![]() ![]() Open BGRTInjector.sln in Visual Studio and click Build Solution.拖到本地,然后mkdir cmake_build cd cmake_build 新建一个目录用于build,然后进入该目录; MSVC C Spectre-mitigated libs (for architectures you need).MSVC C build tools (for architectures you need).VERTICAL_ALIGN_RATIO and HORIZONTAL_ALIGN_RATIO: a float number between 0 and 1 to indicate where to put the image on the screen.In driver mode, it quits after BGRT table has been injected. In Windows loader mode, it will automatically search for EFI\Microsoft\Boot\bootmgfw.efi and start it after BGRT table has been injected. LOAD_WINDOWS: use Windows loader mode if set, otherwise use driver mode._DEBUG: debug output and more pauses to see the log on the screen.# do not switch to text mode when booting otherwise screen resolution will still be incorrect Here's a rEFInd config from my computer for reference. Either tell rEFInd not to switch to text mode before loading OS, or disable graphics mode (full screen logo display) in your BIOS.Hard code the resolution you need in rEFInd's config file.Download a Windows loader mode BGRTInjector and put it under ESP:\.Remove BGRTInjector from drivers_圆4 folder.All the drivers are launched prior to rEFInd setting the GOP resolution, so BGRTInjector would read a smaller screen resolution. This typically happens when you are using driver mode and your firmware does not set GOP resolution to the max available value. Delete ESP:\EFI\refind\drivers_圆4\ntfs_圆4.efi and other filesystem drivers if you don't need them. You have too many hard disks or the NTFS driver comes with rEFInd is causing a hang. FAQ Stuck at loading boot image from disk In Windows loader mode, BGRTInjector does not verify the authenticity of the target bootloader. If you are not signing your own Secure Boot keys, using BGRTInjector means Secure Boot will be unavailable. Additionally BGRTInjector does some basic sanity checks on the image file, but it is still prone to specially crafted evil images. BGRTInjector only reads the image file from the volume (partition) it lives in, and ESP partition is usually protected under end-user accessible operating systems, so we can assume only a system administrator or a evil maid can load an evil image. Loading untrusted image into memory is dangerous. Python3 bin2array.py -O default_boot_ your_image.bmp Security To do the convertion you can use bin2array: Change the built-in default imageĬonvert a 24-bit BMP image to C-style array initializer, replace default_boot_ and compile. If the image is larger than the default UEFI GOP resolution, it will not be displayed. The image will be displayed on the center of the screen, 1:1 pixel aligned. If BGRTInjector complains about image file size incorrect, please open the BMP image in mspaint.exe then save it to fix its header. To customize the image, put a 24-bit (other modes and formats are not supported) BMP image named boot_image.bmp into the root directory of your ESP volume (right beside the EFI directory). You might need to manually register a UEFI boot entry on these systems.) Usage Customize the image (Firmware on some devices will load Windows first which is a violation of the UEFI standard. This can be achieved by putting it to ESP:\EFI\boot\boot圆4.efi. Put a release build of BGRTInjector.efi (Windows loader mode) into your ESP volume and set it as the default loader. Installation without 3rd-party bootloader Put a release build of BGRTInjector.efi (driver mode) into ESP:\EFI\refind\drivers_圆4 and reboot. You need to disable Secure Boot or sign it on your own, obviously. Run BGRTInjector.efi either manually or automatically before your OS loads. An operating system that reads BGRT table (reads: Windows 8.1 or later).UEFI firmware (some old EFI firmwares might be supported as well).Several incompatibilities with non-Apple UEFI implementations are addressed, and you can now replace the logo without recompiling the whole program. This is a remake of Ben Wang's windows_custom_loader.efi, the source code of which is long lost. Changes the boot screen image on a UEFI computer. ![]()
0 Comments
Leave a Reply. |