind/EFI/boot/refind-dark/icons/os_linux.png new file mode 100644 index 0000000..654151e Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_linux.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_linuxmint.png b/data/refind/EFI/boot/refind-dark/icons/os_linuxmint.png new file mode 100644 index 0000000..7e5052b Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_linuxmint.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_lubuntu.png b/data/refind/EFI/boot/refind-dark/icons/os_lubuntu.png new file mode 100644 index 0000000..2ea03b4 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_lubuntu.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_mac.png b/data/refind/EFI/boot/refind-dark/icons/os_mac.png new file mode 100644 index 0000000..08030a2 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_mac.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_mac_alt.png b/data/refind/EFI/boot/refind-dark/icons/os_mac_alt.png new file mode 100644 index 0000000..660a878 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_mac_alt.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_mageia.png b/data/refind/EFI/boot/refind-dark/icons/os_mageia.png new file mode 100644 index 0000000..9ebb003 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_mageia.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_mandriva.png b/data/refind/EFI/boot/refind-dark/icons/os_mandriva.png new file mode 100644 index 0000000..cad99f7 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_mandriva.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_manjaro.png b/data/refind/EFI/boot/refind-dark/icons/os_manjaro.png new file mode 100644 index 0000000..6cf90f5 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_manjaro.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_msdos.png b/data/refind/EFI/boot/refind-dark/icons/os_msdos.png new file mode 100644 index 0000000..c33d8c4 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_msdos.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_mx.png b/data/refind/EFI/boot/refind-dark/icons/os_mx.png new file mode 100644 index 0000000..9b79212 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_mx.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_neon.png b/data/refind/EFI/boot/refind-dark/icons/os_neon.png new file mode 100644 index 0000000..7e05b41 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_neon.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_netbsd.png b/data/refind/EFI/boot/refind-dark/icons/os_netbsd.png new file mode 100644 index 0000000..2c289a7 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_netbsd.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_netrunner.png b/data/refind/EFI/boot/refind-dark/icons/os_netrunner.png new file mode 100644 index 0000000..fbbfe8f Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_netrunner.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_network.png b/data/refind/EFI/boot/refind-dark/icons/os_network.png new file mode 100644 index 0000000..bead470 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_network.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_nixos-alt.png b/data/refind/EFI/boot/refind-dark/icons/os_nixos-alt.png new file mode 100644 index 0000000..0694c51 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_nixos-alt.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_nixos.png b/data/refind/EFI/boot/refind-dark/icons/os_nixos.png new file mode 100644 index 0000000..0470ad3 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_nixos.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_oc.png b/data/refind/EFI/boot/refind-dark/icons/os_oc.png new file mode 100644 index 0000000..fa19ed3 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_oc.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_openbsd.png b/data/refind/EFI/boot/refind-dark/icons/os_openbsd.png new file mode 100644 index 0000000..efdeb42 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_openbsd.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_openmandriva.png b/data/refind/EFI/boot/refind-dark/icons/os_openmandriva.png new file mode 100644 index 0000000..1225fb7 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_openmandriva.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_opensuse.png b/data/refind/EFI/boot/refind-dark/icons/os_opensuse.png new file mode 100644 index 0000000..73b8dcb Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_opensuse.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_parabola.png b/data/refind/EFI/boot/refind-dark/icons/os_parabola.png new file mode 100644 index 0000000..848f946 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_parabola.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_parrot.png b/data/refind/EFI/boot/refind-dark/icons/os_parrot.png new file mode 100644 index 0000000..cb01422 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_parrot.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_pcbsd.png b/data/refind/EFI/boot/refind-dark/icons/os_pcbsd.png new file mode 100644 index 0000000..da84f50 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_pcbsd.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_pclinuxos.png b/data/refind/EFI/boot/refind-dark/icons/os_pclinuxos.png new file mode 100644 index 0000000..6dc249b Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_pclinuxos.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_phoenixos.png b/data/refind/EFI/boot/refind-dark/icons/os_phoenixos.png new file mode 100644 index 0000000..50aa807 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_phoenixos.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_pika.png b/data/refind/EFI/boot/refind-dark/icons/os_pika.png new file mode 100644 index 0000000..882ec53 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_pika.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_pikaos.png b/data/refind/EFI/boot/refind-dark/icons/os_pikaos.png new file mode 100644 index 0000000..882ec53 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_pikaos.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_pop.png b/data/refind/EFI/boot/refind-dark/icons/os_pop.png new file mode 100644 index 0000000..68d4156 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_pop.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_popos.png b/data/refind/EFI/boot/refind-dark/icons/os_popos.png new file mode 100644 index 0000000..22ac108 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_popos.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_puppy.png b/data/refind/EFI/boot/refind-dark/icons/os_puppy.png new file mode 100644 index 0000000..c171843 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_puppy.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_pureos.png b/data/refind/EFI/boot/refind-dark/icons/os_pureos.png new file mode 100644 index 0000000..eb8e6d8 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_pureos.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_q4os.png b/data/refind/EFI/boot/refind-dark/icons/os_q4os.png new file mode 100644 index 0000000..14b5d02 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_q4os.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_raspbian.png b/data/refind/EFI/boot/refind-dark/icons/os_raspbian.png new file mode 100644 index 0000000..5f163d6 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_raspbian.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_redhat.png b/data/refind/EFI/boot/refind-dark/icons/os_redhat.png new file mode 100644 index 0000000..d6deeb2 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_redhat.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_refind.png b/data/refind/EFI/boot/refind-dark/icons/os_refind.png new file mode 100644 index 0000000..b2db885 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_refind.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_refit.png b/data/refind/EFI/boot/refind-dark/icons/os_refit.png new file mode 100644 index 0000000..220448a Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_refit.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_remixos.png b/data/refind/EFI/boot/refind-dark/icons/os_remixos.png new file mode 100644 index 0000000..6a18588 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_remixos.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_rhel.png b/data/refind/EFI/boot/refind-dark/icons/os_rhel.png new file mode 100644 index 0000000..f8ce533 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_rhel.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_rosa.png b/data/refind/EFI/boot/refind-dark/icons/os_rosa.png new file mode 100644 index 0000000..f42158a Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_rosa.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_sabayon.png b/data/refind/EFI/boot/refind-dark/icons/os_sabayon.png new file mode 100644 index 0000000..00e6d4a Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_sabayon.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_salentos.png b/data/refind/EFI/boot/refind-dark/icons/os_salentos.png new file mode 100644 index 0000000..7da2153 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_salentos.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_slackware.png b/data/refind/EFI/boot/refind-dark/icons/os_slackware.png new file mode 100644 index 0000000..e5f89bc Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_slackware.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_smartos.png b/data/refind/EFI/boot/refind-dark/icons/os_smartos.png new file mode 100644 index 0000000..44db969 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_smartos.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_solus.png b/data/refind/EFI/boot/refind-dark/icons/os_solus.png new file mode 100644 index 0000000..c4cf6e4 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_solus.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_steam.png b/data/refind/EFI/boot/refind-dark/icons/os_steam.png new file mode 100644 index 0000000..5e3450d Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_steam.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_steamos.png b/data/refind/EFI/boot/refind-dark/icons/os_steamos.png new file mode 100644 index 0000000..e0d028c Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_steamos.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_suse.png b/data/refind/EFI/boot/refind-dark/icons/os_suse.png new file mode 100644 index 0000000..3bb924b Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_suse.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_syslinux.png b/data/refind/EFI/boot/refind-dark/icons/os_syslinux.png new file mode 100644 index 0000000..f60973b Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_syslinux.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_systemd-boot.png b/data/refind/EFI/boot/refind-dark/icons/os_systemd-boot.png new file mode 100644 index 0000000..bead470 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_systemd-boot.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_systemd.png b/data/refind/EFI/boot/refind-dark/icons/os_systemd.png new file mode 100644 index 0000000..d3a0837 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_systemd.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_tails.png b/data/refind/EFI/boot/refind-dark/icons/os_tails.png new file mode 100644 index 0000000..51d1455 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_tails.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_ubuntu.png b/data/refind/EFI/boot/refind-dark/icons/os_ubuntu.png new file mode 100644 index 0000000..b143cbf Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_ubuntu.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_ubuntubudgie.png b/data/refind/EFI/boot/refind-dark/icons/os_ubuntubudgie.png new file mode 100644 index 0000000..e807200 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_ubuntubudgie.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_ubuntudde.png b/data/refind/EFI/boot/refind-dark/icons/os_ubuntudde.png new file mode 100644 index 0000000..e0e308b Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_ubuntudde.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_ubuntugnome.png b/data/refind/EFI/boot/refind-dark/icons/os_ubuntugnome.png new file mode 100644 index 0000000..675b845 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_ubuntugnome.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_ubuntugnome_alt.png b/data/refind/EFI/boot/refind-dark/icons/os_ubuntugnome_alt.png new file mode 100644 index 0000000..60d53a0 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_ubuntugnome_alt.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_ubuntumate.png b/data/refind/EFI/boot/refind-dark/icons/os_ubuntumate.png new file mode 100644 index 0000000..be96674 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_ubuntumate.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_ubuntustudio.png b/data/refind/EFI/boot/refind-dark/icons/os_ubuntustudio.png new file mode 100644 index 0000000..2c8cdb0 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_ubuntustudio.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_ultimateedition.png b/data/refind/EFI/boot/refind-dark/icons/os_ultimateedition.png new file mode 100644 index 0000000..1ae6a42 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_ultimateedition.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_unknown.png b/data/refind/EFI/boot/refind-dark/icons/os_unknown.png new file mode 100644 index 0000000..bead470 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_unknown.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_void.png b/data/refind/EFI/boot/refind-dark/icons/os_void.png new file mode 100644 index 0000000..8414ccd Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_void.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_voyager.png b/data/refind/EFI/boot/refind-dark/icons/os_voyager.png new file mode 100644 index 0000000..ba4f786 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_voyager.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_win.png b/data/refind/EFI/boot/refind-dark/icons/os_win.png new file mode 100644 index 0000000..ba552ca Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_win.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_win11.png b/data/refind/EFI/boot/refind-dark/icons/os_win11.png new file mode 100644 index 0000000..4de9f59 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_win11.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_win8.png b/data/refind/EFI/boot/refind-dark/icons/os_win8.png new file mode 100644 index 0000000..4de9f59 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_win8.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_windows.png b/data/refind/EFI/boot/refind-dark/icons/os_windows.png new file mode 100644 index 0000000..acd1dc1 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_windows.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_xubuntu.png b/data/refind/EFI/boot/refind-dark/icons/os_xubuntu.png new file mode 100644 index 0000000..6432a9b Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_xubuntu.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/os_zorin.png b/data/refind/EFI/boot/refind-dark/icons/os_zorin.png new file mode 100644 index 0000000..e80154c Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/os_zorin.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/selection-big.png b/data/refind/EFI/boot/refind-dark/icons/selection-big.png new file mode 100644 index 0000000..5dc698d Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/selection-big.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/selection-small.png b/data/refind/EFI/boot/refind-dark/icons/selection-small.png new file mode 100644 index 0000000..5ba5697 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/selection-small.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/tool_apple_rescue.png b/data/refind/EFI/boot/refind-dark/icons/tool_apple_rescue.png new file mode 100644 index 0000000..6f12560 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/tool_apple_rescue.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/tool_fwupdate.png b/data/refind/EFI/boot/refind-dark/icons/tool_fwupdate.png new file mode 100644 index 0000000..006be26 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/tool_fwupdate.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/tool_memtest.png b/data/refind/EFI/boot/refind-dark/icons/tool_memtest.png new file mode 100644 index 0000000..caf07d6 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/tool_memtest.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/tool_mok_tool.png b/data/refind/EFI/boot/refind-dark/icons/tool_mok_tool.png new file mode 100644 index 0000000..3cb32fd Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/tool_mok_tool.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/tool_netboot.png b/data/refind/EFI/boot/refind-dark/icons/tool_netboot.png new file mode 100644 index 0000000..c8d7812 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/tool_netboot.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/tool_part.png b/data/refind/EFI/boot/refind-dark/icons/tool_part.png new file mode 100644 index 0000000..2fc6e08 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/tool_part.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/tool_rescue.png b/data/refind/EFI/boot/refind-dark/icons/tool_rescue.png new file mode 100644 index 0000000..6f12560 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/tool_rescue.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/tool_shell.png b/data/refind/EFI/boot/refind-dark/icons/tool_shell.png new file mode 100644 index 0000000..1c58f14 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/tool_shell.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/tool_windows_rescue.png b/data/refind/EFI/boot/refind-dark/icons/tool_windows_rescue.png new file mode 100644 index 0000000..6f12560 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/tool_windows_rescue.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/transparent.png b/data/refind/EFI/boot/refind-dark/icons/transparent.png new file mode 100644 index 0000000..acae616 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/transparent.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/vol_external.png b/data/refind/EFI/boot/refind-dark/icons/vol_external.png new file mode 100644 index 0000000..38fcac0 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/vol_external.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/vol_internal.png b/data/refind/EFI/boot/refind-dark/icons/vol_internal.png new file mode 100644 index 0000000..5938edb Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/vol_internal.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/vol_net.png b/data/refind/EFI/boot/refind-dark/icons/vol_net.png new file mode 100644 index 0000000..5ff01c4 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/vol_net.png differ diff --git a/data/refind/EFI/boot/refind-dark/icons/vol_optical.png b/data/refind/EFI/boot/refind-dark/icons/vol_optical.png new file mode 100644 index 0000000..5a4f491 Binary files /dev/null and b/data/refind/EFI/boot/refind-dark/icons/vol_optical.png differ diff --git a/data/refind/EFI/boot/refind-dark/refind-dark.conf b/data/refind/EFI/boot/refind-dark/refind-dark.conf new file mode 100755 index 0000000..7d16893 --- /dev/null +++ b/data/refind/EFI/boot/refind-dark/refind-dark.conf @@ -0,0 +1,24 @@ +#Theme by 2KAbhishek + +#Icons Config +big_icon_size 256 +small_icon_size 80 +icons_dir refind-dark/icons +selection_big refind-dark/icons/selection-big.png +selection_small refind-dark/icons/selection-small.png + +#Background Image +banner refind-dark/banners/refind.png + +#Timeout (auto select os) +#timeout -1 + +#Display, customize according to your display +resolution max + +#Graphics +use_graphics_for linux,grub,osx,windows + +#UI +#showtools shell, memtest, gdisk, firmware, hidden_tags, reboot, shutdown, exit + diff --git a/data/refind/EFI/boot/refind.conf b/data/refind/EFI/boot/refind.conf new file mode 100644 index 0000000..afb7c85 --- /dev/null +++ b/data/refind/EFI/boot/refind.conf @@ -0,0 +1,663 @@ +# +# refind.conf +# Configuration file for the rEFInd boot menu +# + +# Timeout in seconds for the main menu screen. Setting the timeout to 0 +# disables automatic booting (i.e., no timeout). Setting it to -1 causes +# an immediate boot to the default OS *UNLESS* a keypress is in the buffer +# when rEFInd launches, in which case that keypress is interpreted as a +# shortcut key. If no matching shortcut is found, rEFInd displays its +# menu with no timeout. +# +timeout 20 + +# Set the logging level. When set to 0, rEFInd does not log its actions. +# When set to 1 or above, rEFInd creates a file called refind.log in +# its home directory on the ESP and records information about what it's +# doing. Higher values record more information, up to a maximum of 4. +# This token should be left at the default of 0 except when debugging +# problems. +# Default value is 0 +# +#log_level 1 + +# Normally, when the timeout period has passed, rEFInd boots the +# default_selection. If the following option is uncommented, though, +# rEFInd will instead attempt to shut down the computer. +# CAUTION: MANY COMPUTERS WILL INSTEAD HANG OR REBOOT! Macs and more +# recent UEFI-based PCs are most likely to work with this feature. +# Default value is true +# +#shutdown_after_timeout + +# Whether to store rEFInd's rEFInd-specific variables in NVRAM (1, true, +# or on) or in files in the "vars" subdirectory of rEFInd's directory on +# disk (0, false, or off). Using NVRAM works well with most computers; +# however, it increases wear on the motherboard's NVRAM, and if the EFI +# is buggy or the NVRAM is old and worn out, it may not work at all. +# Storing variables on disk is a viable alternative in such cases, or +# if you want to minimize wear and tear on the NVRAM; however, it won't +# work if rEFInd is stored on a filesystem that's read-only to the EFI +# (such as an HFS+ volume), and it increases the risk of filesystem +# damage. Note that this option affects ONLY rEFInd's own variables, +# such as the PreviousBoot, HiddenTags, HiddenTools, and HiddenLegacy +# variables. It does NOT affect Secure Boot or other non-rEFInd +# variables. +# Default is true +# +use_nvram false + +# Screen saver timeout; the screen blanks after the specified number of +# seconds with no keyboard input. The screen returns after most keypresses +# (unfortunately, not including modifier keys such as Shift, Control, Alt, +# or Option). Setting a value of "-1" causes rEFInd to start up with its +# screen saver active. The default is 0, which disables the screen saver. +# +#screensaver 300 + +# Hide user interface elements for personal preference or to increase +# security: +# banner - the rEFInd title banner (built-in or loaded via "banner") +# label - boot option text label in the menu +# singleuser - remove the submenu options to boot macOS in single-user +# or verbose modes; affects ONLY macOS +# safemode - remove the submenu option to boot macOS in "safe mode" +# hwtest - the submenu option to run Apple's hardware test +# arrows - scroll arrows on the OS selection tag line +# hints - brief command summary in the menu +# editor - the options editor (+, F2, or Insert on boot options menu) +# badges - device-type badges for boot options +# all - all of the above +# Default is none of these (all elements active) +# +#hideui singleuser +#hideui all + +# Set the name of a subdirectory in which icons are stored. Icons must +# have the same names they have in the standard directory. The directory +# name is specified relative to the main rEFInd binary's directory. If +# an icon can't be found in the specified directory, an attempt is made +# to load it from the default directory; thus, you can replace just some +# icons in your own directory and rely on the default for others. +# Icon files may be in any supported format -- ICNS (*.icns), BMP (*.bmp), +# PNG (*.png), or JPEG (*.jpg or *.jpeg); however, rEFInd's BMP and JPEG +# implementations do not support transparency, which is highly desirable +# in icons. +# Default is "icons". +# +#icons_dir myicons +#icons_dir icons/snowy + +# Use a custom title banner instead of the rEFInd icon and name. The file +# path is relative to the directory where refind.efi is located. The color +# in the top left corner of the image is used as the background color +# for the menu screens. Currently uncompressed BMP images with color +# depths of 24, 8, 4 or 1 bits are supported, as well as PNG and JPEG +# images. (ICNS images can also be used, but ICNS has limitations that +# make it a poor choice for this purpose.) PNG and JPEG support is +# limited by the underlying libraries; some files, like progressive JPEGs, +# will not work. +# +#banner hostname.bmp +#banner mybanner.jpg +#banner icons/snowy/banner-snowy.png + +# Specify how to handle banners that aren't exactly the same as the screen +# size: +# noscale - Crop if too big, show with border if too small +# fillscreen - Fill the screen +# Default is noscale +# +#banner_scale fillscreen + +# Icon sizes. All icons are square, so just one value is specified. The +# big icons are used for OS selectors in the first row and the small +# icons are used for tools on the second row. Drive-type badges are 1/4 +# the size of the big icons. Legal values are 32 and above. If the icon +# files do not hold icons of the proper size, the icons are scaled to +# the specified size. The default values are 48 and 128 for small and +# big icons, respectively. +# +#small_icon_size 96 +#big_icon_size 256 + +# Custom images for the selection background. There is a big one (144 x 144) +# for the OS icons, and a small one (64 x 64) for the function icons in the +# second row. If only a small image is given, that one is also used for +# the big icons by stretching it in the middle. If only a big one is given, +# the built-in default will be used for the small icons. If an image other +# than the optimal size is specified, it will be scaled in a way that may +# be ugly. +# +# Like the banner option above, these options take a filename of an +# uncompressed BMP, PNG, JPEG, or ICNS image file with a color depth of +# 24, 8, 4, or 1 bits. The PNG or ICNS format is required if you need +# transparency support (to let you "see through" to a full-screen banner). +# +#selection_big selection-big.bmp +#selection_small selection-small.bmp + +# Set the font to be used for all textual displays in graphics mode. +# For best results, the font must be a PNG file with alpha channel +# transparency. It must contain ASCII characters 32-126 (space through +# tilde), inclusive, plus a glyph to be displayed in place of characters +# outside of this range, for a total of 96 glyphs. Only monospaced fonts +# are supported. Fonts may be of any size, although large fonts can +# produce display irregularities. +# The default is rEFInd's built-in font, Luxi Mono Regular 12 point. +# +#font myfont.png + +# Use text mode only. When enabled, this option forces rEFInd into text mode. +# Passing this option a "0" value causes graphics mode to be used. Pasing +# it no value or any non-0 value causes text mode to be used. +# Default is to use graphics mode. +# +#textonly + +# Set the EFI text mode to be used for textual displays. This option +# takes a single digit that refers to a mode number. Mode 0 is normally +# 80x25, 1 is sometimes 80x50, and higher numbers are system-specific +# modes. Mode 1024 is a special code that tells rEFInd to not set the +# text mode; it uses whatever was in use when the program was launched. +# If you specify an invalid mode, rEFInd pauses during boot to inform +# you of valid modes. +# CAUTION: On VirtualBox, and perhaps on some real computers, specifying +# a text mode and uncommenting the "textonly" option while NOT specifying +# a resolution can result in an unusable display in the booted OS. +# Default is 1024 (no change) +# +#textmode 2 + +# Set the screen's video resolution. Pass this option one of the following: +# * two integer values, corresponding to the X and Y resolutions +# * one integer value, corresponding to a GOP (UEFI) video mode +# * the string "max", which sets the maximum available resolution +# Note that not all resolutions are supported. On UEFI systems, passing +# an incorrect value results in a message being shown on the screen to +# that effect, along with a list of supported modes. On EFI 1.x systems +# (e.g., Macintoshes), setting an incorrect mode silently fails. On both +# types of systems, setting an incorrect resolution results in the default +# resolution being used. A resolution of 1024x768 usually works, but higher +# values often don't. +# Default is "0 0" (use the system default resolution, usually 800x600). +# +#resolution 1024 768 +#resolution 1440 900 +#resolution 3 +resolution max + +# Enable touch screen support. If active, this feature enables use of +# touch screen controls (as on tablets). Note, however, that not all +# tablets' EFIs provide the necessary underlying support, so this +# feature may not work for you. If it does work, you should be able +# to launch an OS or tool by touching it. In a submenu, touching +# anywhere launches the currently-selection item; there is, at present, +# no way to select a specific submenu item. This feature is mutually +# exclusive with the enable_mouse feature. If both are uncommented, +# the one read most recently takes precedence. +# +#enable_touch + +# Enable mouse support. If active, this feature enables use of the +# computer's mouse. Note, however, that not all computers' EFIs +# provide the necessary underlying support, so this feature may not +# work for you. If it does work, you should be able to launch an +# OS or tool by clicking it with the mouse pointer. This feature +# is mutually exclusive with the enable_touch feature. If both +# are uncommented, the one read most recently takes precedence. +# +#enable_mouse + +# Size of the mouse pointer, in pixels, per side. +# Default is 16 +# +#mouse_size 16 + +# Speed of mouse tracking. Higher numbers equate to faster +# mouse movement. This option requires that enable_mouse be +# uncommented. +# Legal values are between 1 and 32. Default is 4. +# +#mouse_speed 4 + +# Launch specified OSes in graphics mode. By default, rEFInd switches +# to text mode and displays basic pre-launch information when launching +# all OSes except macOS. Using graphics mode can produce a more seamless +# transition, but displays no information, which can make matters +# difficult if you must debug a problem. Also, on at least one known +# computer, using graphics mode prevents a crash when using the Linux +# kernel's EFI stub loader. You can specify an empty list to boot all +# OSes in text mode. +# Valid options: +# osx - macOS +# linux - A Linux kernel with EFI stub loader +# elilo - The ELILO boot loader +# grub - The GRUB (Legacy or 2) boot loader +# windows - Microsoft Windows +# Default value: osx +# +#use_graphics_for osx,linux + +# Which non-bootloader tools to show on the tools line, and in what +# order to display them: +# shell - the EFI shell (requires external program; see rEFInd +# documentation for details) +# memtest - the memtest86 program, in EFI/tools, EFI/memtest86, +# EFI/memtest, EFI/tools/memtest86, EFI/tools/memtest, +# or a boot loader's directory +# gptsync - the (dangerous) gptsync.efi utility (requires external +# program; see rEFInd documentation for details) +# gdisk - the gdisk partitioning program +# apple_recovery - boots the Apple Recovery HD partition, if present +# windows_recovery - boots an OEM Windows recovery tool, if present +# (see also the windows_recovery_files option) +# mok_tool - makes available the Machine Owner Key (MOK) maintenance +# tool, MokManager.efi, used on Secure Boot systems +# csr_rotate - adjusts Apple System Integrity Protection (SIP) +# policy. Requires "csr_values" to be set. +# install - an option to install rEFInd from the current location +# to another ESP +# bootorder - adjust the EFI's (NOT rEFInd's) boot order +# about - an "about this program" option +# hidden_tags - manage hidden tags +# exit - a tag to exit from rEFInd +# shutdown - shuts down the computer (a bug causes this to reboot +# many UEFI systems) +# reboot - a tag to reboot the computer +# firmware - a tag to reboot the computer into the firmware's +# user interface (ignored on older computers) +# fwupdate - a tag to update the firmware; launches the fwupx64.efi +# (or similar) program +# netboot - launch the ipxe.efi tool for network (PXE) booting +# Default is shell,memtest,gdisk,apple_recovery,windows_recovery,mok_tool,about,hidden_tags,shutdown,reboot,firmware,fwupdate +# To completely disable scanning for all tools, provide a showtools line +# with no options. +# +#showtools shell, bootorder, gdisk, memtest, mok_tool, apple_recovery, windows_recovery, about, hidden_tags, reboot, exit, firmware, fwupdate +showtools install,bootorder,shell,memtest,gdisk,apple_recovery,csr_rotate,windows_recovery,mok_tool,about,shutdown,reboot,firmware + +# Additional directories to scan for tools. You may specify a directory +# alone or a volume identifier plus pathname. The default is to scan no +# extra directories, beyond EFI/tools and any directory in which an EFI +# loader is found. +# +#also_scan_tool_dirs EFI/memtest,ESP2:/EFI/tools/memtest86 + +# Tool binaries to be excluded from the tools line, even if the +# general class is specified in showtools. This enables trimming an +# overabundance of tools, as when you see multiple mok_tool entries +# after installing multiple Linux distributions. +# Just as with dont_scan_files, you can specify a filename alone, a +# full pathname, or a volume identifier (filesystem label, partition +# name, or partition GUID) and a full pathname. +# Default is an empty list (nothing is excluded) +# +#dont_scan_tools ESP2:/EFI/ubuntu/mmx64.efi,gptsync_x64.efi + +# Boot loaders that can launch a Windows restore or emergency system. +# These tend to be OEM-specific. +# Default is LRS_ESP:/EFI/Microsoft/Boot/LrsBootmgr.efi +# +#windows_recovery_files LRS_ESP:/EFI/Microsoft/Boot/LrsBootmgr.efi + +# Directories in which to search for EFI drivers. These drivers can +# provide filesystem support, give access to hard disks on plug-in +# controllers, etc. In most cases none are needed, but if you add +# EFI drivers and you want rEFInd to automatically load them, you +# should specify one or more paths here. rEFInd always scans the +# "drivers" and "drivers_{arch}" subdirectories of its own installation +# directory (where "{arch}" is your architecture code); this option +# specifies ADDITIONAL directories to scan. +# Default is to scan no additional directories for EFI drivers +# +#scan_driver_dirs EFI/tools/drivers,drivers + +# Which types of boot loaders to search, and in what order to display them: +# internal - internal EFI disk-based boot loaders +# external - external EFI disk-based boot loaders +# optical - EFI optical discs (CD, DVD, etc.) +# netboot - EFI network (PXE) boot options +# hdbios - BIOS disk-based boot loaders +# biosexternal - BIOS external boot loaders (USB, eSATA, etc.) +# cd - BIOS optical-disc boot loaders +# manual - use stanzas later in this configuration file +# firmware - boot EFI programs set in the firmware's NVRAM +# Note that the legacy BIOS options require firmware support, which is +# not present on all computers. +# The netboot option is experimental and relies on the ipxe.efi and +# ipxe_discover.efi program files. +# On UEFI PCs, default is internal,external,optical,manual +# On Macs, default is internal,hdbios,external,biosexternal,optical,cd,manual +# +scanfor manual + +# By default, rEFInd relies on the UEFI firmware to detect BIOS-mode boot +# devices. This sometimes doesn't detect all the available devices, though. +# For these cases, uefi_deep_legacy_scan results in a forced scan and +# modification of NVRAM variables on each boot. Adding "0", "off", or +# "false" resets to the default value. This token has no effect on Macs or +# when no BIOS-mode options are set via scanfor. +# Default is unset (or "uefi_deep_legacy_scan false") +# +#uefi_deep_legacy_scan + +# Delay for the specified number of seconds before scanning disks. +# This can help some users who find that some of their disks +# (usually external or optical discs) aren't detected initially, +# but are detected after pressing Esc. +# The default is 0. +# +#scan_delay 5 + +# When scanning volumes for EFI boot loaders, rEFInd always looks for +# macOS's and Microsoft Windows' boot loaders in their normal locations, +# and scans the root directory and every subdirectory of the /EFI directory +# for additional boot loaders, but it doesn't recurse into these directories. +# The also_scan_dirs token adds more directories to the scan list. +# Directories are specified relative to the volume's root directory. This +# option applies to ALL the volumes that rEFInd scans UNLESS you include +# a volume name and colon before the directory name, as in "myvol:/somedir" +# to scan the somedir directory only on the filesystem named myvol. If a +# specified directory doesn't exist, it's ignored (no error condition +# results). The "+" symbol denotes appending to the list of scanned +# directories rather than overwriting that list. +# The default is to scan the "boot" and "@/boot" directories in addition +# to various hard-coded directories. +# +#also_scan_dirs boot,ESP2:EFI/linux/kernels +#also_scan_dirs boot,@/boot +#also_scan_dirs +,@/kernels + +# Partitions (or whole disks, for legacy-mode boots) to omit from scans. +# For EFI-mode scans, you normally specify a volume by its label, which you +# can obtain in an EFI shell by typing "vol", from Linux by typing +# "blkid /dev/{devicename}", or by examining the disk's label in various +# OSes' file browsers. It's also possible to identify a partition by its +# unique GUID (aka its "PARTUUID" in Linux parlance). (Note that this is +# NOT the partition TYPE CODE GUID.) This identifier can be obtained via +# "blkid" in Linux or "diskutil info {partition-id}" in macOS. +# For legacy-mode scans, you can specify any subset of the boot loader +# description shown when you highlight the option in rEFInd. +# The default is "LRS_ESP". +# +#dont_scan_volumes "Recovery HD" + +# Directories that should NOT be scanned for boot loaders. By default, +# rEFInd doesn't scan its own directory, the EFI/tools directory, the +# EFI/memtest directory, the EFI/memtest86 directory, or the +# com.apple.recovery.boot directory. Using the dont_scan_dirs option +# enables you to "blacklist" other directories; but be sure to use "+" +# as the first element if you want to continue blacklisting existing +# directories. You might use this token to keep EFI/boot/bootx64.efi out +# of the menu if that's a duplicate of another boot loader or to exclude +# a directory that holds drivers or non-bootloader utilities provided by +# a hardware manufacturer. If a directory is listed both here and in +# also_scan_dirs, dont_scan_dirs takes precedence. Note that this +# blacklist applies to ALL the filesystems that rEFInd scans, not just +# the ESP, unless you precede the directory name by a filesystem name or +# partition unique GUID, as in "myvol:EFI/somedir" to exclude EFI/somedir +# from the scan on the myvol volume but not on other volumes. +# +#dont_scan_dirs ESP:/EFI/boot,EFI/Dell,EFI/memtest86 + +# Files that should NOT be included as EFI boot loaders (on the +# first line of the display). If you're using a boot loader that +# relies on support programs or drivers that are installed alongside +# the main binary or if you want to "blacklist" certain loaders by +# name rather than location, use this option. Note that this will +# NOT prevent certain binaries from showing up in the second-row +# set of tools. Most notably, various Secure Boot and recovery +# tools are present in this list, but may appear as second-row +# items. +# The file may be specified as a bare name (e.g., "notme.efi"), as +# a complete pathname (e.g., "/EFI/somedir/notme.efi"), or as a +# complete pathname with volume (e.g., "SOMEDISK:/EFI/somedir/notme.efi" +# or 2C17D5ED-850D-4F76-BA31-47A561740082:/EFI/somedir/notme.efi"). +# OS tags hidden via the Delete or '-' key in the rEFInd menu are +# added to this list, but stored in NVRAM. +# The default is shim.efi,shim-fedora.efi,shimx64.efi,PreLoader.efi, +# TextMode.efi,ebounce.efi,GraphicsConsole.efi,MokManager.efi,HashTool.efi, +# HashTool-signed.efi,bootmgr.efi,fb{arch}.efi +# (where "{arch}" is the architecture code, like "x64"). +# If you want to keep these defaults but add to them, be sure to +# specify "+" as the first item in the new list; if you don't, then +# items from the default list are likely to appear. +# +#dont_scan_files shim.efi,MokManager.efi + +# EFI NVRAM Boot#### variables that should NOT be presented as loaders +# when "firmware" is an option to "scanfor". The comma-separated list +# presented here contains strings that are matched against the +# description field -- if a value here is a case-insensitive substring +# of the boot option description, then it will be excluded from the +# boot list. To specify a string that includes a space, enclose it +# in quotes. Specifying "shell" will counteract the automatic +# inclusion of built-in EFI shells. +# +#dont_scan_firmware HARDDISK,shell,"Removable Device" + +# Scan for Linux kernels that lack a ".efi" filename extension. This is +# useful for better integration with Linux distributions that provide +# kernels with EFI stub loaders but that don't give those kernels filenames +# that end in ".efi", particularly if the kernels are stored on a +# filesystem that the EFI can read. When set to "1", "true", or "on", this +# option causes all files in scanned directories with names that begin with +# "vmlinuz", "bzImage", or "kernel" to be included as loaders, even if they +# lack ".efi" extensions. Passing this option a "0", "false", or "off" value +# causes kernels without ".efi" extensions to NOT be scanned. +# Default is "true" -- to scan for kernels without ".efi" extensions. +# +#scan_all_linux_kernels false + +# Support loaders that have been compressed with gzip. +# On x86 and x86-64 platforms, Linux kernels are self-decompressing. +# On ARM64, Linux kernel files are typically compressed with gzip, +# including the EFI stub loader. This makes them unloadable in rEFInd +# unless rEFInd itself uncompresses them. This option enables rEFInd +# to do this. This feature is unnecessary on x86 and x86-64 systems. +# Default is "false" on x86 and x86-64; "true" on ARM64. +# +#support_gzipped_loaders true + +# Combine all Linux kernels in a given directory into a single entry. +# When so set, the kernel with the most recent time stamp will be launched +# by default, and its filename will appear in the entry's description. +# To launch other kernels, the user must press F2 or Insert; alternate +# kernels then appear as options on the sub-menu. +# Default is "true" -- kernels are "folded" into a single menu entry. +# +#fold_linux_kernels false + +# Filename prefixes that indicate a file is a Linux kernel. Files that +# begin with any of these strings are treated as Linux kernels, if they +# are also EFI boot loaders. To include the default string, use "+" +# Default is "vmlinuz,bzImage,kernel", except on ARM64, where it is +# "vmlinuz,Image,kernel". +# +#linux_prefixes vmlinuz,bzImage,kernel +#linux_prefixes +,zImage + +# Comma-delimited list of strings to treat as if they were numbers for the +# purpose of kernel version number detection. These strings are matched on a +# first-found basis; that is, if you want to treat both "linux-lts" and +# "linux" as version strings, they MUST be specified as "linux-lts,linux", +# since if you specify it the other way, both vmlinuz-linux and +# vmlinuz-linux-lts will return with "linux" as the "version string," which +# is not what you'd want. Also, if the kernel or initrd file includes both a +# specified string and digits, the "version string" includes both. For +# instance, "vmlinuz-linux-4.8" would yield a version string of "linux-4.8". +# This option is intended for Arch and other distributions that don't include +# version numbers in their kernel filenames, but may provide other uniquely +# identifying strings for multiple kernels. If this feature causes problems +# (say, if your kernel filename includes "linux" but the initrd filename +# doesn't), be sure this is set to an empty string +# (extra_kernel_version_strings "") or comment out the option to disable it. +# Default is no extra version strings +# +#extra_kernel_version_strings linux-lts,linux + +# Write to systemd EFI variables (currently only LoaderDevicePartUUID) when +# launching Linux via an EFI stub loader, ELILO, or GRUB. This variable, +# when present, causes systemd to mount the ESP at /boot or /efi *IF* either +# directory is empty and nothing else is mounted there. +# Default is "false" +# +#write_systemd_vars true + +# Symlinked loaders will be processed when this setting is set to true. +# These are ignored by default as they may result in undesirable outcomes. +# This token may, however, be useful on Linux setups that provide symbolic +# links in scanned locations that point to kernels in unscanned locations, +# such as some openSUSE installations. +# +#follow_symlinks true + +# Set the maximum number of tags that can be displayed on the screen at +# any time. If more loaders are discovered than this value, rEFInd shows +# a subset in a scrolling list. If this value is set too high for the +# screen to handle, it's reduced to the value that the screen can manage. +# If this value is set to 0 (the default), it's adjusted to the number +# that the screen can handle. +# +#max_tags 0 + +# Set the default menu selection. The available arguments match the +# keyboard accelerators available within rEFInd. You may select the +# default loader using: +# - A digit between 1 and 9, in which case the Nth loader in the menu +# will be the default. +# - A "+" symbol at the start of the string, which refers to the most +# recently booted loader. +# - Any substring that corresponds to a portion of the loader's title +# (usually the OS's name, boot loader's path, or a volume or +# filesystem title). +# You may also specify multiple selectors by separating them with commas +# and enclosing the list in quotes. (The "+" option is only meaningful in +# this context.) +# If you follow the selector(s) with two times, in 24-hour format, the +# default will apply only between those times. The times are in the +# motherboard's time standard, whether that's UTC or local time, so if +# you use UTC, you'll need to adjust this from local time manually. +# Times may span midnight as in "23:30 00:30", which applies to 11:30 PM +# to 12:30 AM. You may specify multiple default_selection lines, in which +# case the last one to match takes precedence. Thus, you can set a main +# option without a time followed by one or more that include times to +# set different defaults for different times of day. +# The default behavior is to boot the previously-booted OS. +# +#default_selection 1 +#default_selection Microsoft +#default_selection "+,bzImage,vmlinuz" +#default_selection Maintenance 23:30 2:00 +#default_selection "Maintenance,macOS" 1:00 2:30 + +# Enable VMX bit and lock the CPU MSR if unlocked. +# On some Intel Apple computers, the firmware does not lock the MSR 0x3A. +# The symptom on Windows is Hyper-V not working even if the CPU +# meets the minimum requirements (HW assisted virtualization and SLAT) +# DO NOT SET THIS EXCEPT ON INTEL CPUs THAT SUPPORT VMX! See +# http://www.thomas-krenn.com/en/wiki/Activating_the_Intel_VT_Virtualization_Feature +# for more on this subject. +# The default is false: Don't try to enable and lock the MSR. +# +#enable_and_lock_vmx false + +# Tell a Mac's EFI that macOS is about to be launched, even when it's not. +# This option causes some Macs to initialize their hardware differently than +# when a third-party OS is launched normally. In some cases (particularly on +# Macs with multiple video cards), using this option can cause hardware to +# work that would not otherwise work. On the other hand, using this option +# when it is not necessary can cause hardware (such as keyboards and mice) to +# become inaccessible. Therefore, you should not enable this option if your +# non-Apple OSes work correctly; enable it only if you have problems with +# some hardware devices. When needed, a value of "10.9" usually works, but +# you can experiment with other values. This feature has no effect on +# non-Apple computers. +# The default is inactive (no macOS spoofing is done). +# +#spoof_osx_version 10.9 + +# Set the CSR values for Apple's System Integrity Protection (SIP) feature. +# Values are two-byte (four-character) hexadecimal numbers. These values +# define which specific security features are enabled. Below are the codes +# for what the values mean. Add them up (in hexadecimal!) to set new values. +# Apple's "csrutil enable" and "csrutil disable" commands set values of 10 +# and 877, respectively. (Prior to OS 11, 77 was used rather than 877; 877 +# is required for OS 11, and should work for OS X 10.x, too.) +# CSR_ALLOW_UNTRUSTED_KEXTS 0x0001 +# CSR_ALLOW_UNRESTRICTED_FS 0x0002 +# CSR_ALLOW_TASK_FOR_PID 0x0004 +# CSR_ALLOW_KERNEL_DEBUGGER 0x0008 +# CSR_ALLOW_APPLE_INTERNAL 0x0010 +# CSR_ALLOW_UNRESTRICTED_DTRACE 0x0020 +# CSR_ALLOW_UNRESTRICTED_NVRAM 0x0040 +# CSR_ALLOW_DEVICE_CONFIGURATION 0x0080 +# CSR_ALLOW_ANY_RECOVERY_OS 0x0100 +# CSR_ALLOW_UNAPPROVED_KEXTS 0x0200 +# CSR_ALLOW_EXECUTABLE_POLICY_OVERRIDE 0x0400 +# CSR_ALLOW_UNAUTHENTICATED_ROOT 0x0800 +#csr_values 10,877 +csr_values 10,77 +csr_values 10,77 + +# Include a secondary configuration file within this one. This secondary +# file is loaded as if its options appeared at the point of the "include" +# token itself, so if you want to override a setting in the main file, +# the secondary file must be referenced AFTER the setting you want to +# override. Note that the secondary file may NOT load a tertiary file. +# +#include manual.conf + +# Sample manual configuration stanzas. Each begins with the "menuentry" +# keyword followed by a name that's to appear in the menu (use quotes +# if you want the name to contain a space) and an open curly brace +# ("{"). Each entry ends with a close curly brace ("}"). Common +# keywords within each stanza include: +# +# volume - identifies the filesystem from which subsequent files +# are loaded. You can specify the volume by filesystem +# label, by partition label, or by partition GUID number +# (but NOT yet by filesystem UUID number). +# loader - identifies the boot loader file +# initrd - Specifies an initial RAM disk file +# icon - specifies a custom boot loader icon +# ostype - OS type code to determine boot options available by +# pressing Insert. Valid values are "MacOS", "Linux", +# "Windows", and "XOM". Case-sensitive. +# graphics - set to "on" to enable graphics-mode boot (useful +# mainly for MacOS) or "off" for text-mode boot. +# Default is auto-detected from loader filename. +# options - sets options to be passed to the boot loader; use +# quotes if more than one option should be passed or +# if any options use characters that might be changed +# by rEFInd parsing procedures (=, /, #, or tab). +# disabled - use alone or set to "yes" to disable this entry. +# +# Note that you can use either DOS/Windows/EFI-style backslashes (\) +# or Unix-style forward slashes (/) as directory separators. Either +# way, all file references are on the ESP from which rEFInd was +# launched. +# Use of quotes around parameters causes them to be interpreted as +# one keyword, and for parsing of special characters (spaces, =, /, +# and #) to be disabled. This is useful mainly with the "options" +# keyword. Use of quotes around parameters that specify filenames is +# permissible, but you must then use backslashes instead of slashes, +# except when you must pass a forward slash to the loader, as when +# passing a root= option to a Linux kernel. + +menuentry "PikaOS Live Image" { + icon EFI/BOOT/REFIND-DARK/ICONS/OS_PIKAOS.PNG + loader EFI/VMLINUZ + initrd EFI/INITRD + options "boot=live quiet splash" + submenuentry "Boot live image with logging" { + options "boot=live" + } + submenuentry "Boot live image with safe graphics" { + options "boot=live nomodeset" + } +} + +include refind-dark/refind-dark.conf diff --git a/data/refind/EFI/boot/refind.conf-sample b/data/refind/EFI/boot/refind.conf-sample new file mode 100644 index 0000000..d130c2d --- /dev/null +++ b/data/refind/EFI/boot/refind.conf-sample @@ -0,0 +1,749 @@ +# +# refind.conf +# Configuration file for the rEFInd boot menu +# + +# Timeout in seconds for the main menu screen. Setting the timeout to 0 +# disables automatic booting (i.e., no timeout). Setting it to -1 causes +# an immediate boot to the default OS *UNLESS* a keypress is in the buffer +# when rEFInd launches, in which case that keypress is interpreted as a +# shortcut key. If no matching shortcut is found, rEFInd displays its +# menu with no timeout. +# +timeout 20 + +# Set the logging level. When set to 0, rEFInd does not log its actions. +# When set to 1 or above, rEFInd creates a file called refind.log in +# its home directory on the ESP and records information about what it's +# doing. Higher values record more information, up to a maximum of 4. +# This token should be left at the default of 0 except when debugging +# problems. +# Default value is 0 +# +#log_level 1 + +# Normally, when the timeout period has passed, rEFInd boots the +# default_selection. If the following option is uncommented, though, +# rEFInd will instead attempt to shut down the computer. +# CAUTION: MANY COMPUTERS WILL INSTEAD HANG OR REBOOT! Macs and more +# recent UEFI-based PCs are most likely to work with this feature. +# Default value is true +# +#shutdown_after_timeout + +# Whether to store rEFInd's rEFInd-specific variables in NVRAM (1, true, +# or on) or in files in the "vars" subdirectory of rEFInd's directory on +# disk (0, false, or off). Using NVRAM works well with most computers; +# however, it increases wear on the motherboard's NVRAM, and if the EFI +# is buggy or the NVRAM is old and worn out, it may not work at all. +# Storing variables on disk is a viable alternative in such cases, or +# if you want to minimize wear and tear on the NVRAM; however, it won't +# work if rEFInd is stored on a filesystem that's read-only to the EFI +# (such as an HFS+ volume), and it increases the risk of filesystem +# damage. Note that this option affects ONLY rEFInd's own variables, +# such as the PreviousBoot, HiddenTags, HiddenTools, and HiddenLegacy +# variables. It does NOT affect Secure Boot or other non-rEFInd +# variables. +# Default is true +# +use_nvram false + +# Screen saver timeout; the screen blanks after the specified number of +# seconds with no keyboard input. The screen returns after most keypresses +# (unfortunately, not including modifier keys such as Shift, Control, Alt, +# or Option). Setting a value of "-1" causes rEFInd to start up with its +# screen saver active. The default is 0, which disables the screen saver. +# +#screensaver 300 + +# Hide user interface elements for personal preference or to increase +# security: +# banner - the rEFInd title banner (built-in or loaded via "banner") +# label - boot option text label in the menu +# singleuser - remove the submenu options to boot macOS in single-user +# or verbose modes; affects ONLY macOS +# safemode - remove the submenu option to boot macOS in "safe mode" +# hwtest - the submenu option to run Apple's hardware test +# arrows - scroll arrows on the OS selection tag line +# hints - brief command summary in the menu +# editor - the options editor (+, F2, or Insert on boot options menu) +# badges - device-type badges for boot options +# all - all of the above +# Default is none of these (all elements active) +# +#hideui singleuser +#hideui all + +# Set the name of a subdirectory in which icons are stored. Icons must +# have the same names they have in the standard directory. The directory +# name is specified relative to the main rEFInd binary's directory. If +# an icon can't be found in the specified directory, an attempt is made +# to load it from the default directory; thus, you can replace just some +# icons in your own directory and rely on the default for others. +# Icon files may be in any supported format -- ICNS (*.icns), BMP (*.bmp), +# PNG (*.png), or JPEG (*.jpg or *.jpeg); however, rEFInd's BMP and JPEG +# implementations do not support transparency, which is highly desirable +# in icons. +# Default is "icons". +# +#icons_dir myicons +#icons_dir icons/snowy + +# Use a custom title banner instead of the rEFInd icon and name. The file +# path is relative to the directory where refind.efi is located. The color +# in the top left corner of the image is used as the background color +# for the menu screens. Currently uncompressed BMP images with color +# depths of 24, 8, 4 or 1 bits are supported, as well as PNG and JPEG +# images. (ICNS images can also be used, but ICNS has limitations that +# make it a poor choice for this purpose.) PNG and JPEG support is +# limited by the underlying libraries; some files, like progressive JPEGs, +# will not work. +# +#banner hostname.bmp +#banner mybanner.jpg +#banner icons/snowy/banner-snowy.png + +# Specify how to handle banners that aren't exactly the same as the screen +# size: +# noscale - Crop if too big, show with border if too small +# fillscreen - Fill the screen +# Default is noscale +# +#banner_scale fillscreen + +# Icon sizes. All icons are square, so just one value is specified. The +# big icons are used for OS selectors in the first row and the small +# icons are used for tools on the second row. Drive-type badges are 1/4 +# the size of the big icons. Legal values are 32 and above. If the icon +# files do not hold icons of the proper size, the icons are scaled to +# the specified size. The default values are 48 and 128 for small and +# big icons, respectively. +# +#small_icon_size 96 +#big_icon_size 256 + +# Custom images for the selection background. There is a big one (144 x 144) +# for the OS icons, and a small one (64 x 64) for the function icons in the +# second row. If only a small image is given, that one is also used for +# the big icons by stretching it in the middle. If only a big one is given, +# the built-in default will be used for the small icons. If an image other +# than the optimal size is specified, it will be scaled in a way that may +# be ugly. +# +# Like the banner option above, these options take a filename of an +# uncompressed BMP, PNG, JPEG, or ICNS image file with a color depth of +# 24, 8, 4, or 1 bits. The PNG or ICNS format is required if you need +# transparency support (to let you "see through" to a full-screen banner). +# +#selection_big selection-big.bmp +#selection_small selection-small.bmp + +# Set the font to be used for all textual displays in graphics mode. +# For best results, the font must be a PNG file with alpha channel +# transparency. It must contain ASCII characters 32-126 (space through +# tilde), inclusive, plus a glyph to be displayed in place of characters +# outside of this range, for a total of 96 glyphs. Only monospaced fonts +# are supported. Fonts may be of any size, although large fonts can +# produce display irregularities. +# The default is rEFInd's built-in font, Luxi Mono Regular 12 point. +# +#font myfont.png + +# Use text mode only. When enabled, this option forces rEFInd into text mode. +# Passing this option a "0" value causes graphics mode to be used. Pasing +# it no value or any non-0 value causes text mode to be used. +# Default is to use graphics mode. +# +#textonly + +# Set the EFI text mode to be used for textual displays. This option +# takes a single digit that refers to a mode number. Mode 0 is normally +# 80x25, 1 is sometimes 80x50, and higher numbers are system-specific +# modes. Mode 1024 is a special code that tells rEFInd to not set the +# text mode; it uses whatever was in use when the program was launched. +# If you specify an invalid mode, rEFInd pauses during boot to inform +# you of valid modes. +# CAUTION: On VirtualBox, and perhaps on some real computers, specifying +# a text mode and uncommenting the "textonly" option while NOT specifying +# a resolution can result in an unusable display in the booted OS. +# Default is 1024 (no change) +# +#textmode 2 + +# Set the screen's video resolution. Pass this option one of the following: +# * two integer values, corresponding to the X and Y resolutions +# * one integer value, corresponding to a GOP (UEFI) video mode +# * the string "max", which sets the maximum available resolution +# Note that not all resolutions are supported. On UEFI systems, passing +# an incorrect value results in a message being shown on the screen to +# that effect, along with a list of supported modes. On EFI 1.x systems +# (e.g., Macintoshes), setting an incorrect mode silently fails. On both +# types of systems, setting an incorrect resolution results in the default +# resolution being used. A resolution of 1024x768 usually works, but higher +# values often don't. +# Default is "0 0" (use the system default resolution, usually 800x600). +# +#resolution 1024 768 +#resolution 1440 900 +#resolution 3 +resolution max + +# Enable touch screen support. If active, this feature enables use of +# touch screen controls (as on tablets). Note, however, that not all +# tablets' EFIs provide the necessary underlying support, so this +# feature may not work for you. If it does work, you should be able +# to launch an OS or tool by touching it. In a submenu, touching +# anywhere launches the currently-selection item; there is, at present, +# no way to select a specific submenu item. This feature is mutually +# exclusive with the enable_mouse feature. If both are uncommented, +# the one read most recently takes precedence. +# +#enable_touch + +# Enable mouse support. If active, this feature enables use of the +# computer's mouse. Note, however, that not all computers' EFIs +# provide the necessary underlying support, so this feature may not +# work for you. If it does work, you should be able to launch an +# OS or tool by clicking it with the mouse pointer. This feature +# is mutually exclusive with the enable_touch feature. If both +# are uncommented, the one read most recently takes precedence. +# +#enable_mouse + +# Size of the mouse pointer, in pixels, per side. +# Default is 16 +# +#mouse_size 16 + +# Speed of mouse tracking. Higher numbers equate to faster +# mouse movement. This option requires that enable_mouse be +# uncommented. +# Legal values are between 1 and 32. Default is 4. +# +#mouse_speed 4 + +# Launch specified OSes in graphics mode. By default, rEFInd switches +# to text mode and displays basic pre-launch information when launching +# all OSes except macOS. Using graphics mode can produce a more seamless +# transition, but displays no information, which can make matters +# difficult if you must debug a problem. Also, on at least one known +# computer, using graphics mode prevents a crash when using the Linux +# kernel's EFI stub loader. You can specify an empty list to boot all +# OSes in text mode. +# Valid options: +# osx - macOS +# linux - A Linux kernel with EFI stub loader +# elilo - The ELILO boot loader +# grub - The GRUB (Legacy or 2) boot loader +# windows - Microsoft Windows +# Default value: osx +# +#use_graphics_for osx,linux + +# Which non-bootloader tools to show on the tools line, and in what +# order to display them: +# shell - the EFI shell (requires external program; see rEFInd +# documentation for details) +# memtest - the memtest86 program, in EFI/tools, EFI/memtest86, +# EFI/memtest, EFI/tools/memtest86, EFI/tools/memtest, +# or a boot loader's directory +# gptsync - the (dangerous) gptsync.efi utility (requires external +# program; see rEFInd documentation for details) +# gdisk - the gdisk partitioning program +# apple_recovery - boots the Apple Recovery HD partition, if present +# windows_recovery - boots an OEM Windows recovery tool, if present +# (see also the windows_recovery_files option) +# mok_tool - makes available the Machine Owner Key (MOK) maintenance +# tool, MokManager.efi, used on Secure Boot systems +# csr_rotate - adjusts Apple System Integrity Protection (SIP) +# policy. Requires "csr_values" to be set. +# install - an option to install rEFInd from the current location +# to another ESP +# bootorder - adjust the EFI's (NOT rEFInd's) boot order +# about - an "about this program" option +# hidden_tags - manage hidden tags +# exit - a tag to exit from rEFInd +# shutdown - shuts down the computer (a bug causes this to reboot +# many UEFI systems) +# reboot - a tag to reboot the computer +# firmware - a tag to reboot the computer into the firmware's +# user interface (ignored on older computers) +# fwupdate - a tag to update the firmware; launches the fwupx64.efi +# (or similar) program +# netboot - launch the ipxe.efi tool for network (PXE) booting +# Default is shell,memtest,gdisk,apple_recovery,windows_recovery,mok_tool,about,hidden_tags,shutdown,reboot,firmware,fwupdate +# To completely disable scanning for all tools, provide a showtools line +# with no options. +# +#showtools shell, bootorder, gdisk, memtest, mok_tool, apple_recovery, windows_recovery, about, hidden_tags, reboot, exit, firmware, fwupdate + +# Additional directories to scan for tools. You may specify a directory +# alone or a volume identifier plus pathname. The default is to scan no +# extra directories, beyond EFI/tools and any directory in which an EFI +# loader is found. +# +#also_scan_tool_dirs EFI/memtest,ESP2:/EFI/tools/memtest86 + +# Tool binaries to be excluded from the tools line, even if the +# general class is specified in showtools. This enables trimming an +# overabundance of tools, as when you see multiple mok_tool entries +# after installing multiple Linux distributions. +# Just as with dont_scan_files, you can specify a filename alone, a +# full pathname, or a volume identifier (filesystem label, partition +# name, or partition GUID) and a full pathname. +# Default is an empty list (nothing is excluded) +# +#dont_scan_tools ESP2:/EFI/ubuntu/mmx64.efi,gptsync_x64.efi + +# Boot loaders that can launch a Windows restore or emergency system. +# These tend to be OEM-specific. +# Default is LRS_ESP:/EFI/Microsoft/Boot/LrsBootmgr.efi +# +#windows_recovery_files LRS_ESP:/EFI/Microsoft/Boot/LrsBootmgr.efi + +# Directories in which to search for EFI drivers. These drivers can +# provide filesystem support, give access to hard disks on plug-in +# controllers, etc. In most cases none are needed, but if you add +# EFI drivers and you want rEFInd to automatically load them, you +# should specify one or more paths here. rEFInd always scans the +# "drivers" and "drivers_{arch}" subdirectories of its own installation +# directory (where "{arch}" is your architecture code); this option +# specifies ADDITIONAL directories to scan. +# Default is to scan no additional directories for EFI drivers +# +#scan_driver_dirs EFI/tools/drivers,drivers + +# Which types of boot loaders to search, and in what order to display them: +# internal - internal EFI disk-based boot loaders +# external - external EFI disk-based boot loaders +# optical - EFI optical discs (CD, DVD, etc.) +# netboot - EFI network (PXE) boot options +# hdbios - BIOS disk-based boot loaders +# biosexternal - BIOS external boot loaders (USB, eSATA, etc.) +# cd - BIOS optical-disc boot loaders +# manual - use stanzas later in this configuration file +# firmware - boot EFI programs set in the firmware's NVRAM +# Note that the legacy BIOS options require firmware support, which is +# not present on all computers. +# The netboot option is experimental and relies on the ipxe.efi and +# ipxe_discover.efi program files. +# On UEFI PCs, default is internal,external,optical,manual +# On Macs, default is internal,hdbios,external,biosexternal,optical,cd,manual +# +#scanfor internal,external,optical,manual,firmware + +# By default, rEFInd relies on the UEFI firmware to detect BIOS-mode boot +# devices. This sometimes doesn't detect all the available devices, though. +# For these cases, uefi_deep_legacy_scan results in a forced scan and +# modification of NVRAM variables on each boot. Adding "0", "off", or +# "false" resets to the default value. This token has no effect on Macs or +# when no BIOS-mode options are set via scanfor. +# Default is unset (or "uefi_deep_legacy_scan false") +# +#uefi_deep_legacy_scan + +# Delay for the specified number of seconds before scanning disks. +# This can help some users who find that some of their disks +# (usually external or optical discs) aren't detected initially, +# but are detected after pressing Esc. +# The default is 0. +# +#scan_delay 5 + +# When scanning volumes for EFI boot loaders, rEFInd always looks for +# macOS's and Microsoft Windows' boot loaders in their normal locations, +# and scans the root directory and every subdirectory of the /EFI directory +# for additional boot loaders, but it doesn't recurse into these directories. +# The also_scan_dirs token adds more directories to the scan list. +# Directories are specified relative to the volume's root directory. This +# option applies to ALL the volumes that rEFInd scans UNLESS you include +# a volume name and colon before the directory name, as in "myvol:/somedir" +# to scan the somedir directory only on the filesystem named myvol. If a +# specified directory doesn't exist, it's ignored (no error condition +# results). The "+" symbol denotes appending to the list of scanned +# directories rather than overwriting that list. +# The default is to scan the "boot" and "@/boot" directories in addition +# to various hard-coded directories. +# +#also_scan_dirs boot,ESP2:EFI/linux/kernels +#also_scan_dirs boot,@/boot +#also_scan_dirs +,@/kernels + +# Partitions (or whole disks, for legacy-mode boots) to omit from scans. +# For EFI-mode scans, you normally specify a volume by its label, which you +# can obtain in an EFI shell by typing "vol", from Linux by typing +# "blkid /dev/{devicename}", or by examining the disk's label in various +# OSes' file browsers. It's also possible to identify a partition by its +# unique GUID (aka its "PARTUUID" in Linux parlance). (Note that this is +# NOT the partition TYPE CODE GUID.) This identifier can be obtained via +# "blkid" in Linux or "diskutil info {partition-id}" in macOS. +# For legacy-mode scans, you can specify any subset of the boot loader +# description shown when you highlight the option in rEFInd. +# The default is "LRS_ESP". +# +#dont_scan_volumes "Recovery HD" + +# Directories that should NOT be scanned for boot loaders. By default, +# rEFInd doesn't scan its own directory, the EFI/tools directory, the +# EFI/memtest directory, the EFI/memtest86 directory, or the +# com.apple.recovery.boot directory. Using the dont_scan_dirs option +# enables you to "blacklist" other directories; but be sure to use "+" +# as the first element if you want to continue blacklisting existing +# directories. You might use this token to keep EFI/boot/bootx64.efi out +# of the menu if that's a duplicate of another boot loader or to exclude +# a directory that holds drivers or non-bootloader utilities provided by +# a hardware manufacturer. If a directory is listed both here and in +# also_scan_dirs, dont_scan_dirs takes precedence. Note that this +# blacklist applies to ALL the filesystems that rEFInd scans, not just +# the ESP, unless you precede the directory name by a filesystem name or +# partition unique GUID, as in "myvol:EFI/somedir" to exclude EFI/somedir +# from the scan on the myvol volume but not on other volumes. +# +#dont_scan_dirs ESP:/EFI/boot,EFI/Dell,EFI/memtest86 + +# Files that should NOT be included as EFI boot loaders (on the +# first line of the display). If you're using a boot loader that +# relies on support programs or drivers that are installed alongside +# the main binary or if you want to "blacklist" certain loaders by +# name rather than location, use this option. Note that this will +# NOT prevent certain binaries from showing up in the second-row +# set of tools. Most notably, various Secure Boot and recovery +# tools are present in this list, but may appear as second-row +# items. +# The file may be specified as a bare name (e.g., "notme.efi"), as +# a complete pathname (e.g., "/EFI/somedir/notme.efi"), or as a +# complete pathname with volume (e.g., "SOMEDISK:/EFI/somedir/notme.efi" +# or 2C17D5ED-850D-4F76-BA31-47A561740082:/EFI/somedir/notme.efi"). +# OS tags hidden via the Delete or '-' key in the rEFInd menu are +# added to this list, but stored in NVRAM. +# The default is shim.efi,shim-fedora.efi,shimx64.efi,PreLoader.efi, +# TextMode.efi,ebounce.efi,GraphicsConsole.efi,MokManager.efi,HashTool.efi, +# HashTool-signed.efi,bootmgr.efi,fb{arch}.efi +# (where "{arch}" is the architecture code, like "x64"). +# If you want to keep these defaults but add to them, be sure to +# specify "+" as the first item in the new list; if you don't, then +# items from the default list are likely to appear. +# +#dont_scan_files shim.efi,MokManager.efi + +# EFI NVRAM Boot#### variables that should NOT be presented as loaders +# when "firmware" is an option to "scanfor". The comma-separated list +# presented here contains strings that are matched against the +# description field -- if a value here is a case-insensitive substring +# of the boot option description, then it will be excluded from the +# boot list. To specify a string that includes a space, enclose it +# in quotes. Specifying "shell" will counteract the automatic +# inclusion of built-in EFI shells. +# +#dont_scan_firmware HARDDISK,shell,"Removable Device" + +# Scan for Linux kernels that lack a ".efi" filename extension. This is +# useful for better integration with Linux distributions that provide +# kernels with EFI stub loaders but that don't give those kernels filenames +# that end in ".efi", particularly if the kernels are stored on a +# filesystem that the EFI can read. When set to "1", "true", or "on", this +# option causes all files in scanned directories with names that begin with +# "vmlinuz", "bzImage", or "kernel" to be included as loaders, even if they +# lack ".efi" extensions. Passing this option a "0", "false", or "off" value +# causes kernels without ".efi" extensions to NOT be scanned. +# Default is "true" -- to scan for kernels without ".efi" extensions. +# +#scan_all_linux_kernels false + +# Support loaders that have been compressed with gzip. +# On x86 and x86-64 platforms, Linux kernels are self-decompressing. +# On ARM64, Linux kernel files are typically compressed with gzip, +# including the EFI stub loader. This makes them unloadable in rEFInd +# unless rEFInd itself uncompresses them. This option enables rEFInd +# to do this. This feature is unnecessary on x86 and x86-64 systems. +# Default is "false" on x86 and x86-64; "true" on ARM64. +# +#support_gzipped_loaders true + +# Combine all Linux kernels in a given directory into a single entry. +# When so set, the kernel with the most recent time stamp will be launched +# by default, and its filename will appear in the entry's description. +# To launch other kernels, the user must press F2 or Insert; alternate +# kernels then appear as options on the sub-menu. +# Default is "true" -- kernels are "folded" into a single menu entry. +# +#fold_linux_kernels false + +# Filename prefixes that indicate a file is a Linux kernel. Files that +# begin with any of these strings are treated as Linux kernels, if they +# are also EFI boot loaders. To include the default string, use "+" +# Default is "vmlinuz,bzImage,kernel", except on ARM64, where it is +# "vmlinuz,Image,kernel". +# +#linux_prefixes vmlinuz,bzImage,kernel +#linux_prefixes +,zImage + +# Comma-delimited list of strings to treat as if they were numbers for the +# purpose of kernel version number detection. These strings are matched on a +# first-found basis; that is, if you want to treat both "linux-lts" and +# "linux" as version strings, they MUST be specified as "linux-lts,linux", +# since if you specify it the other way, both vmlinuz-linux and +# vmlinuz-linux-lts will return with "linux" as the "version string," which +# is not what you'd want. Also, if the kernel or initrd file includes both a +# specified string and digits, the "version string" includes both. For +# instance, "vmlinuz-linux-4.8" would yield a version string of "linux-4.8". +# This option is intended for Arch and other distributions that don't include +# version numbers in their kernel filenames, but may provide other uniquely +# identifying strings for multiple kernels. If this feature causes problems +# (say, if your kernel filename includes "linux" but the initrd filename +# doesn't), be sure this is set to an empty string +# (extra_kernel_version_strings "") or comment out the option to disable it. +# Default is no extra version strings +# +#extra_kernel_version_strings linux-lts,linux + +# Write to systemd EFI variables (currently only LoaderDevicePartUUID) when +# launching Linux via an EFI stub loader, ELILO, or GRUB. This variable, +# when present, causes systemd to mount the ESP at /boot or /efi *IF* either +# directory is empty and nothing else is mounted there. +# Default is "false" +# +#write_systemd_vars true + +# Symlinked loaders will be processed when this setting is set to true. +# These are ignored by default as they may result in undesirable outcomes. +# This token may, however, be useful on Linux setups that provide symbolic +# links in scanned locations that point to kernels in unscanned locations, +# such as some openSUSE installations. +# +#follow_symlinks true + +# Set the maximum number of tags that can be displayed on the screen at +# any time. If more loaders are discovered than this value, rEFInd shows +# a subset in a scrolling list. If this value is set too high for the +# screen to handle, it's reduced to the value that the screen can manage. +# If this value is set to 0 (the default), it's adjusted to the number +# that the screen can handle. +# +#max_tags 0 + +# Set the default menu selection. The available arguments match the +# keyboard accelerators available within rEFInd. You may select the +# default loader using: +# - A digit between 1 and 9, in which case the Nth loader in the menu +# will be the default. +# - A "+" symbol at the start of the string, which refers to the most +# recently booted loader. +# - Any substring that corresponds to a portion of the loader's title +# (usually the OS's name, boot loader's path, or a volume or +# filesystem title). +# You may also specify multiple selectors by separating them with commas +# and enclosing the list in quotes. (The "+" option is only meaningful in +# this context.) +# If you follow the selector(s) with two times, in 24-hour format, the +# default will apply only between those times. The times are in the +# motherboard's time standard, whether that's UTC or local time, so if +# you use UTC, you'll need to adjust this from local time manually. +# Times may span midnight as in "23:30 00:30", which applies to 11:30 PM +# to 12:30 AM. You may specify multiple default_selection lines, in which +# case the last one to match takes precedence. Thus, you can set a main +# option without a time followed by one or more that include times to +# set different defaults for different times of day. +# The default behavior is to boot the previously-booted OS. +# +#default_selection 1 +#default_selection Microsoft +#default_selection "+,bzImage,vmlinuz" +#default_selection Maintenance 23:30 2:00 +#default_selection "Maintenance,macOS" 1:00 2:30 + +# Enable VMX bit and lock the CPU MSR if unlocked. +# On some Intel Apple computers, the firmware does not lock the MSR 0x3A. +# The symptom on Windows is Hyper-V not working even if the CPU +# meets the minimum requirements (HW assisted virtualization and SLAT) +# DO NOT SET THIS EXCEPT ON INTEL CPUs THAT SUPPORT VMX! See +# http://www.thomas-krenn.com/en/wiki/Activating_the_Intel_VT_Virtualization_Feature +# for more on this subject. +# The default is false: Don't try to enable and lock the MSR. +# +#enable_and_lock_vmx false + +# Tell a Mac's EFI that macOS is about to be launched, even when it's not. +# This option causes some Macs to initialize their hardware differently than +# when a third-party OS is launched normally. In some cases (particularly on +# Macs with multiple video cards), using this option can cause hardware to +# work that would not otherwise work. On the other hand, using this option +# when it is not necessary can cause hardware (such as keyboards and mice) to +# become inaccessible. Therefore, you should not enable this option if your +# non-Apple OSes work correctly; enable it only if you have problems with +# some hardware devices. When needed, a value of "10.9" usually works, but +# you can experiment with other values. This feature has no effect on +# non-Apple computers. +# The default is inactive (no macOS spoofing is done). +# +#spoof_osx_version 10.9 + +# Set the CSR values for Apple's System Integrity Protection (SIP) feature. +# Values are two-byte (four-character) hexadecimal numbers. These values +# define which specific security features are enabled. Below are the codes +# for what the values mean. Add them up (in hexadecimal!) to set new values. +# Apple's "csrutil enable" and "csrutil disable" commands set values of 10 +# and 877, respectively. (Prior to OS 11, 77 was used rather than 877; 877 +# is required for OS 11, and should work for OS X 10.x, too.) +# CSR_ALLOW_UNTRUSTED_KEXTS 0x0001 +# CSR_ALLOW_UNRESTRICTED_FS 0x0002 +# CSR_ALLOW_TASK_FOR_PID 0x0004 +# CSR_ALLOW_KERNEL_DEBUGGER 0x0008 +# CSR_ALLOW_APPLE_INTERNAL 0x0010 +# CSR_ALLOW_UNRESTRICTED_DTRACE 0x0020 +# CSR_ALLOW_UNRESTRICTED_NVRAM 0x0040 +# CSR_ALLOW_DEVICE_CONFIGURATION 0x0080 +# CSR_ALLOW_ANY_RECOVERY_OS 0x0100 +# CSR_ALLOW_UNAPPROVED_KEXTS 0x0200 +# CSR_ALLOW_EXECUTABLE_POLICY_OVERRIDE 0x0400 +# CSR_ALLOW_UNAUTHENTICATED_ROOT 0x0800 +#csr_values 10,877 + +# Include a secondary configuration file within this one. This secondary +# file is loaded as if its options appeared at the point of the "include" +# token itself, so if you want to override a setting in the main file, +# the secondary file must be referenced AFTER the setting you want to +# override. Note that the secondary file may NOT load a tertiary file. +# +#include manual.conf + +# Sample manual configuration stanzas. Each begins with the "menuentry" +# keyword followed by a name that's to appear in the menu (use quotes +# if you want the name to contain a space) and an open curly brace +# ("{"). Each entry ends with a close curly brace ("}"). Common +# keywords within each stanza include: +# +# volume - identifies the filesystem from which subsequent files +# are loaded. You can specify the volume by filesystem +# label, by partition label, or by partition GUID number +# (but NOT yet by filesystem UUID number). +# loader - identifies the boot loader file +# initrd - Specifies an initial RAM disk file +# icon - specifies a custom boot loader icon +# ostype - OS type code to determine boot options available by +# pressing Insert. Valid values are "MacOS", "Linux", +# "Windows", and "XOM". Case-sensitive. +# graphics - set to "on" to enable graphics-mode boot (useful +# mainly for MacOS) or "off" for text-mode boot. +# Default is auto-detected from loader filename. +# options - sets options to be passed to the boot loader; use +# quotes if more than one option should be passed or +# if any options use characters that might be changed +# by rEFInd parsing procedures (=, /, #, or tab). +# disabled - use alone or set to "yes" to disable this entry. +# +# Note that you can use either DOS/Windows/EFI-style backslashes (\) +# or Unix-style forward slashes (/) as directory separators. Either +# way, all file references are on the ESP from which rEFInd was +# launched. +# Use of quotes around parameters causes them to be interpreted as +# one keyword, and for parsing of special characters (spaces, =, /, +# and #) to be disabled. This is useful mainly with the "options" +# keyword. Use of quotes around parameters that specify filenames is +# permissible, but you must then use backslashes instead of slashes, +# except when you must pass a forward slash to the loader, as when +# passing a root= option to a Linux kernel. + +# Below are several sample boot stanzas. All are disabled by default. +# Find one similar to what you need, copy it, remove the "disabled" line, +# and adjust the entries to suit your needs. + +# A sample entry for a Linux 3.13 kernel with EFI boot stub support +# on a partition with a GUID of 904404F8-B481-440C-A1E3-11A5A954E601. +# This entry includes Linux-specific boot options and specification +# of an initial RAM disk. Note uses of Linux-style forward slashes. +# Also note that a leading slash is optional in file specifications. +menuentry Linux { + icon EFI/refind/icons/os_linux.png + volume 904404F8-B481-440C-A1E3-11A5A954E601 + loader bzImage-3.3.0-rc7 + initrd initrd-3.3.0.img + options "ro root=UUID=5f96cafa-e0a7-4057-b18f-fa709db5b837" + disabled +} + +# Below is a more complex Linux example, specifically for Arch Linux. +# This example MUST be modified for your specific installation; if nothing +# else, the PARTUUID code must be changed for your disk. Because Arch Linux +# does not include version numbers in its kernel and initrd filenames, you +# may need to use manual boot stanzas when using fallback initrds or +# multiple kernels with Arch. This example is modified from one in the Arch +# wiki page on rEFInd (https://wiki.archlinux.org/index.php/rEFInd). +menuentry "Arch Linux" { + icon /EFI/refind/icons/os_arch.png + volume "Arch Linux" + loader /boot/vmlinuz-linux + initrd /boot/initramfs-linux.img + options "root=PARTUUID=5028fa50-0079-4c40-b240-abfaf28693ea rw add_efi_memmap" + submenuentry "Boot using fallback initramfs" { + initrd /boot/initramfs-linux-fallback.img + } + submenuentry "Boot to terminal" { + add_options "systemd.unit=multi-user.target" + } + disabled +} + +# A sample entry for loading Ubuntu using its standard name for +# its GRUB 2 boot loader. Note uses of Linux-style forward slashes +menuentry Ubuntu { + loader /EFI/ubuntu/grubx64.efi + icon /EFI/refind/icons/os_linux.png + disabled +} + +# A minimal ELILO entry, which probably offers nothing that +# auto-detection can't accomplish. +menuentry "ELILO" { + loader \EFI\elilo\elilo.efi + disabled +} + +# Like the ELILO entry, this one offers nothing that auto-detection +# can't do; but you might use it if you want to disable auto-detection +# but still boot Windows.... +menuentry "Windows 7" { + loader \EFI\Microsoft\Boot\bootmgfw.efi + disabled +} + +# EFI shells are programs just like boot loaders, and can be +# launched in the same way. You can pass a shell the name of a +# script that it's to run on the "options" line. The script +# could initialize hardware and then launch an OS, or it could +# do something entirely different. +menuentry "Windows via shell script" { + icon \EFI\refind\icons\os_win.png + loader \EFI\tools\shell.efi + options "fs0:\EFI\tools\launch_windows.nsh" + disabled +} + +# MacOS is normally detected and run automatically; however, +# if you want to do something unusual, a manual boot stanza may +# be the way to do it. This one does nothing very unusual, but +# it may serve as a starting point. Note that you'll almost +# certainly need to change the "volume" line for this example +# to work. +menuentry "My macOS" { + icon \EFI\refind\icons\os_mac.png + volume "macOS boot" + loader \System\Library\CoreServices\boot.efi + disabled +} + +# The firmware_bootnum token takes a HEXADECIMAL value as an option +# and sets that value using the EFI's BootNext variable and then +# reboots the computer. This then causes a one-time boot of the +# computer using this EFI boot option. It can be used for various +# purposes, but one that's likely to interest some rEFInd users is +# that some Macs with HiDPI displays produce lower-resolution +# desktops when booted through rEFInd than when booted via Apple's +# own boot manager. Booting using the firmware_bootnum option +# produces the better resolution. Note that no loader option is +# used in this type of configuration. +menuentry "macOS via BootNext" { + icon /EFI/refind/icons/os_mac.png + firmware_bootnum 80 + disabled +} diff --git a/data/refind/EFI/tools/gdisk_x64.efi b/data/refind/EFI/tools/gdisk_x64.efi new file mode 100644 index 0000000..25eb293 Binary files /dev/null and b/data/refind/EFI/tools/gdisk_x64.efi differ diff --git a/data/refind/EFI/tools/gptsync_ia32.efi b/data/refind/EFI/tools/gptsync_ia32.efi new file mode 100644 index 0000000..647d1b4 Binary files /dev/null and b/data/refind/EFI/tools/gptsync_ia32.efi differ diff --git a/data/refind/EFI/tools/gptsync_x64.efi b/data/refind/EFI/tools/gptsync_x64.efi new file mode 100644 index 0000000..dda1b33 Binary files /dev/null and b/data/refind/EFI/tools/gptsync_x64.efi differ diff --git a/data/refind/EFI/tools/shellia32.efi b/data/refind/EFI/tools/shellia32.efi new file mode 100644 index 0000000..e6f45b6 Binary files /dev/null and b/data/refind/EFI/tools/shellia32.efi differ diff --git a/data/refind/EFI/tools/shellx64.efi b/data/refind/EFI/tools/shellx64.efi new file mode 100644 index 0000000..04bb5ba Binary files /dev/null and b/data/refind/EFI/tools/shellx64.efi differ diff --git a/data/refind/refind_linux.conf b/data/refind/refind_linux.conf new file mode 100644 index 0000000..2013653 --- /dev/null +++ b/data/refind/refind_linux.conf @@ -0,0 +1,3 @@ +"Boot live image with standard options" "boot=live quiet splash ---" +"Boot live image with logging" "boot=live ---" +"Boot live image with safe graphics" "boot=live nomodeset ---" diff --git a/generate_roofs_from_canaryv3_docker.sh b/generate_roofs_from_canaryv3_docker.sh new file mode 100755 index 0000000..794cf16 --- /dev/null +++ b/generate_roofs_from_canaryv3_docker.sh @@ -0,0 +1,35 @@ +#! /bin/bash + +set -e + +source ./info.sh + +mkdir -p "$ROOTFS_PATH" + +mkdir -p "$LIVE_BOOT_DATA_PATH" + +mkdir -p "$LIVE_BOOT_LIVE_PATH" + +# Pull and mount docker image + +podman --storage-driver=vfs pull ghcr.io/pikaos-linux/pikaos-base:canaryv3 + +podman --storage-driver=vfs image mount pikaos-linux/pikaos-base:canaryv3 > ./docker-merged-path + +DOCKER_MERGED_PATH=$(cat ./docker-merged-path) + +# Safely Copy merged path contents to rootfs + +rsync -av $DOCKER_MERGED_PATH/* $ROOTFS_PATH/ + +# Clean up Docker specific things + +rm -rfv $ROOTFS_PATH/etc/apt/preferences.d/*docker* + +rm -rfv $ROOTFS_PATH/etc/apt/apt.conf.d/*docker* + +rm -rfv $ROOTFS_PATH/etc/dpkg/dpkg.cfg.d/*docker* + +# Setup hostname + +echo $LIVE_HOSTNAME | tee "$ROOTFS_PATH/etc/hostname" diff --git a/generate_roofs_from_nestv3_docker.sh b/generate_roofs_from_nestv3_docker.sh new file mode 100755 index 0000000..dd81e51 --- /dev/null +++ b/generate_roofs_from_nestv3_docker.sh @@ -0,0 +1,35 @@ +#! /bin/bash + +set -e + +source ./info.sh + +mkdir -p "$ROOTFS_PATH" + +mkdir -p "$LIVE_BOOT_DATA_PATH" + +mkdir -p "$LIVE_BOOT_LIVE_PATH" + +# Pull and mount docker image + +podman --storage-driver=vfs pull ghcr.io/pikaos-linux/pikaos-base:nestv3 + +podman --storage-driver=vfs image mount pikaos-linux/pikaos-base:nestv3 > ./docker-merged-path + +DOCKER_MERGED_PATH=$(cat ./docker-merged-path) + +# Safely Copy merged path contents to rootfs + +rsync -av $DOCKER_MERGED_PATH/* $ROOTFS_PATH/ + +# Clean up Docker specific things + +rm -rfv $ROOTFS_PATH/etc/apt/preferences.d/*docker* + +rm -rfv $ROOTFS_PATH/etc/apt/apt.conf.d/*docker* + +rm -rfv $ROOTFS_PATH/etc/dpkg/dpkg.cfg.d/*docker* + +# Setup hostname + +echo $LIVE_HOSTNAME | tee "$ROOTFS_PATH/etc/hostname" diff --git a/get_iso_build_dep.sh b/get_iso_build_dep.sh new file mode 100755 index 0000000..e4261bc --- /dev/null +++ b/get_iso_build_dep.sh @@ -0,0 +1,20 @@ +#! /bin/bash + +set -e + +export DEBIAN_FRONTEND="noninteractive" + +apt-get install -y --no-install-recommends --option Dpkg::Options::="--force-confnew" --option Dpkg::Options::="--force-overwrite" \ + debootstrap \ + squashfs-tools \ + xorriso \ + isolinux \ + syslinux-efi \ + grub-pc-bin \ + grub-efi-amd64-bin \ + grub-efi-ia32-bin \ + mtools \ + dosfstools \ + rsync \ + podman \ + iptables diff --git a/hooks/0-color-papirus.chroot b/hooks/0-color-papirus.chroot new file mode 100755 index 0000000..2a29060 --- /dev/null +++ b/hooks/0-color-papirus.chroot @@ -0,0 +1,3 @@ +#! /bin/bash + +/usr/lib/pika/gnome-layouts/papirus-folders -u -C yellow diff --git a/hooks/0-create-liveuser.chroot b/hooks/0-create-liveuser.chroot new file mode 100755 index 0000000..9c6e71c --- /dev/null +++ b/hooks/0-create-liveuser.chroot @@ -0,0 +1,9 @@ +#!/bin/bash + +adduser --quiet --disabled-password --shell /bin/bash --gecos "PikaOS Live User" "pikaos" +passwd -d "pikaos" +for group in adm cdrom sudo render dip video plugdev input render lpadmin sambashare +do + groupadd $group || true + usermod -a -G $group "pikaos" +done diff --git a/hooks/5-add-autologin.chroot b/hooks/5-add-autologin.chroot new file mode 100755 index 0000000..8471052 --- /dev/null +++ b/hooks/5-add-autologin.chroot @@ -0,0 +1,9 @@ +#!/bin/bash + +mkdir -p /etc/gdm3 || true +mkdir -p /etc/sddm.conf.d/ || true +echo -e '[daemon]\nAutomaticLogin=pikaos\nAutomaticLoginEnable=True' >> /etc/gdm3/daemon.conf || true +sed '/WaylandEnable=false/ s/^\#*/\#/' -i /etc/gdm3/daemon.conf || true +ln -sf /etc/gdm3/daemon.conf /etc/gdm3/custom.conf +echo -e '[Autologin]\nUser=pikaos\nSession=plasma' > /etc/sddm.conf.d/zautologin.conf || true +echo -e '[User]\nSession=gnome\nIcon=/home/pikaos/.face\nSystemAccount=false' > /var/lib/AccountsService/users/pikaos || true diff --git a/hooks/999-cleanup-apt-cache.chroot b/hooks/999-cleanup-apt-cache.chroot new file mode 100755 index 0000000..e5233f5 --- /dev/null +++ b/hooks/999-cleanup-apt-cache.chroot @@ -0,0 +1,9 @@ +#!/bin/sh +# Description: Cleanup apt cache files that add ~100MB to the .iso and aren't needed + +rm -f /var/lib/apt/lists/*_Packages +rm -f /var/lib/apt/lists/*_Sources +rm -f /var/lib/apt/lists/*_Translation-* +systemctl unmask fwupd || true +systemctl unmask nmdb || true +apt clean -y \ No newline at end of file diff --git a/info.sh b/info.sh new file mode 100755 index 0000000..419b71d --- /dev/null +++ b/info.sh @@ -0,0 +1,15 @@ +#! /bin/bash + +export LIVE_BOOT_PATH="$(pwd)/LIVE_BOOT" +export LIVE_BOOT_DATA_PATH="$LIVE_BOOT_PATH/data" +export LIVE_BOOT_LIVE_PATH="$LIVE_BOOT_DATA_PATH/live" +export ROOTFS_PATH="$LIVE_BOOT_PATH/rootfs" +export LIVE_HOSTNAME="pikaos" +export ISO_DISTNAME="#DISTNAME#" +export ISO_KERNEL="6.11.4-pikaos" +export ISO_ARCH="#ARCH#" +export ISO_RELEASE="4.0" +export ISO_DESKTOP="GNOME" +export ISO_PATCH="7" +export ISO_IMAGE="$ISO_DISTNAME-$ISO_DESKTOP-$ISO_RELEASE-$ISO_ARCH-$(date '+%y.%m.%d')-$ISO_PATCH" +export LIVE_BOOT_VOLUME_NAME="$ISO_DISTNAME-$ISO_DESKTOP-$ISO_RELEASE-$ISO_ARCH-$ISO_PATCH" diff --git a/live-lists/0-basics.list b/live-lists/0-basics.list new file mode 100755 index 0000000..552db4c --- /dev/null +++ b/live-lists/0-basics.list @@ -0,0 +1,26 @@ +pika-sources +systemd +pika-baseos +pika-amdgpu-core +pika-amdgpu-switcher +dbus-x11 +rsync +apt-utils +dosfstools +intel-microcode +amd64-microcode +linux-firmware +firmware-sof-signed +iucode-tool +setserial +git +kernel-pika +open-vm-tools +open-vm-tools-desktop +locales-all +f2fs-tools +xfsprogs +refind +mesa-hybrid +console-common +console-data \ No newline at end of file diff --git a/live-lists/1-desktop.list b/live-lists/1-desktop.list new file mode 100755 index 0000000..157e270 --- /dev/null +++ b/live-lists/1-desktop.list @@ -0,0 +1,5 @@ +apt-xapian-index +python3-xapian +pika-gnome-desktop +pika-gnome-settings +firefox \ No newline at end of file diff --git a/live-lists/2-installer.list b/live-lists/2-installer.list new file mode 100755 index 0000000..e8d22f6 --- /dev/null +++ b/live-lists/2-installer.list @@ -0,0 +1,4 @@ +pika-first-setup-gtk4 +pikainstall +pika-installer-gtk4 +arch-install-scripts diff --git a/nvidia-enablement/data/refind/EFI/boot/refind.conf b/nvidia-enablement/data/refind/EFI/boot/refind.conf new file mode 100644 index 0000000..a9d00c9 --- /dev/null +++ b/nvidia-enablement/data/refind/EFI/boot/refind.conf @@ -0,0 +1,663 @@ +# +# refind.conf +# Configuration file for the rEFInd boot menu +# + +# Timeout in seconds for the main menu screen. Setting the timeout to 0 +# disables automatic booting (i.e., no timeout). Setting it to -1 causes +# an immediate boot to the default OS *UNLESS* a keypress is in the buffer +# when rEFInd launches, in which case that keypress is interpreted as a +# shortcut key. If no matching shortcut is found, rEFInd displays its +# menu with no timeout. +# +timeout 20 + +# Set the logging level. When set to 0, rEFInd does not log its actions. +# When set to 1 or above, rEFInd creates a file called refind.log in +# its home directory on the ESP and records information about what it's +# doing. Higher values record more information, up to a maximum of 4. +# This token should be left at the default of 0 except when debugging +# problems. +# Default value is 0 +# +#log_level 1 + +# Normally, when the timeout period has passed, rEFInd boots the +# default_selection. If the following option is uncommented, though, +# rEFInd will instead attempt to shut down the computer. +# CAUTION: MANY COMPUTERS WILL INSTEAD HANG OR REBOOT! Macs and more +# recent UEFI-based PCs are most likely to work with this feature. +# Default value is true +# +#shutdown_after_timeout + +# Whether to store rEFInd's rEFInd-specific variables in NVRAM (1, true, +# or on) or in files in the "vars" subdirectory of rEFInd's directory on +# disk (0, false, or off). Using NVRAM works well with most computers; +# however, it increases wear on the motherboard's NVRAM, and if the EFI +# is buggy or the NVRAM is old and worn out, it may not work at all. +# Storing variables on disk is a viable alternative in such cases, or +# if you want to minimize wear and tear on the NVRAM; however, it won't +# work if rEFInd is stored on a filesystem that's read-only to the EFI +# (such as an HFS+ volume), and it increases the risk of filesystem +# damage. Note that this option affects ONLY rEFInd's own variables, +# such as the PreviousBoot, HiddenTags, HiddenTools, and HiddenLegacy +# variables. It does NOT affect Secure Boot or other non-rEFInd +# variables. +# Default is true +# +use_nvram false + +# Screen saver timeout; the screen blanks after the specified number of +# seconds with no keyboard input. The screen returns after most keypresses +# (unfortunately, not including modifier keys such as Shift, Control, Alt, +# or Option). Setting a value of "-1" causes rEFInd to start up with its +# screen saver active. The default is 0, which disables the screen saver. +# +#screensaver 300 + +# Hide user interface elements for personal preference or to increase +# security: +# banner - the rEFInd title banner (built-in or loaded via "banner") +# label - boot option text label in the menu +# singleuser - remove the submenu options to boot macOS in single-user +# or verbose modes; affects ONLY macOS +# safemode - remove the submenu option to boot macOS in "safe mode" +# hwtest - the submenu option to run Apple's hardware test +# arrows - scroll arrows on the OS selection tag line +# hints - brief command summary in the menu +# editor - the options editor (+, F2, or Insert on boot options menu) +# badges - device-type badges for boot options +# all - all of the above +# Default is none of these (all elements active) +# +#hideui singleuser +#hideui all + +# Set the name of a subdirectory in which icons are stored. Icons must +# have the same names they have in the standard directory. The directory +# name is specified relative to the main rEFInd binary's directory. If +# an icon can't be found in the specified directory, an attempt is made +# to load it from the default directory; thus, you can replace just some +# icons in your own directory and rely on the default for others. +# Icon files may be in any supported format -- ICNS (*.icns), BMP (*.bmp), +# PNG (*.png), or JPEG (*.jpg or *.jpeg); however, rEFInd's BMP and JPEG +# implementations do not support transparency, which is highly desirable +# in icons. +# Default is "icons". +# +#icons_dir myicons +#icons_dir icons/snowy + +# Use a custom title banner instead of the rEFInd icon and name. The file +# path is relative to the directory where refind.efi is located. The color +# in the top left corner of the image is used as the background color +# for the menu screens. Currently uncompressed BMP images with color +# depths of 24, 8, 4 or 1 bits are supported, as well as PNG and JPEG +# images. (ICNS images can also be used, but ICNS has limitations that +# make it a poor choice for this purpose.) PNG and JPEG support is +# limited by the underlying libraries; some files, like progressive JPEGs, +# will not work. +# +#banner hostname.bmp +#banner mybanner.jpg +#banner icons/snowy/banner-snowy.png + +# Specify how to handle banners that aren't exactly the same as the screen +# size: +# noscale - Crop if too big, show with border if too small +# fillscreen - Fill the screen +# Default is noscale +# +#banner_scale fillscreen + +# Icon sizes. All icons are square, so just one value is specified. The +# big icons are used for OS selectors in the first row and the small +# icons are used for tools on the second row. Drive-type badges are 1/4 +# the size of the big icons. Legal values are 32 and above. If the icon +# files do not hold icons of the proper size, the icons are scaled to +# the specified size. The default values are 48 and 128 for small and +# big icons, respectively. +# +#small_icon_size 96 +#big_icon_size 256 + +# Custom images for the selection background. There is a big one (144 x 144) +# for the OS icons, and a small one (64 x 64) for the function icons in the +# second row. If only a small image is given, that one is also used for +# the big icons by stretching it in the middle. If only a big one is given, +# the built-in default will be used for the small icons. If an image other +# than the optimal size is specified, it will be scaled in a way that may +# be ugly. +# +# Like the banner option above, these options take a filename of an +# uncompressed BMP, PNG, JPEG, or ICNS image file with a color depth of +# 24, 8, 4, or 1 bits. The PNG or ICNS format is required if you need +# transparency support (to let you "see through" to a full-screen banner). +# +#selection_big selection-big.bmp +#selection_small selection-small.bmp + +# Set the font to be used for all textual displays in graphics mode. +# For best results, the font must be a PNG file with alpha channel +# transparency. It must contain ASCII characters 32-126 (space through +# tilde), inclusive, plus a glyph to be displayed in place of characters +# outside of this range, for a total of 96 glyphs. Only monospaced fonts +# are supported. Fonts may be of any size, although large fonts can +# produce display irregularities. +# The default is rEFInd's built-in font, Luxi Mono Regular 12 point. +# +#font myfont.png + +# Use text mode only. When enabled, this option forces rEFInd into text mode. +# Passing this option a "0" value causes graphics mode to be used. Pasing +# it no value or any non-0 value causes text mode to be used. +# Default is to use graphics mode. +# +#textonly + +# Set the EFI text mode to be used for textual displays. This option +# takes a single digit that refers to a mode number. Mode 0 is normally +# 80x25, 1 is sometimes 80x50, and higher numbers are system-specific +# modes. Mode 1024 is a special code that tells rEFInd to not set the +# text mode; it uses whatever was in use when the program was launched. +# If you specify an invalid mode, rEFInd pauses during boot to inform +# you of valid modes. +# CAUTION: On VirtualBox, and perhaps on some real computers, specifying +# a text mode and uncommenting the "textonly" option while NOT specifying +# a resolution can result in an unusable display in the booted OS. +# Default is 1024 (no change) +# +#textmode 2 + +# Set the screen's video resolution. Pass this option one of the following: +# * two integer values, corresponding to the X and Y resolutions +# * one integer value, corresponding to a GOP (UEFI) video mode +# * the string "max", which sets the maximum available resolution +# Note that not all resolutions are supported. On UEFI systems, passing +# an incorrect value results in a message being shown on the screen to +# that effect, along with a list of supported modes. On EFI 1.x systems +# (e.g., Macintoshes), setting an incorrect mode silently fails. On both +# types of systems, setting an incorrect resolution results in the default +# resolution being used. A resolution of 1024x768 usually works, but higher +# values often don't. +# Default is "0 0" (use the system default resolution, usually 800x600). +# +#resolution 1024 768 +#resolution 1440 900 +#resolution 3 +resolution max + +# Enable touch screen support. If active, this feature enables use of +# touch screen controls (as on tablets). Note, however, that not all +# tablets' EFIs provide the necessary underlying support, so this +# feature may not work for you. If it does work, you should be able +# to launch an OS or tool by touching it. In a submenu, touching +# anywhere launches the currently-selection item; there is, at present, +# no way to select a specific submenu item. This feature is mutually +# exclusive with the enable_mouse feature. If both are uncommented, +# the one read most recently takes precedence. +# +#enable_touch + +# Enable mouse support. If active, this feature enables use of the +# computer's mouse. Note, however, that not all computers' EFIs +# provide the necessary underlying support, so this feature may not +# work for you. If it does work, you should be able to launch an +# OS or tool by clicking it with the mouse pointer. This feature +# is mutually exclusive with the enable_touch feature. If both +# are uncommented, the one read most recently takes precedence. +# +#enable_mouse + +# Size of the mouse pointer, in pixels, per side. +# Default is 16 +# +#mouse_size 16 + +# Speed of mouse tracking. Higher numbers equate to faster +# mouse movement. This option requires that enable_mouse be +# uncommented. +# Legal values are between 1 and 32. Default is 4. +# +#mouse_speed 4 + +# Launch specified OSes in graphics mode. By default, rEFInd switches +# to text mode and displays basic pre-launch information when launching +# all OSes except macOS. Using graphics mode can produce a more seamless +# transition, but displays no information, which can make matters +# difficult if you must debug a problem. Also, on at least one known +# computer, using graphics mode prevents a crash when using the Linux +# kernel's EFI stub loader. You can specify an empty list to boot all +# OSes in text mode. +# Valid options: +# osx - macOS +# linux - A Linux kernel with EFI stub loader +# elilo - The ELILO boot loader +# grub - The GRUB (Legacy or 2) boot loader +# windows - Microsoft Windows +# Default value: osx +# +#use_graphics_for osx,linux + +# Which non-bootloader tools to show on the tools line, and in what +# order to display them: +# shell - the EFI shell (requires external program; see rEFInd +# documentation for details) +# memtest - the memtest86 program, in EFI/tools, EFI/memtest86, +# EFI/memtest, EFI/tools/memtest86, EFI/tools/memtest, +# or a boot loader's directory +# gptsync - the (dangerous) gptsync.efi utility (requires external +# program; see rEFInd documentation for details) +# gdisk - the gdisk partitioning program +# apple_recovery - boots the Apple Recovery HD partition, if present +# windows_recovery - boots an OEM Windows recovery tool, if present +# (see also the windows_recovery_files option) +# mok_tool - makes available the Machine Owner Key (MOK) maintenance +# tool, MokManager.efi, used on Secure Boot systems +# csr_rotate - adjusts Apple System Integrity Protection (SIP) +# policy. Requires "csr_values" to be set. +# install - an option to install rEFInd from the current location +# to another ESP +# bootorder - adjust the EFI's (NOT rEFInd's) boot order +# about - an "about this program" option +# hidden_tags - manage hidden tags +# exit - a tag to exit from rEFInd +# shutdown - shuts down the computer (a bug causes this to reboot +# many UEFI systems) +# reboot - a tag to reboot the computer +# firmware - a tag to reboot the computer into the firmware's +# user interface (ignored on older computers) +# fwupdate - a tag to update the firmware; launches the fwupx64.efi +# (or similar) program +# netboot - launch the ipxe.efi tool for network (PXE) booting +# Default is shell,memtest,gdisk,apple_recovery,windows_recovery,mok_tool,about,hidden_tags,shutdown,reboot,firmware,fwupdate +# To completely disable scanning for all tools, provide a showtools line +# with no options. +# +#showtools shell, bootorder, gdisk, memtest, mok_tool, apple_recovery, windows_recovery, about, hidden_tags, reboot, exit, firmware, fwupdate +showtools install,bootorder,shell,memtest,gdisk,apple_recovery,csr_rotate,windows_recovery,mok_tool,about,shutdown,reboot,firmware + +# Additional directories to scan for tools. You may specify a directory +# alone or a volume identifier plus pathname. The default is to scan no +# extra directories, beyond EFI/tools and any directory in which an EFI +# loader is found. +# +#also_scan_tool_dirs EFI/memtest,ESP2:/EFI/tools/memtest86 + +# Tool binaries to be excluded from the tools line, even if the +# general class is specified in showtools. This enables trimming an +# overabundance of tools, as when you see multiple mok_tool entries +# after installing multiple Linux distributions. +# Just as with dont_scan_files, you can specify a filename alone, a +# full pathname, or a volume identifier (filesystem label, partition +# name, or partition GUID) and a full pathname. +# Default is an empty list (nothing is excluded) +# +#dont_scan_tools ESP2:/EFI/ubuntu/mmx64.efi,gptsync_x64.efi + +# Boot loaders that can launch a Windows restore or emergency system. +# These tend to be OEM-specific. +# Default is LRS_ESP:/EFI/Microsoft/Boot/LrsBootmgr.efi +# +#windows_recovery_files LRS_ESP:/EFI/Microsoft/Boot/LrsBootmgr.efi + +# Directories in which to search for EFI drivers. These drivers can +# provide filesystem support, give access to hard disks on plug-in +# controllers, etc. In most cases none are needed, but if you add +# EFI drivers and you want rEFInd to automatically load them, you +# should specify one or more paths here. rEFInd always scans the +# "drivers" and "drivers_{arch}" subdirectories of its own installation +# directory (where "{arch}" is your architecture code); this option +# specifies ADDITIONAL directories to scan. +# Default is to scan no additional directories for EFI drivers +# +#scan_driver_dirs EFI/tools/drivers,drivers + +# Which types of boot loaders to search, and in what order to display them: +# internal - internal EFI disk-based boot loaders +# external - external EFI disk-based boot loaders +# optical - EFI optical discs (CD, DVD, etc.) +# netboot - EFI network (PXE) boot options +# hdbios - BIOS disk-based boot loaders +# biosexternal - BIOS external boot loaders (USB, eSATA, etc.) +# cd - BIOS optical-disc boot loaders +# manual - use stanzas later in this configuration file +# firmware - boot EFI programs set in the firmware's NVRAM +# Note that the legacy BIOS options require firmware support, which is +# not present on all computers. +# The netboot option is experimental and relies on the ipxe.efi and +# ipxe_discover.efi program files. +# On UEFI PCs, default is internal,external,optical,manual +# On Macs, default is internal,hdbios,external,biosexternal,optical,cd,manual +# +scanfor manual + +# By default, rEFInd relies on the UEFI firmware to detect BIOS-mode boot +# devices. This sometimes doesn't detect all the available devices, though. +# For these cases, uefi_deep_legacy_scan results in a forced scan and +# modification of NVRAM variables on each boot. Adding "0", "off", or +# "false" resets to the default value. This token has no effect on Macs or +# when no BIOS-mode options are set via scanfor. +# Default is unset (or "uefi_deep_legacy_scan false") +# +#uefi_deep_legacy_scan + +# Delay for the specified number of seconds before scanning disks. +# This can help some users who find that some of their disks +# (usually external or optical discs) aren't detected initially, +# but are detected after pressing Esc. +# The default is 0. +# +#scan_delay 5 + +# When scanning volumes for EFI boot loaders, rEFInd always looks for +# macOS's and Microsoft Windows' boot loaders in their normal locations, +# and scans the root directory and every subdirectory of the /EFI directory +# for additional boot loaders, but it doesn't recurse into these directories. +# The also_scan_dirs token adds more directories to the scan list. +# Directories are specified relative to the volume's root directory. This +# option applies to ALL the volumes that rEFInd scans UNLESS you include +# a volume name and colon before the directory name, as in "myvol:/somedir" +# to scan the somedir directory only on the filesystem named myvol. If a +# specified directory doesn't exist, it's ignored (no error condition +# results). The "+" symbol denotes appending to the list of scanned +# directories rather than overwriting that list. +# The default is to scan the "boot" and "@/boot" directories in addition +# to various hard-coded directories. +# +#also_scan_dirs boot,ESP2:EFI/linux/kernels +#also_scan_dirs boot,@/boot +#also_scan_dirs +,@/kernels + +# Partitions (or whole disks, for legacy-mode boots) to omit from scans. +# For EFI-mode scans, you normally specify a volume by its label, which you +# can obtain in an EFI shell by typing "vol", from Linux by typing +# "blkid /dev/{devicename}", or by examining the disk's label in various +# OSes' file browsers. It's also possible to identify a partition by its +# unique GUID (aka its "PARTUUID" in Linux parlance). (Note that this is +# NOT the partition TYPE CODE GUID.) This identifier can be obtained via +# "blkid" in Linux or "diskutil info {partition-id}" in macOS. +# For legacy-mode scans, you can specify any subset of the boot loader +# description shown when you highlight the option in rEFInd. +# The default is "LRS_ESP". +# +#dont_scan_volumes "Recovery HD" + +# Directories that should NOT be scanned for boot loaders. By default, +# rEFInd doesn't scan its own directory, the EFI/tools directory, the +# EFI/memtest directory, the EFI/memtest86 directory, or the +# com.apple.recovery.boot directory. Using the dont_scan_dirs option +# enables you to "blacklist" other directories; but be sure to use "+" +# as the first element if you want to continue blacklisting existing +# directories. You might use this token to keep EFI/boot/bootx64.efi out +# of the menu if that's a duplicate of another boot loader or to exclude +# a directory that holds drivers or non-bootloader utilities provided by +# a hardware manufacturer. If a directory is listed both here and in +# also_scan_dirs, dont_scan_dirs takes precedence. Note that this +# blacklist applies to ALL the filesystems that rEFInd scans, not just +# the ESP, unless you precede the directory name by a filesystem name or +# partition unique GUID, as in "myvol:EFI/somedir" to exclude EFI/somedir +# from the scan on the myvol volume but not on other volumes. +# +#dont_scan_dirs ESP:/EFI/boot,EFI/Dell,EFI/memtest86 + +# Files that should NOT be included as EFI boot loaders (on the +# first line of the display). If you're using a boot loader that +# relies on support programs or drivers that are installed alongside +# the main binary or if you want to "blacklist" certain loaders by +# name rather than location, use this option. Note that this will +# NOT prevent certain binaries from showing up in the second-row +# set of tools. Most notably, various Secure Boot and recovery +# tools are present in this list, but may appear as second-row +# items. +# The file may be specified as a bare name (e.g., "notme.efi"), as +# a complete pathname (e.g., "/EFI/somedir/notme.efi"), or as a +# complete pathname with volume (e.g., "SOMEDISK:/EFI/somedir/notme.efi" +# or 2C17D5ED-850D-4F76-BA31-47A561740082:/EFI/somedir/notme.efi"). +# OS tags hidden via the Delete or '-' key in the rEFInd menu are +# added to this list, but stored in NVRAM. +# The default is shim.efi,shim-fedora.efi,shimx64.efi,PreLoader.efi, +# TextMode.efi,ebounce.efi,GraphicsConsole.efi,MokManager.efi,HashTool.efi, +# HashTool-signed.efi,bootmgr.efi,fb{arch}.efi +# (where "{arch}" is the architecture code, like "x64"). +# If you want to keep these defaults but add to them, be sure to +# specify "+" as the first item in the new list; if you don't, then +# items from the default list are likely to appear. +# +#dont_scan_files shim.efi,MokManager.efi + +# EFI NVRAM Boot#### variables that should NOT be presented as loaders +# when "firmware" is an option to "scanfor". The comma-separated list +# presented here contains strings that are matched against the +# description field -- if a value here is a case-insensitive substring +# of the boot option description, then it will be excluded from the +# boot list. To specify a string that includes a space, enclose it +# in quotes. Specifying "shell" will counteract the automatic +# inclusion of built-in EFI shells. +# +#dont_scan_firmware HARDDISK,shell,"Removable Device" + +# Scan for Linux kernels that lack a ".efi" filename extension. This is +# useful for better integration with Linux distributions that provide +# kernels with EFI stub loaders but that don't give those kernels filenames +# that end in ".efi", particularly if the kernels are stored on a +# filesystem that the EFI can read. When set to "1", "true", or "on", this +# option causes all files in scanned directories with names that begin with +# "vmlinuz", "bzImage", or "kernel" to be included as loaders, even if they +# lack ".efi" extensions. Passing this option a "0", "false", or "off" value +# causes kernels without ".efi" extensions to NOT be scanned. +# Default is "true" -- to scan for kernels without ".efi" extensions. +# +#scan_all_linux_kernels false + +# Support loaders that have been compressed with gzip. +# On x86 and x86-64 platforms, Linux kernels are self-decompressing. +# On ARM64, Linux kernel files are typically compressed with gzip, +# including the EFI stub loader. This makes them unloadable in rEFInd +# unless rEFInd itself uncompresses them. This option enables rEFInd +# to do this. This feature is unnecessary on x86 and x86-64 systems. +# Default is "false" on x86 and x86-64; "true" on ARM64. +# +#support_gzipped_loaders true + +# Combine all Linux kernels in a given directory into a single entry. +# When so set, the kernel with the most recent time stamp will be launched +# by default, and its filename will appear in the entry's description. +# To launch other kernels, the user must press F2 or Insert; alternate +# kernels then appear as options on the sub-menu. +# Default is "true" -- kernels are "folded" into a single menu entry. +# +#fold_linux_kernels false + +# Filename prefixes that indicate a file is a Linux kernel. Files that +# begin with any of these strings are treated as Linux kernels, if they +# are also EFI boot loaders. To include the default string, use "+" +# Default is "vmlinuz,bzImage,kernel", except on ARM64, where it is +# "vmlinuz,Image,kernel". +# +#linux_prefixes vmlinuz,bzImage,kernel +#linux_prefixes +,zImage + +# Comma-delimited list of strings to treat as if they were numbers for the +# purpose of kernel version number detection. These strings are matched on a +# first-found basis; that is, if you want to treat both "linux-lts" and +# "linux" as version strings, they MUST be specified as "linux-lts,linux", +# since if you specify it the other way, both vmlinuz-linux and +# vmlinuz-linux-lts will return with "linux" as the "version string," which +# is not what you'd want. Also, if the kernel or initrd file includes both a +# specified string and digits, the "version string" includes both. For +# instance, "vmlinuz-linux-4.8" would yield a version string of "linux-4.8". +# This option is intended for Arch and other distributions that don't include +# version numbers in their kernel filenames, but may provide other uniquely +# identifying strings for multiple kernels. If this feature causes problems +# (say, if your kernel filename includes "linux" but the initrd filename +# doesn't), be sure this is set to an empty string +# (extra_kernel_version_strings "") or comment out the option to disable it. +# Default is no extra version strings +# +#extra_kernel_version_strings linux-lts,linux + +# Write to systemd EFI variables (currently only LoaderDevicePartUUID) when +# launching Linux via an EFI stub loader, ELILO, or GRUB. This variable, +# when present, causes systemd to mount the ESP at /boot or /efi *IF* either +# directory is empty and nothing else is mounted there. +# Default is "false" +# +#write_systemd_vars true + +# Symlinked loaders will be processed when this setting is set to true. +# These are ignored by default as they may result in undesirable outcomes. +# This token may, however, be useful on Linux setups that provide symbolic +# links in scanned locations that point to kernels in unscanned locations, +# such as some openSUSE installations. +# +#follow_symlinks true + +# Set the maximum number of tags that can be displayed on the screen at +# any time. If more loaders are discovered than this value, rEFInd shows +# a subset in a scrolling list. If this value is set too high for the +# screen to handle, it's reduced to the value that the screen can manage. +# If this value is set to 0 (the default), it's adjusted to the number +# that the screen can handle. +# +#max_tags 0 + +# Set the default menu selection. The available arguments match the +# keyboard accelerators available within rEFInd. You may select the +# default loader using: +# - A digit between 1 and 9, in which case the Nth loader in the menu +# will be the default. +# - A "+" symbol at the start of the string, which refers to the most +# recently booted loader. +# - Any substring that corresponds to a portion of the loader's title +# (usually the OS's name, boot loader's path, or a volume or +# filesystem title). +# You may also specify multiple selectors by separating them with commas +# and enclosing the list in quotes. (The "+" option is only meaningful in +# this context.) +# If you follow the selector(s) with two times, in 24-hour format, the +# default will apply only between those times. The times are in the +# motherboard's time standard, whether that's UTC or local time, so if +# you use UTC, you'll need to adjust this from local time manually. +# Times may span midnight as in "23:30 00:30", which applies to 11:30 PM +# to 12:30 AM. You may specify multiple default_selection lines, in which +# case the last one to match takes precedence. Thus, you can set a main +# option without a time followed by one or more that include times to +# set different defaults for different times of day. +# The default behavior is to boot the previously-booted OS. +# +#default_selection 1 +#default_selection Microsoft +#default_selection "+,bzImage,vmlinuz" +#default_selection Maintenance 23:30 2:00 +#default_selection "Maintenance,macOS" 1:00 2:30 + +# Enable VMX bit and lock the CPU MSR if unlocked. +# On some Intel Apple computers, the firmware does not lock the MSR 0x3A. +# The symptom on Windows is Hyper-V not working even if the CPU +# meets the minimum requirements (HW assisted virtualization and SLAT) +# DO NOT SET THIS EXCEPT ON INTEL CPUs THAT SUPPORT VMX! See +# http://www.thomas-krenn.com/en/wiki/Activating_the_Intel_VT_Virtualization_Feature +# for more on this subject. +# The default is false: Don't try to enable and lock the MSR. +# +#enable_and_lock_vmx false + +# Tell a Mac's EFI that macOS is about to be launched, even when it's not. +# This option causes some Macs to initialize their hardware differently than +# when a third-party OS is launched normally. In some cases (particularly on +# Macs with multiple video cards), using this option can cause hardware to +# work that would not otherwise work. On the other hand, using this option +# when it is not necessary can cause hardware (such as keyboards and mice) to +# become inaccessible. Therefore, you should not enable this option if your +# non-Apple OSes work correctly; enable it only if you have problems with +# some hardware devices. When needed, a value of "10.9" usually works, but +# you can experiment with other values. This feature has no effect on +# non-Apple computers. +# The default is inactive (no macOS spoofing is done). +# +#spoof_osx_version 10.9 + +# Set the CSR values for Apple's System Integrity Protection (SIP) feature. +# Values are two-byte (four-character) hexadecimal numbers. These values +# define which specific security features are enabled. Below are the codes +# for what the values mean. Add them up (in hexadecimal!) to set new values. +# Apple's "csrutil enable" and "csrutil disable" commands set values of 10 +# and 877, respectively. (Prior to OS 11, 77 was used rather than 877; 877 +# is required for OS 11, and should work for OS X 10.x, too.) +# CSR_ALLOW_UNTRUSTED_KEXTS 0x0001 +# CSR_ALLOW_UNRESTRICTED_FS 0x0002 +# CSR_ALLOW_TASK_FOR_PID 0x0004 +# CSR_ALLOW_KERNEL_DEBUGGER 0x0008 +# CSR_ALLOW_APPLE_INTERNAL 0x0010 +# CSR_ALLOW_UNRESTRICTED_DTRACE 0x0020 +# CSR_ALLOW_UNRESTRICTED_NVRAM 0x0040 +# CSR_ALLOW_DEVICE_CONFIGURATION 0x0080 +# CSR_ALLOW_ANY_RECOVERY_OS 0x0100 +# CSR_ALLOW_UNAPPROVED_KEXTS 0x0200 +# CSR_ALLOW_EXECUTABLE_POLICY_OVERRIDE 0x0400 +# CSR_ALLOW_UNAUTHENTICATED_ROOT 0x0800 +#csr_values 10,877 +csr_values 10,77 +csr_values 10,77 + +# Include a secondary configuration file within this one. This secondary +# file is loaded as if its options appeared at the point of the "include" +# token itself, so if you want to override a setting in the main file, +# the secondary file must be referenced AFTER the setting you want to +# override. Note that the secondary file may NOT load a tertiary file. +# +#include manual.conf + +# Sample manual configuration stanzas. Each begins with the "menuentry" +# keyword followed by a name that's to appear in the menu (use quotes +# if you want the name to contain a space) and an open curly brace +# ("{"). Each entry ends with a close curly brace ("}"). Common +# keywords within each stanza include: +# +# volume - identifies the filesystem from which subsequent files +# are loaded. You can specify the volume by filesystem +# label, by partition label, or by partition GUID number +# (but NOT yet by filesystem UUID number). +# loader - identifies the boot loader file +# initrd - Specifies an initial RAM disk file +# icon - specifies a custom boot loader icon +# ostype - OS type code to determine boot options available by +# pressing Insert. Valid values are "MacOS", "Linux", +# "Windows", and "XOM". Case-sensitive. +# graphics - set to "on" to enable graphics-mode boot (useful +# mainly for MacOS) or "off" for text-mode boot. +# Default is auto-detected from loader filename. +# options - sets options to be passed to the boot loader; use +# quotes if more than one option should be passed or +# if any options use characters that might be changed +# by rEFInd parsing procedures (=, /, #, or tab). +# disabled - use alone or set to "yes" to disable this entry. +# +# Note that you can use either DOS/Windows/EFI-style backslashes (\) +# or Unix-style forward slashes (/) as directory separators. Either +# way, all file references are on the ESP from which rEFInd was +# launched. +# Use of quotes around parameters causes them to be interpreted as +# one keyword, and for parsing of special characters (spaces, =, /, +# and #) to be disabled. This is useful mainly with the "options" +# keyword. Use of quotes around parameters that specify filenames is +# permissible, but you must then use backslashes instead of slashes, +# except when you must pass a forward slash to the loader, as when +# passing a root= option to a Linux kernel. + +menuentry "PikaOS Live Image" { + icon EFI/BOOT/REFIND-DARK/ICONS/OS_PIKAOS.PNG + loader EFI/VMLINUZ + initrd EFI/INITRD + options "boot=live modules_load=nvidia nvidia-drm.modeset=0 quiet splash" + submenuentry "Boot live image with logging" { + options "boot=live modules_load=nvidia nvidia-drm.modeset=0" + } + submenuentry "Boot live image with safe graphics" { + options "boot=live nomodeset" + } +} + +include refind-dark/refind-dark.conf diff --git a/nvidia-enablement/data/refind/refind_linux.conf b/nvidia-enablement/data/refind/refind_linux.conf new file mode 100644 index 0000000..f5d88c5 --- /dev/null +++ b/nvidia-enablement/data/refind/refind_linux.conf @@ -0,0 +1,3 @@ +"Boot live image with standard options" "boot=live modules_load=nvidia nvidia-drm.modeset=0 quiet splash ---" +"Boot live image with logging" "boot=live modules_load=nvidia nvidia-drm.modeset=0 ---" +"Boot live image with safe graphics" "boot=live nomodeset ---" diff --git a/nvidia-enablement/hooks/3-install-nvidia-driver.chroot b/nvidia-enablement/hooks/3-install-nvidia-driver.chroot new file mode 100755 index 0000000..376b10e --- /dev/null +++ b/nvidia-enablement/hooks/3-install-nvidia-driver.chroot @@ -0,0 +1,4 @@ +#!/bin/bash + +apt-get install --yes --option Dpkg::Options::="--force-confnew" --option Dpkg::Options::="--force-overwrite" \ + nvidia-driver-560 \ No newline at end of file diff --git a/pool-lists/0-main.list b/pool-lists/0-main.list new file mode 100755 index 0000000..4a489f7 --- /dev/null +++ b/pool-lists/0-main.list @@ -0,0 +1,29 @@ +at +dfu-programmer +efibootmgr +ethtool +grub-efi-amd64 +grub-efi-amd64-bin +grub-efi-amd64-signed +grub2-common +grub-pc +grub-pc-bin +libfl2 +libx86-1 +lm-sensors +plymouth +plymouth-label +pm-utils +postfix +powermgmt-base +python3-debian +python3-distro +python3-evdev +python3-systemd +vbetool +xbacklight +refind +mokutil +pika-refind-theme +booster +zram-tools \ No newline at end of file diff --git a/release.sh b/release.sh new file mode 100755 index 0000000..8392d8c --- /dev/null +++ b/release.sh @@ -0,0 +1,2 @@ +# send the output image to ISO server +rsync -azP ./output/ ferreo@direct.pika-os.com:/srv/www/pikaiso/ diff --git a/rem-lists/live-boot.list b/rem-lists/live-boot.list new file mode 100755 index 0000000..2b2b381 --- /dev/null +++ b/rem-lists/live-boot.list @@ -0,0 +1,15 @@ +ibus-mozc +imagemagick-6.q16 +irqbalance +mozc-utils-gui +snapd +ubuntu-session +ubuntu-wallpapers +unattended-upgrades +xul-ext-ubufox +yaru-theme-gnome-shell +tilix +apport +rtkit +emacs-common +cosmic-term \ No newline at end of file