forked from pbatard/rufus
-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[pull] master from pbatard:master #2
Open
pull
wants to merge
406
commits into
GesuBackups:master
Choose a base branch
from
pbatard:master
base: master
Could not load branches
Branch not found: {{ refName }}
Loading
Could not load tags
Nothing to show
Loading
Are you sure you want to change the base?
Some commits from the old base branch may be removed from the timeline,
and old review comments may become outdated.
+54,907
−13,814
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
pbatard
force-pushed
the
master
branch
3 times, most recently
from
September 4, 2021 00:20
e72bf13
to
f4be099
Compare
pbatard
force-pushed
the
master
branch
5 times, most recently
from
October 4, 2021 12:30
6cbab73
to
e6a967c
Compare
pbatard
force-pushed
the
master
branch
3 times, most recently
from
November 16, 2021 18:54
6de200a
to
d840083
Compare
pbatard
force-pushed
the
master
branch
2 times, most recently
from
January 7, 2022 13:27
5266179
to
a47072c
Compare
pbatard
force-pushed
the
master
branch
8 times, most recently
from
December 15, 2022 19:54
943b5a1
to
8d04e5f
Compare
…ows 11 24H2 * Per https://forums.mydigitallife.net/threads/win-11-boot-and-upgrade-fix-kit-v5-0-released.83724/ Windows 11 24H2 requires new registry bypasses to be applied to perform in-place upgrade on non officially supported platforms, and those need to be enacted before running setup.exe. * In order to streamline this, and because those registry bypasses require elevation, we rename setup.exe to setup.dll and add our own setup.exe wrapper to set the registry and then call the original setup.exe (through setup.dll). * See #2568 * Also fix some MinGW build warnings. * Also fix the annoyance of TortoiseGit/Notepad++ altering the copyright symbol of rufus.rc.
… 24H2 _EX versions * This aims at creating installation media that is compatible with systems where 'Microsoft Windows Production PCA 2011' has been revoked. * Doesn't work, since the bootloaders being applied by the first stage installer come from \sources\install.wim[#]\windows\system32\Recovery\Winre.wim[#]\Windows\Boot\ (instead of \sources\boot.wim[#]\Windows\Boot\ as one would naturally expect) and Microsoft botched the ones they included there by using completely vulnerable (and therefore revoked) ones. See #2244 (comment). * Still, I sure haven't gone through this excruciating ACL bullshit for nothing, so you get an experimental option, behind the expert mode curtain.
* This is currently only used to detect the use of 'Microsoft Windows Production PCA 2011' signed bootloaders. * Because the cert is still in the process of being revoked, and Windows 11 24H2 still uses 'Microsoft Windows Production PCA 2011' signed bootloaders by default, only report this if running in expert mode. * Also fix non-reachable code in wue.c.
* Also fix SBAT not being properly parsed for PE32 executables. * Also fix signature truncation in GetIssuerCertificateInfo() and fall back to returning signer data if issuer is not available (which is typically the case for GRUB signed bootloaders). * Also fix status messages on user cancellation/proceeding.
* Also fix a couple small memory leaks and potential NULL deref. * Also report saved path when saving to image.
* Do not report SBAT revocations unless we actually have a formal Secure Boot signed bootloader. * Also reduce verbose log pollution by libcdio.
* Commit f453dc2 improved on error message reporting, but went a bit too far in trying to let Windows facilities sort their messages out. * Add a retry that clears the facility, so that, for one thing, we get wininet messages properly processed, regardless of the official facility assigned.
* Closes #2589. Signed-off-by: Justin Miller <justin.miller@reactos.org>
* Similar to what we already do with IgnoreUSB##, except this time, users can add REG_SZ keys IgnoreDisk01 to IgnoreDisk08, with a string like "{F333EC2E-25C9-488D-A7FC-9147C2367623}" to ignore a GPT disk with this specific GUID. * This may be useful for people who mount fixed virtual drives, or people who have enabled Hot Swap on their SATA storage, and who want to make sure they won't be able to inadvertently select that disk in Rufus. * Also set rufus-next to 4.7.
* Per actions/runner-images#10981 and plenty of other similar reports, GitHub Actions can no longer compile ARM32 binaries by default using the latest Visual Studio toolchain, due to Microsoft current Windows SDK having dropped the ARM32 toolchain (per zufuliu/notepad4#839). * Well, I have better things to do then try to maintain platforms in the process of being deprecated, so I'll let the people who care about Rufus on ARM32 propose a non-intrusive workaround that can work with current GitHub Actions.
* Based on the latest Bled, which adds ztsd compression support. * Note that initial extraction of the 512 bytes MBR is very slow, because is seems clear that ZSTD was never designed for fast init or processing small elements of data, but instead for post init large volume streaming. * Also note that this code adds 400 KB to the Rufus executable *AFTER UPX COMPRESSION*! Hopefully, the BusyBox folks can come up with a better and smaller way to add zstd support, because it's clear that the method used by the current BusyBox proposal, which is to leave as much of the original code untouched, isn't for the best... * Closes #2590. * Closes #2620. * Closes #2621.
* This mostly updates the ZSTD code to latest and properly removes all debug message. * Also switch MinGW from gnu99 to gnu11.
* Move the cpu.c/cpu.h in more logical places and remove these sources files. * Add detection for LoongArch64 EFI bootloaders. * Pass the detected CPU arch when invoking Fido. * Also fix some Bled Coverity warnings.
…fferent directory * Closes #2622.
* Needed to read 12 chars instead of stopping at 11 and therefore inserting a NUL. * Closes #2534. * Also enable detection of bootriscv64.efi and bootloongarch64.efi bootloaders from FAT images.
* Closes #2636.
* This is in light of the 2025.01.14 DBX update due to https://arstechnica.com/security/2025/01/microsoft-patches-windows-to-eliminate-secure-boot-bypass-threat/. * Also update application copyright year and a translator's e-mail address.
pbatard
force-pushed
the
master
branch
3 times, most recently
from
January 25, 2025 12:31
121b764
to
ba49668
Compare
* Since GitHub broke existing paths and did not bother to alert people. * Closes #2672.
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
See Commits and Changes for more details.
Created by pull[bot] (v2.0.0-alpha.1)
Can you help keep this open source service alive? 💖 Please sponsor : )