aboutsummaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAge
* Loader: call BmSetMemoryTypeInformationVariablev1.1Mattiwatti2020-05-28
| | | | | | Note that BmSetMemoryTypeInformationVariable() is told by the loader that the image being loaded is *not* a boot application, which is a blatant lie. The reason for doing this is to prevent BmSetMemoryTypeInformationVariable() from performing a warm reset of the system due to a change in the memory type info. (Again, and again, and again...) This is an attempt to fix S4 (hibernate) entry/resume issues; see #12.
* Patch nt!KiMcaDeferredRecoveryService on Windows >= 8.1Mattiwatti2020-05-07
|
* Patch nt!KiVerifyScopesExecute on Windows >= 8.1Mattiwatti2020-05-07
|
* Disable PatchGuard verification call in KiSwInterruptMattiwatti2020-05-03
| | | | KiSwInterrupt is present since Windows 10 and is the interrupt handler for int 20h. This interrupt is a spurious interrupt on older versions of Windows, and does nothing useful on Windows 10. If int 20h is issued from kernel mode, the PatchGuard verification routine KiSwInterruptDispatch is called. This leads to a bugcheck if PatchGuard has not been initialized.
* Loader: support legacy BIOS boot entries in the fallback pathv1.0.3Mattiwatti2020-04-25
| | | | Fixes #9
* Fix comment typoMattiwatti2020-04-25
|
* Update SeCodeIntegrityQueryInformation signatureMattiwatti2019-12-04
| | | | This makes this optional pattern scan work on the current Windows 10 20H1 preview release
* Compile as UTF-8Mattiwatti2019-12-04
|
* Update Zydis submodulev1.0.2Mattiwatti2019-10-07
|
* Disable Spectre mitigation crapMattiwatti2019-10-07
|
* Update README.mdMattiwatti2019-10-07
|
* Fix potential recursive self-boot by Loader.efiMattiwatti2019-07-09
| | | | | | The EFI variable "BootCurrent" corresponds to XXXX in some variable "BootXXXX", and this value was being used to guard against recursive self-booting. However, EfiBootManagerGetLoadOptions() already returns the options sorted by the contents of the "BootOrder" variable, which means that XXXX does not necessarily correspond to the linear index in a for loop. Instead use BootOptions[Index].OptionNumber to retrieve and compare the original value of XXXX Fixes #5
* EfiDSEFix: HDE64 fixesMattiwatti2019-05-30
| | | | | | - Make hde64_table const to prevent it from ending up in .data - #include <intrin.h> because Clang gets confused by __stosb without it - Fix various warnings
* Update ntdll.hMattiwatti2019-05-30
|
* Call driver unload if a non-Windows OS is being bootedMattiwatti2019-05-06
|
* Update arc.hMattiwatti2019-05-06
|
* Minor fixesMattiwatti2019-05-06
|
* Fix two dumb mistakes that were cancelling each other outMattiwatti2019-05-06
| | | | PE section names must be null terminated because they are not guaranteed to be. However they must be null terminated at 8 characters, not at the length of the string that happens to be relevant for whatever reason. This would have led to false positives when finding sections, were it not for the off-by-one error that was keeping an additional character in the buffer
* Update UEFI shell linkMattiwatti2019-04-29
| | | | | | ShellBinPkg was removed from EDK2's master tree: https://github.com/tianocore/edk2/commit/81a8a52a6bb21afca8ce5b507575b24b3f3a15e7 The TianoCore recommended way to obtain the shell binary is now to download a stable release from https://github.com/tianocore/edk2/releases and extract the shell binary from the assets ZIP. Since this change prevents linking to the .efi file directly as before, change the download link in the README to the last stable tag to include ShellBinPkg instead
* Update to VS2019Mattiwatti2019-04-08
|
* EfiDSEFix: on Windows >= 8, use a different default g_CiOptions valuev1.0.1Mattiwatti2019-03-30
| | | | Fixes #1
* EfiDSEFix: read input value for '--enable' as hex to match '--disable'Mattiwatti2019-03-30
|
* Update README.mdMattiwatti2019-03-28
|
* Ensure ntdllp.lib only exports Vista-compatible symbolsMattiwatti2019-03-28
|
* Minor fixesMattiwatti2019-03-28
|
* Initial commitv1.0Mattiwatti2019-03-25