mirror of
				https://github.com/pbatard/rufus.git
				synced 2024-08-14 23:57:05 +00:00 
			
		
		
		
	[misc] fix Coverity warnings
* Also use a new if_not_assert() construct where possible.
This commit is contained in:
		
							parent
							
								
									78608c35fe
								
							
						
					
					
						commit
						ceee3e9a28
					
				
					 24 changed files with 133 additions and 70 deletions
				
			
		|  | @ -426,6 +426,11 @@ static unsigned int test_rw(HANDLE hDrive, blk64_t last_block, size_t block_size | ||||||
| 		cancel_ops = -1; | 		cancel_ops = -1; | ||||||
| 		return 0; | 		return 0; | ||||||
| 	} | 	} | ||||||
|  | 	if ((first_block * block_size > 1 * PB) || (last_block * block_size > 1 * PB)) { | ||||||
|  | 		uprintf("%sDisk is too large\n", bb_prefix); | ||||||
|  | 		cancel_ops = -1; | ||||||
|  | 		return 0; | ||||||
|  | 	} | ||||||
| 
 | 
 | ||||||
| 	buffer = allocate_buffer(2 * blocks_at_once * block_size); | 	buffer = allocate_buffer(2 * blocks_at_once * block_size); | ||||||
| 	if (!buffer) { | 	if (!buffer) { | ||||||
|  | @ -543,8 +548,11 @@ static unsigned int test_rw(HANDLE hDrive, blk64_t last_block, size_t block_size | ||||||
| 			for (i=0; i < got; i++) { | 			for (i=0; i < got; i++) { | ||||||
| 				if (memcmp(read_buffer + i * block_size, | 				if (memcmp(read_buffer + i * block_size, | ||||||
| 					   buffer + i * block_size, | 					   buffer + i * block_size, | ||||||
| 					   block_size)) | 					   block_size)) { | ||||||
|  | 					if_not_assert(currently_testing * block_size < 1 * PB)  | ||||||
|  | 						goto out; | ||||||
| 					bb_count += bb_output(currently_testing+i-got, CORRUPTION_ERROR); | 					bb_count += bb_output(currently_testing+i-got, CORRUPTION_ERROR); | ||||||
|  | 				} | ||||||
| 			} | 			} | ||||||
| 			if (v_flag > 1) | 			if (v_flag > 1) | ||||||
| 				print_status(); | 				print_status(); | ||||||
|  |  | ||||||
|  | @ -38,6 +38,7 @@ static void crc32init_le(uint32_t *crc32table_le) | ||||||
| 	crc32table_le[0] = 0; | 	crc32table_le[0] = 0; | ||||||
| 
 | 
 | ||||||
| 	for (i = 1 << (CRC_LE_BITS - 1); i; i >>= 1) { | 	for (i = 1 << (CRC_LE_BITS - 1); i; i >>= 1) { | ||||||
|  | 		// coverity[overflow_const]
 | ||||||
| 		crc = (crc >> 1) ^ ((crc & 1) ? CRCPOLY_LE : 0); | 		crc = (crc >> 1) ^ ((crc & 1) ? CRCPOLY_LE : 0); | ||||||
| 		for (j = 0; j < 1 << CRC_LE_BITS; j += 2 * i) | 		for (j = 0; j < 1 << CRC_LE_BITS; j += 2 * i) | ||||||
| 			crc32table_le[i + j] = crc ^ crc32table_le[j]; | 			crc32table_le[i + j] = crc ^ crc32table_le[j]; | ||||||
|  | @ -81,6 +82,7 @@ static void crc32init_be(uint32_t *crc32table_be) | ||||||
| 	uint32_t crc = 0x80000000; | 	uint32_t crc = 0x80000000; | ||||||
| 
 | 
 | ||||||
| 	for (i = 1; i < 1 << CRC_BE_BITS; i <<= 1) { | 	for (i = 1; i < 1 << CRC_BE_BITS; i <<= 1) { | ||||||
|  | 		// coverity[overflow_const]
 | ||||||
| 		crc = (crc << 1) ^ ((crc & 0x80000000) ? CRCPOLY_BE : 0); | 		crc = (crc << 1) ^ ((crc & 0x80000000) ? CRCPOLY_BE : 0); | ||||||
| 		for (j = 0; j < i; j++) | 		for (j = 0; j < i; j++) | ||||||
| 			crc32table_be[i + j] = crc ^ crc32table_be[j]; | 			crc32table_be[i + j] = crc ^ crc32table_be[j]; | ||||||
|  |  | ||||||
|  | @ -280,6 +280,7 @@ static unsigned fill_bitbuffer(STATE_PARAM unsigned bitbuffer, unsigned *current | ||||||
| 		bytebuffer_offset++; | 		bytebuffer_offset++; | ||||||
| 		*current += 8; | 		*current += 8; | ||||||
| 	} | 	} | ||||||
|  | 	// coverity[return_overflow]
 | ||||||
| 	return bitbuffer; | 	return bitbuffer; | ||||||
| } | } | ||||||
| 
 | 
 | ||||||
|  | @ -661,7 +662,7 @@ static NOINLINE int inflate_codes(STATE_PARAM_ONLY) | ||||||
| 
 | 
 | ||||||
| 
 | 
 | ||||||
| /* called once from inflate_block */ | /* called once from inflate_block */ | ||||||
| static void inflate_stored_setup(STATE_PARAM int my_n, int my_b, int my_k) | static void inflate_stored_setup(STATE_PARAM unsigned my_n, unsigned my_b, unsigned my_k) | ||||||
| { | { | ||||||
| 	inflate_stored_n = my_n; | 	inflate_stored_n = my_n; | ||||||
| 	inflate_stored_b = my_b; | 	inflate_stored_b = my_b; | ||||||
|  | @ -1043,7 +1044,15 @@ inflate_unzip_internal(STATE_PARAM transformer_state_t *xstate) | ||||||
| 			n = (nwrote <0)?nwrote:-1; | 			n = (nwrote <0)?nwrote:-1; | ||||||
| 			goto ret; | 			goto ret; | ||||||
| 		} | 		} | ||||||
| 		IF_DESKTOP(n += nwrote;) | #if ENABLE_DESKTOP | ||||||
|  | 		long long int v = n + nwrote; | ||||||
|  | 		if (v < n) { | ||||||
|  | 			bb_simple_error_msg("overflow"); | ||||||
|  | 			n = -1; | ||||||
|  | 			goto ret; | ||||||
|  | 		} | ||||||
|  | 		n = v; | ||||||
|  | #endif | ||||||
| 		if (r == 0) break; | 		if (r == 0) break; | ||||||
| 	} | 	} | ||||||
| 
 | 
 | ||||||
|  | @ -1054,6 +1063,7 @@ inflate_unzip_internal(STATE_PARAM transformer_state_t *xstate) | ||||||
| 		bytebuffer_offset--; | 		bytebuffer_offset--; | ||||||
| 		bytebuffer[bytebuffer_offset] = gunzip_bb & 0xff; | 		bytebuffer[bytebuffer_offset] = gunzip_bb & 0xff; | ||||||
| 		gunzip_bb >>= 8; | 		gunzip_bb >>= 8; | ||||||
|  | 		// coverity[overflow_const]
 | ||||||
| 		gunzip_bk -= 8; | 		gunzip_bk -= 8; | ||||||
| 	} | 	} | ||||||
|  ret: |  ret: | ||||||
|  |  | ||||||
|  | @ -23,6 +23,7 @@ | ||||||
| #include "platform.h" | #include "platform.h" | ||||||
| #include "msapi_utf8.h" | #include "msapi_utf8.h" | ||||||
| 
 | 
 | ||||||
|  | #include <assert.h> | ||||||
| #include <ctype.h> | #include <ctype.h> | ||||||
| #include <errno.h> | #include <errno.h> | ||||||
| #include <fcntl.h> | #include <fcntl.h> | ||||||
|  |  | ||||||
|  | @ -18,6 +18,7 @@ | ||||||
| /* #define XZ_DEC_ARMTHUMB */ | /* #define XZ_DEC_ARMTHUMB */ | ||||||
| /* #define XZ_DEC_SPARC */ | /* #define XZ_DEC_SPARC */ | ||||||
| 
 | 
 | ||||||
|  | #include <assert.h> | ||||||
| #include <stdbool.h> | #include <stdbool.h> | ||||||
| #include <stdlib.h> | #include <stdlib.h> | ||||||
| #include <string.h> | #include <string.h> | ||||||
|  |  | ||||||
|  | @ -109,6 +109,7 @@ static noinline_for_stack size_t XZ_FUNC bcj_x86( | ||||||
| 		if ((buf[i] & 0xFE) != 0xE8) | 		if ((buf[i] & 0xFE) != 0xE8) | ||||||
| 			continue; | 			continue; | ||||||
| 
 | 
 | ||||||
|  | 		// coverity[overflow_const]
 | ||||||
| 		prev_pos = i - prev_pos; | 		prev_pos = i - prev_pos; | ||||||
| 		if (prev_pos > 3) { | 		if (prev_pos > 3) { | ||||||
| 			prev_mask = 0; | 			prev_mask = 0; | ||||||
|  |  | ||||||
|  | @ -622,7 +622,7 @@ static void XZ_FUNC lzma_len(struct xz_dec_lzma2 *s, struct lzma_len_dec *l, | ||||||
| 		uint32_t pos_state) | 		uint32_t pos_state) | ||||||
| { | { | ||||||
| 	uint16_t *probs; | 	uint16_t *probs; | ||||||
| 	uint32_t limit; | 	uint32_t limit, v; | ||||||
| 
 | 
 | ||||||
| 	if (!rc_bit(&s->rc, &l->choice)) { | 	if (!rc_bit(&s->rc, &l->choice)) { | ||||||
| 		probs = l->low[pos_state]; | 		probs = l->low[pos_state]; | ||||||
|  | @ -641,7 +641,9 @@ static void XZ_FUNC lzma_len(struct xz_dec_lzma2 *s, struct lzma_len_dec *l, | ||||||
| 		} | 		} | ||||||
| 	} | 	} | ||||||
| 
 | 
 | ||||||
| 	s->lzma.len += rc_bittree(&s->rc, probs, limit) - limit; | 	v = s->lzma.len + rc_bittree(&s->rc, probs, limit) - limit; | ||||||
|  | 	assert(v >= s->lzma.len); | ||||||
|  | 	s->lzma.len = (v < s->lzma.len) ? 0 : v; | ||||||
| } | } | ||||||
| 
 | 
 | ||||||
| /* Decode a match. The distance will be stored in s->lzma.rep0. */ | /* Decode a match. The distance will be stored in s->lzma.rep0. */ | ||||||
|  | @ -660,6 +662,7 @@ static void XZ_FUNC lzma_match(struct xz_dec_lzma2 *s, uint32_t pos_state) | ||||||
| 	lzma_len(s, &s->lzma.match_len_dec, pos_state); | 	lzma_len(s, &s->lzma.match_len_dec, pos_state); | ||||||
| 
 | 
 | ||||||
| 	probs = s->lzma.dist_slot[lzma_get_dist_state(s->lzma.len)]; | 	probs = s->lzma.dist_slot[lzma_get_dist_state(s->lzma.len)]; | ||||||
|  | 	// covertity[overflow_const]
 | ||||||
| 	dist_slot = rc_bittree(&s->rc, probs, DIST_SLOTS) - DIST_SLOTS; | 	dist_slot = rc_bittree(&s->rc, probs, DIST_SLOTS) - DIST_SLOTS; | ||||||
| 
 | 
 | ||||||
| 	if (dist_slot < DIST_MODEL_START) { | 	if (dist_slot < DIST_MODEL_START) { | ||||||
|  |  | ||||||
							
								
								
									
										18
									
								
								src/dev.c
									
										
									
									
									
								
							
							
						
						
									
										18
									
								
								src/dev.c
									
										
									
									
									
								
							|  | @ -137,7 +137,8 @@ BOOL CyclePort(int index) | ||||||
| 	DWORD size; | 	DWORD size; | ||||||
| 	USB_CYCLE_PORT_PARAMS cycle_port; | 	USB_CYCLE_PORT_PARAMS cycle_port; | ||||||
| 
 | 
 | ||||||
| 	assert(index < MAX_DRIVES); | 	if_not_assert(index < MAX_DRIVES) | ||||||
|  | 		return -1; | ||||||
| 	// Wait at least 10 secs between resets
 | 	// Wait at least 10 secs between resets
 | ||||||
| 	if (GetTickCount64() < LastReset + 10000ULL) { | 	if (GetTickCount64() < LastReset + 10000ULL) { | ||||||
| 		uprintf("You must wait at least 10 seconds before trying to reset a device"); | 		uprintf("You must wait at least 10 seconds before trying to reset a device"); | ||||||
|  | @ -190,7 +191,8 @@ int CycleDevice(int index) | ||||||
| 	SP_DEVINFO_DATA dev_info_data; | 	SP_DEVINFO_DATA dev_info_data; | ||||||
| 	SP_PROPCHANGE_PARAMS propchange_params; | 	SP_PROPCHANGE_PARAMS propchange_params; | ||||||
| 
 | 
 | ||||||
| 	assert(index < MAX_DRIVES); | 	if_not_assert(index < MAX_DRIVES) | ||||||
|  | 		return ERROR_INVALID_DRIVE; | ||||||
| 	if ((index < 0) || (safe_strlen(rufus_drive[index].id) < 8)) | 	if ((index < 0) || (safe_strlen(rufus_drive[index].id) < 8)) | ||||||
| 		return ERROR_INVALID_PARAMETER; | 		return ERROR_INVALID_PARAMETER; | ||||||
| 
 | 
 | ||||||
|  | @ -583,8 +585,10 @@ BOOL GetDevices(DWORD devnum) | ||||||
| 
 | 
 | ||||||
| 	// Better safe than sorry. And yeah, we could have used arrays of
 | 	// Better safe than sorry. And yeah, we could have used arrays of
 | ||||||
| 	// arrays to avoid this, but it's more readable this way.
 | 	// arrays to avoid this, but it's more readable this way.
 | ||||||
| 	assert((uasp_start > 0) && (uasp_start < ARRAYSIZE(usbstor_name))); | 	if_not_assert((uasp_start > 0) && (uasp_start < ARRAYSIZE(usbstor_name))) | ||||||
| 	assert((card_start > 0) && (card_start < ARRAYSIZE(genstor_name))); | 		goto out; | ||||||
|  | 	if_not_assert((card_start > 0) && (card_start < ARRAYSIZE(genstor_name))) | ||||||
|  | 		goto out; | ||||||
| 
 | 
 | ||||||
| 	devid_list = NULL; | 	devid_list = NULL; | ||||||
| 	if (full_list_size != 0) { | 	if (full_list_size != 0) { | ||||||
|  | @ -671,7 +675,8 @@ BOOL GetDevices(DWORD devnum) | ||||||
| 				} | 				} | ||||||
| 				// Also test for "_SD&" instead of "_SD_" and so on to allow for devices like
 | 				// Also test for "_SD&" instead of "_SD_" and so on to allow for devices like
 | ||||||
| 				// "SCSI\DiskRicoh_Storage_SD&REV_3.0" to be detected.
 | 				// "SCSI\DiskRicoh_Storage_SD&REV_3.0" to be detected.
 | ||||||
| 				assert(strlen(scsi_card_name_copy) > 1); | 				if_not_assert(strlen(scsi_card_name_copy) > 1) | ||||||
|  | 					continue; | ||||||
| 				scsi_card_name_copy[strlen(scsi_card_name_copy) - 1] = '&'; | 				scsi_card_name_copy[strlen(scsi_card_name_copy) - 1] = '&'; | ||||||
| 				if (safe_strstr(buffer, scsi_card_name_copy) != NULL) { | 				if (safe_strstr(buffer, scsi_card_name_copy) != NULL) { | ||||||
| 					props.is_CARD = TRUE; | 					props.is_CARD = TRUE; | ||||||
|  | @ -999,7 +1004,8 @@ BOOL GetDevices(DWORD devnum) | ||||||
| 				rufus_drive[num_drives].display_name = safe_strdup(display_name); | 				rufus_drive[num_drives].display_name = safe_strdup(display_name); | ||||||
| 				rufus_drive[num_drives].label = safe_strdup(label); | 				rufus_drive[num_drives].label = safe_strdup(label); | ||||||
| 				rufus_drive[num_drives].size = drive_size; | 				rufus_drive[num_drives].size = drive_size; | ||||||
| 				assert(rufus_drive[num_drives].size != 0); | 				if_not_assert(rufus_drive[num_drives].size != 0) | ||||||
|  | 					break; | ||||||
| 				if (hub_path != NULL) { | 				if (hub_path != NULL) { | ||||||
| 					rufus_drive[num_drives].hub = safe_strdup(hub_path); | 					rufus_drive[num_drives].hub = safe_strdup(hub_path); | ||||||
| 					rufus_drive[num_drives].port = props.port; | 					rufus_drive[num_drives].port = props.port; | ||||||
|  |  | ||||||
							
								
								
									
										12
									
								
								src/drive.c
									
										
									
									
									
								
							
							
						
						
									
										12
									
								
								src/drive.c
									
										
									
									
									
								
							|  | @ -280,9 +280,12 @@ char* GetLogicalName(DWORD DriveIndex, uint64_t PartitionOffset, BOOL bKeepTrail | ||||||
| 
 | 
 | ||||||
| 		// Sanity checks
 | 		// Sanity checks
 | ||||||
| 		len = safe_strlen(volume_name); | 		len = safe_strlen(volume_name); | ||||||
| 		assert(len > 4); | 		if_not_assert(len > 4) | ||||||
| 		assert(safe_strnicmp(volume_name, volume_start, 4) == 0); | 			continue; | ||||||
| 		assert(volume_name[len - 1] == '\\'); | 		if_not_assert(safe_strnicmp(volume_name, volume_start, 4) == 0) | ||||||
|  | 			continue; | ||||||
|  | 		if_not_assert(volume_name[len - 1] == '\\') | ||||||
|  | 			continue; | ||||||
| 
 | 
 | ||||||
| 		drive_type = GetDriveTypeA(volume_name); | 		drive_type = GetDriveTypeA(volume_name); | ||||||
| 		if ((drive_type != DRIVE_REMOVABLE) && (drive_type != DRIVE_FIXED)) | 		if ((drive_type != DRIVE_REMOVABLE) && (drive_type != DRIVE_FIXED)) | ||||||
|  | @ -1817,7 +1820,8 @@ const char* GetFsName(HANDLE hPhysical, LARGE_INTEGER StartingOffset) | ||||||
| 			} | 			} | ||||||
| 		} | 		} | ||||||
| 		assert(rev < ARRAYSIZE(ext_names)); | 		assert(rev < ARRAYSIZE(ext_names)); | ||||||
| 		ret = ext_names[rev]; | 		if (rev < ARRAYSIZE(ext_names)) | ||||||
|  | 			ret = ext_names[rev]; | ||||||
| 		goto out; | 		goto out; | ||||||
| 	} | 	} | ||||||
| 
 | 
 | ||||||
|  |  | ||||||
|  | @ -45,6 +45,7 @@ static void TEA_transform(__u32 buf[4], __u32 const in[]) | ||||||
| 	int	n = 16; | 	int	n = 16; | ||||||
| 
 | 
 | ||||||
| 	do { | 	do { | ||||||
|  | 		// coverity[overflow_const]
 | ||||||
| 		sum += DELTA; | 		sum += DELTA; | ||||||
| 		b0 += ((b1 << 4)+a) ^ (b1+sum) ^ ((b1 >> 5)+b); | 		b0 += ((b1 << 4)+a) ^ (b1+sum) ^ ((b1 >> 5)+b); | ||||||
| 		b1 += ((b0 << 4)+c) ^ (b0+sum) ^ ((b0 >> 5)+d); | 		b1 += ((b0 << 4)+c) ^ (b0+sum) ^ ((b0 >> 5)+d); | ||||||
|  |  | ||||||
|  | @ -11,6 +11,7 @@ | ||||||
|  */ |  */ | ||||||
| 
 | 
 | ||||||
| #include "config.h" | #include "config.h" | ||||||
|  | #include <assert.h> | ||||||
| #include <stdio.h> | #include <stdio.h> | ||||||
| #include <string.h> | #include <string.h> | ||||||
| #if HAVE_UNISTD_H | #if HAVE_UNISTD_H | ||||||
|  | @ -374,7 +375,9 @@ ipg_retry: | ||||||
| 	 * adjust inode count to reflect the adjusted inodes_per_group | 	 * adjust inode count to reflect the adjusted inodes_per_group | ||||||
| 	 */ | 	 */ | ||||||
| 	if ((__u64)super->s_inodes_per_group * fs->group_desc_count > ~0U) { | 	if ((__u64)super->s_inodes_per_group * fs->group_desc_count > ~0U) { | ||||||
| 		ipg--; | 		assert(ipg != 0); | ||||||
|  | 		if (ipg != 0) | ||||||
|  | 			ipg--; | ||||||
| 		goto ipg_retry; | 		goto ipg_retry; | ||||||
| 	} | 	} | ||||||
| 	super->s_inodes_count = super->s_inodes_per_group * | 	super->s_inodes_count = super->s_inodes_per_group * | ||||||
|  |  | ||||||
							
								
								
									
										50
									
								
								src/format.c
									
										
									
									
									
								
							
							
						
						
									
										50
									
								
								src/format.c
									
										
									
									
									
								
							|  | @ -117,8 +117,7 @@ static BOOLEAN __stdcall FormatExCallback(FILE_SYSTEM_CALLBACK_COMMAND Command, | ||||||
| 	if (IS_ERROR(ErrorStatus)) | 	if (IS_ERROR(ErrorStatus)) | ||||||
| 		return FALSE; | 		return FALSE; | ||||||
| 
 | 
 | ||||||
| 	assert((actual_fs_type >= 0) && (actual_fs_type < FS_MAX)); | 	if_not_assert((actual_fs_type >= 0) && (actual_fs_type < FS_MAX)) | ||||||
| 	if ((actual_fs_type < 0) || (actual_fs_type >= FS_MAX)) |  | ||||||
| 		return FALSE; | 		return FALSE; | ||||||
| 
 | 
 | ||||||
| 	switch(Command) { | 	switch(Command) { | ||||||
|  | @ -1108,6 +1107,10 @@ static int sector_write(int fd, const void* _buf, unsigned int count) | ||||||
| 
 | 
 | ||||||
| 	if (sec_size == 0) | 	if (sec_size == 0) | ||||||
| 		sec_size = 512; | 		sec_size = 512; | ||||||
|  | 	if_not_assert(sec_size <= 64 * KB) | ||||||
|  | 		return -1; | ||||||
|  | 	if_not_assert(count <= 1 * GB) | ||||||
|  | 		return -1; | ||||||
| 
 | 
 | ||||||
| 	// If we are on a sector boundary and count is multiple of the
 | 	// If we are on a sector boundary and count is multiple of the
 | ||||||
| 	// sector size, just issue a regular write
 | 	// sector size, just issue a regular write
 | ||||||
|  | @ -1116,6 +1119,8 @@ static int sector_write(int fd, const void* _buf, unsigned int count) | ||||||
| 
 | 
 | ||||||
| 	// If we have an existing partial sector, fill and write it
 | 	// If we have an existing partial sector, fill and write it
 | ||||||
| 	if (sec_buf_pos > 0) { | 	if (sec_buf_pos > 0) { | ||||||
|  | 		if_not_assert(sec_size >= sec_buf_pos) | ||||||
|  | 			return -1; | ||||||
| 		fill_size = min(sec_size - sec_buf_pos, count); | 		fill_size = min(sec_size - sec_buf_pos, count); | ||||||
| 		memcpy(&sec_buf[sec_buf_pos], buf, fill_size); | 		memcpy(&sec_buf[sec_buf_pos], buf, fill_size); | ||||||
| 		sec_buf_pos += fill_size; | 		sec_buf_pos += fill_size; | ||||||
|  | @ -1133,10 +1138,18 @@ static int sector_write(int fd, const void* _buf, unsigned int count) | ||||||
| 	written = _write(fd, &buf[fill_size], sec_num * sec_size); | 	written = _write(fd, &buf[fill_size], sec_num * sec_size); | ||||||
| 	if (written < 0) | 	if (written < 0) | ||||||
| 		return written; | 		return written; | ||||||
| 	else if (written != sec_num * sec_size) | 	if (written != sec_num * sec_size) { | ||||||
| 		return fill_size + written; | 		// Detect overflows
 | ||||||
|  | 		// coverity[overflow]
 | ||||||
|  | 		int v = fill_size + written; | ||||||
|  | 		if_not_assert(v >= fill_size) | ||||||
|  | 			return -1; | ||||||
|  | 		else | ||||||
|  | 			return v; | ||||||
|  | 	} | ||||||
| 	sec_buf_pos = count - fill_size - written; | 	sec_buf_pos = count - fill_size - written; | ||||||
| 	assert(sec_buf_pos < sec_size); | 	if_not_assert(sec_buf_pos < sec_size) | ||||||
|  | 		return -1; | ||||||
| 
 | 
 | ||||||
| 	// Keep leftover bytes, if any, in the sector buffer
 | 	// Keep leftover bytes, if any, in the sector buffer
 | ||||||
| 	if (sec_buf_pos != 0) | 	if (sec_buf_pos != 0) | ||||||
|  | @ -1180,7 +1193,8 @@ static BOOL WriteDrive(HANDLE hPhysicalDrive, BOOL bZeroDrive) | ||||||
| 			uprintf("Could not allocate disk zeroing buffer"); | 			uprintf("Could not allocate disk zeroing buffer"); | ||||||
| 			goto out; | 			goto out; | ||||||
| 		} | 		} | ||||||
| 		assert((uintptr_t)buffer % SelectedDrive.SectorSize == 0); | 		if_not_assert((uintptr_t)buffer % SelectedDrive.SectorSize == 0) | ||||||
|  | 			goto out; | ||||||
| 
 | 
 | ||||||
| 		// Clear buffer
 | 		// Clear buffer
 | ||||||
| 		memset(buffer, fast_zeroing ? 0xff : 0x00, buf_size); | 		memset(buffer, fast_zeroing ? 0xff : 0x00, buf_size); | ||||||
|  | @ -1192,7 +1206,8 @@ static BOOL WriteDrive(HANDLE hPhysicalDrive, BOOL bZeroDrive) | ||||||
| 				uprintf("Could not allocate disk comparison buffer"); | 				uprintf("Could not allocate disk comparison buffer"); | ||||||
| 				goto out; | 				goto out; | ||||||
| 			} | 			} | ||||||
| 			assert((uintptr_t)cmp_buffer % SelectedDrive.SectorSize == 0); | 			if_not_assert((uintptr_t)cmp_buffer % SelectedDrive.SectorSize == 0) | ||||||
|  | 				goto out; | ||||||
| 		} | 		} | ||||||
| 
 | 
 | ||||||
| 		read_size[0] = buf_size; | 		read_size[0] = buf_size; | ||||||
|  | @ -1290,7 +1305,8 @@ static BOOL WriteDrive(HANDLE hPhysicalDrive, BOOL bZeroDrive) | ||||||
| 			uprintf("Could not allocate disk write buffer"); | 			uprintf("Could not allocate disk write buffer"); | ||||||
| 			goto out; | 			goto out; | ||||||
| 		} | 		} | ||||||
| 		assert((uintptr_t)sec_buf % SelectedDrive.SectorSize == 0); | 		if_not_assert((uintptr_t)sec_buf% SelectedDrive.SectorSize == 0) | ||||||
|  | 			goto out; | ||||||
| 		sec_buf_pos = 0; | 		sec_buf_pos = 0; | ||||||
| 		bled_init(256 * KB, uprintf, NULL, sector_write, update_progress, NULL, &ErrorStatus); | 		bled_init(256 * KB, uprintf, NULL, sector_write, update_progress, NULL, &ErrorStatus); | ||||||
| 		bled_ret = bled_uncompress_with_handles(hSourceImage, hPhysicalDrive, img_report.compression_type); | 		bled_ret = bled_uncompress_with_handles(hSourceImage, hPhysicalDrive, img_report.compression_type); | ||||||
|  | @ -1312,7 +1328,8 @@ static BOOL WriteDrive(HANDLE hPhysicalDrive, BOOL bZeroDrive) | ||||||
| 			goto out; | 			goto out; | ||||||
| 		} | 		} | ||||||
| 	} else { | 	} else { | ||||||
| 		assert(img_report.compression_type != IMG_COMPRESSION_FFU); | 		if_not_assert(img_report.compression_type != IMG_COMPRESSION_FFU) | ||||||
|  | 			goto out; | ||||||
| 		// VHD/VHDX require mounting the image first
 | 		// VHD/VHDX require mounting the image first
 | ||||||
| 		if (img_report.compression_type == IMG_COMPRESSION_VHD || | 		if (img_report.compression_type == IMG_COMPRESSION_VHD || | ||||||
| 			img_report.compression_type == IMG_COMPRESSION_VHDX) { | 			img_report.compression_type == IMG_COMPRESSION_VHDX) { | ||||||
|  | @ -1338,7 +1355,8 @@ static BOOL WriteDrive(HANDLE hPhysicalDrive, BOOL bZeroDrive) | ||||||
| 			uprintf("Could not allocate disk write buffer"); | 			uprintf("Could not allocate disk write buffer"); | ||||||
| 			goto out; | 			goto out; | ||||||
| 		} | 		} | ||||||
| 		assert((uintptr_t)buffer % SelectedDrive.SectorSize == 0); | 		if_not_assert((uintptr_t)buffer% SelectedDrive.SectorSize == 0) | ||||||
|  | 			goto out; | ||||||
| 
 | 
 | ||||||
| 		// Start the initial read
 | 		// Start the initial read
 | ||||||
| 		ReadFileAsync(hSourceImage, &buffer[read_bufnum * buf_size], (DWORD)MIN(buf_size, target_size)); | 		ReadFileAsync(hSourceImage, &buffer[read_bufnum * buf_size], (DWORD)MIN(buf_size, target_size)); | ||||||
|  | @ -1365,7 +1383,8 @@ static BOOL WriteDrive(HANDLE hPhysicalDrive, BOOL bZeroDrive) | ||||||
| 
 | 
 | ||||||
| 			// 2. WriteFile fails unless the size is a multiple of sector size
 | 			// 2. WriteFile fails unless the size is a multiple of sector size
 | ||||||
| 			if (read_size[read_bufnum] % SelectedDrive.SectorSize != 0) { | 			if (read_size[read_bufnum] % SelectedDrive.SectorSize != 0) { | ||||||
| 				assert(HI_ALIGN_X_TO_Y(read_size[read_bufnum], SelectedDrive.SectorSize) <= buf_size); | 				if_not_assert(HI_ALIGN_X_TO_Y(read_size[read_bufnum], SelectedDrive.SectorSize) <= buf_size) | ||||||
|  | 					goto out; | ||||||
| 				read_size[read_bufnum] = HI_ALIGN_X_TO_Y(read_size[read_bufnum], SelectedDrive.SectorSize); | 				read_size[read_bufnum] = HI_ALIGN_X_TO_Y(read_size[read_bufnum], SelectedDrive.SectorSize); | ||||||
| 			} | 			} | ||||||
| 
 | 
 | ||||||
|  | @ -1660,7 +1679,8 @@ DWORD WINAPI FormatThread(void* param) | ||||||
| 		if (img_report.compression_type == IMG_COMPRESSION_FFU) { | 		if (img_report.compression_type == IMG_COMPRESSION_FFU) { | ||||||
| 			char cmd[MAX_PATH + 128], *physical = NULL; | 			char cmd[MAX_PATH + 128], *physical = NULL; | ||||||
| 			// Should have been filtered out beforehand
 | 			// Should have been filtered out beforehand
 | ||||||
| 			assert(has_ffu_support); | 			if_not_assert(has_ffu_support) | ||||||
|  | 				goto out; | ||||||
| 			safe_unlockclose(hPhysicalDrive); | 			safe_unlockclose(hPhysicalDrive); | ||||||
| 			physical = GetPhysicalName(SelectedDrive.DeviceNumber); | 			physical = GetPhysicalName(SelectedDrive.DeviceNumber); | ||||||
| 			static_sprintf(cmd, "dism /Apply-Ffu /ApplyDrive:%s /ImageFile:\"%s\"", physical, image_path); | 			static_sprintf(cmd, "dism /Apply-Ffu /ApplyDrive:%s /ImageFile:\"%s\"", physical, image_path); | ||||||
|  | @ -1848,8 +1868,7 @@ DWORD WINAPI FormatThread(void* param) | ||||||
| 			// All good
 | 			// All good
 | ||||||
| 		} else if (target_type == TT_UEFI) { | 		} else if (target_type == TT_UEFI) { | ||||||
| 			// For once, no need to do anything - just check our sanity
 | 			// For once, no need to do anything - just check our sanity
 | ||||||
| 			assert((boot_type == BT_IMAGE) && IS_EFI_BOOTABLE(img_report) && (fs_type <= FS_NTFS)); | 			if_not_assert((boot_type == BT_IMAGE) && IS_EFI_BOOTABLE(img_report) && (fs_type <= FS_NTFS)) { | ||||||
| 			if ( (boot_type != BT_IMAGE) || !IS_EFI_BOOTABLE(img_report) || (fs_type > FS_NTFS) ) { |  | ||||||
| 				ErrorStatus = RUFUS_ERROR(ERROR_INSTALL_FAILURE); | 				ErrorStatus = RUFUS_ERROR(ERROR_INSTALL_FAILURE); | ||||||
| 				goto out; | 				goto out; | ||||||
| 			} | 			} | ||||||
|  | @ -1924,7 +1943,8 @@ DWORD WINAPI FormatThread(void* param) | ||||||
| 						ErrorStatus = RUFUS_ERROR(APPERR(ERROR_CANT_PATCH)); | 						ErrorStatus = RUFUS_ERROR(APPERR(ERROR_CANT_PATCH)); | ||||||
| 				} | 				} | ||||||
| 			} else { | 			} else { | ||||||
| 				assert(!img_report.is_windows_img); | 				if_not_assert(!img_report.is_windows_img) | ||||||
|  | 					goto out; | ||||||
| 				if (!ExtractISO(image_path, drive_name, FALSE)) { | 				if (!ExtractISO(image_path, drive_name, FALSE)) { | ||||||
| 					if (!IS_ERROR(ErrorStatus)) | 					if (!IS_ERROR(ErrorStatus)) | ||||||
| 						ErrorStatus = RUFUS_ERROR(APPERR(ERROR_ISO_EXTRACT)); | 						ErrorStatus = RUFUS_ERROR(APPERR(ERROR_ISO_EXTRACT)); | ||||||
|  |  | ||||||
|  | @ -1571,8 +1571,8 @@ uint32_t ReadISOFileToBuffer(const char* iso, const char* iso_file, uint8_t** bu | ||||||
| 		goto out; | 		goto out; | ||||||
| 	} | 	} | ||||||
| 	file_length = udf_get_file_length(p_udf_file); | 	file_length = udf_get_file_length(p_udf_file); | ||||||
| 	if (file_length > UINT32_MAX) { | 	if (file_length > 1 * GB) { | ||||||
| 		uprintf("Only files smaller than 4 GB are supported"); | 		uprintf("Only files smaller than 1 GB are supported"); | ||||||
| 		goto out; | 		goto out; | ||||||
| 	} | 	} | ||||||
| 	nblocks = (uint32_t)((file_length + UDF_BLOCKSIZE - 1) / UDF_BLOCKSIZE); | 	nblocks = (uint32_t)((file_length + UDF_BLOCKSIZE - 1) / UDF_BLOCKSIZE); | ||||||
|  | @ -1604,10 +1604,11 @@ try_iso: | ||||||
| 		goto out; | 		goto out; | ||||||
| 	} | 	} | ||||||
| 	file_length = p_statbuf->total_size; | 	file_length = p_statbuf->total_size; | ||||||
| 	if (file_length > UINT32_MAX) { | 	if (file_length > 1 * GB) { | ||||||
| 		uprintf("Only files smaller than 4 GB are supported"); | 		uprintf("Only files smaller than 1 GB are supported"); | ||||||
| 		goto out; | 		goto out; | ||||||
| 	} | 	} | ||||||
|  | 	// coverity[cast_overflow]
 | ||||||
| 	nblocks = (uint32_t)((file_length + ISO_BLOCKSIZE - 1) / ISO_BLOCKSIZE); | 	nblocks = (uint32_t)((file_length + ISO_BLOCKSIZE - 1) / ISO_BLOCKSIZE); | ||||||
| 	*buf = malloc(nblocks * ISO_BLOCKSIZE + 1); | 	*buf = malloc(nblocks * ISO_BLOCKSIZE + 1); | ||||||
| 	if (*buf == NULL) { | 	if (*buf == NULL) { | ||||||
|  |  | ||||||
|  | @ -407,7 +407,8 @@ static PWSTR GetProcessCommandLine(HANDLE hProcess) | ||||||
| 
 | 
 | ||||||
| 		ucmdline = (UNICODE_STRING*)(pp + cmd_offset); | 		ucmdline = (UNICODE_STRING*)(pp + cmd_offset); | ||||||
| 		// In the absolute, someone could craft a process with dodgy attributes to try to cause an overflow
 | 		// In the absolute, someone could craft a process with dodgy attributes to try to cause an overflow
 | ||||||
| 		ucmdline->Length = min(ucmdline->Length, 512); | 		// coverity[cast_overflow]
 | ||||||
|  | 		ucmdline->Length = min(ucmdline->Length, (USHORT)512); | ||||||
| 		wcmdline = (PWSTR)calloc(ucmdline->Length + 1, sizeof(WCHAR)); | 		wcmdline = (PWSTR)calloc(ucmdline->Length + 1, sizeof(WCHAR)); | ||||||
| 		if (!ReadProcessMemory(hProcess, ucmdline->Buffer, wcmdline, ucmdline->Length, NULL)) { | 		if (!ReadProcessMemory(hProcess, ucmdline->Buffer, wcmdline, ucmdline->Length, NULL)) { | ||||||
| 			safe_free(wcmdline); | 			safe_free(wcmdline); | ||||||
|  | @ -493,8 +494,7 @@ static DWORD WINAPI SearchProcessThread(LPVOID param) | ||||||
| 		// Work on our own copy of the handle names so we don't have to hold the
 | 		// Work on our own copy of the handle names so we don't have to hold the
 | ||||||
| 		// mutex for string comparison. Update only if the version has changed.
 | 		// mutex for string comparison. Update only if the version has changed.
 | ||||||
| 		if (blocking_process.nVersion[0] != blocking_process.nVersion[1]) { | 		if (blocking_process.nVersion[0] != blocking_process.nVersion[1]) { | ||||||
| 			assert(blocking_process.wHandleName != NULL && blocking_process.nHandles != 0); | 			if_not_assert(blocking_process.wHandleName != NULL && blocking_process.nHandles != 0) { | ||||||
| 			if (blocking_process.wHandleName == NULL || blocking_process.nHandles == 0) { |  | ||||||
| 				ReleaseMutex(hLock); | 				ReleaseMutex(hLock); | ||||||
| 				goto out; | 				goto out; | ||||||
| 			} | 			} | ||||||
|  | @ -930,8 +930,7 @@ BYTE GetProcessSearch(uint32_t timeout, uint8_t access_mask, BOOL bIgnoreStalePr | ||||||
| 		return 0; | 		return 0; | ||||||
| 	} | 	} | ||||||
| 
 | 
 | ||||||
| 	assert(blocking_process.hLock != NULL); | 	if_not_assert(blocking_process.hLock != NULL) | ||||||
| 	if (blocking_process.hLock == NULL) |  | ||||||
| 		return 0; | 		return 0; | ||||||
| 
 | 
 | ||||||
| retry: | retry: | ||||||
|  |  | ||||||
|  | @ -37,11 +37,9 @@ static __inline BOOL DeleteRegistryKey(HKEY key_root, const char* key_name) | ||||||
| 	HKEY hSoftware = NULL; | 	HKEY hSoftware = NULL; | ||||||
| 	LONG s; | 	LONG s; | ||||||
| 
 | 
 | ||||||
| 	assert(key_root == REGKEY_HKCU); | 	if_not_assert(key_root == REGKEY_HKCU) | ||||||
| 	if (key_root != REGKEY_HKCU) |  | ||||||
| 		return FALSE; | 		return FALSE; | ||||||
| 	assert(key_name != NULL); | 	if_not_assert(key_name != NULL) | ||||||
| 	if (key_name == NULL) |  | ||||||
| 		return FALSE; | 		return FALSE; | ||||||
| 
 | 
 | ||||||
| 	if (RegOpenKeyExA(key_root, "SOFTWARE", 0, KEY_READ|KEY_CREATE_SUB_KEY, &hSoftware) != ERROR_SUCCESS) | 	if (RegOpenKeyExA(key_root, "SOFTWARE", 0, KEY_READ|KEY_CREATE_SUB_KEY, &hSoftware) != ERROR_SUCCESS) | ||||||
|  | @ -135,15 +133,12 @@ static __inline BOOL _SetRegistryKey(HKEY key_root, const char* key_name, DWORD | ||||||
| 	HKEY hRoot = NULL, hApp = NULL; | 	HKEY hRoot = NULL, hApp = NULL; | ||||||
| 	DWORD dwDisp, dwType = reg_type; | 	DWORD dwDisp, dwType = reg_type; | ||||||
| 
 | 
 | ||||||
| 	assert(key_name != NULL); | 	if_not_assert(key_name != NULL) | ||||||
| 	if (key_name == NULL) |  | ||||||
| 		return FALSE; | 		return FALSE; | ||||||
| 	assert(key_root == REGKEY_HKCU); | 	if_not_assert(key_root == REGKEY_HKCU) | ||||||
| 	if (key_root != REGKEY_HKCU) |  | ||||||
| 		return FALSE; | 		return FALSE; | ||||||
| 	// Validate that we are always dealing with a short key
 | 	// Validate that we are always dealing with a short key
 | ||||||
| 	assert(strchr(key_name, '\\') == NULL); | 	if_not_assert(strchr(key_name, '\\') == NULL) | ||||||
| 	if (strchr(key_name, '\\') != NULL) |  | ||||||
| 		return FALSE; | 		return FALSE; | ||||||
| 
 | 
 | ||||||
| 	if (RegOpenKeyExA(key_root, NULL, 0, KEY_READ|KEY_CREATE_SUB_KEY, &hRoot) != ERROR_SUCCESS) { | 	if (RegOpenKeyExA(key_root, NULL, 0, KEY_READ|KEY_CREATE_SUB_KEY, &hRoot) != ERROR_SUCCESS) { | ||||||
|  |  | ||||||
|  | @ -1131,7 +1131,8 @@ static void DisplayISOProps(void) | ||||||
| // Insert the image name into the Boot selection dropdown and (re)populate the Image option dropdown
 | // Insert the image name into the Boot selection dropdown and (re)populate the Image option dropdown
 | ||||||
| static void UpdateImage(BOOL update_image_option_only) | static void UpdateImage(BOOL update_image_option_only) | ||||||
| { | { | ||||||
| 	assert(image_index != 0); | 	if_not_assert(image_index != 0) | ||||||
|  | 		return; | ||||||
| 
 | 
 | ||||||
| 	if (!update_image_option_only) { | 	if (!update_image_option_only) { | ||||||
| 		if (ComboBox_GetItemData(hBootType, image_index) == BT_IMAGE) | 		if (ComboBox_GetItemData(hBootType, image_index) == BT_IMAGE) | ||||||
|  | @ -1429,8 +1430,7 @@ static DWORD WINAPI BootCheckThread(LPVOID param) | ||||||
| 	} | 	} | ||||||
| 
 | 
 | ||||||
| 	if (boot_type == BT_IMAGE) { | 	if (boot_type == BT_IMAGE) { | ||||||
| 		assert(image_path != NULL); | 		if_not_assert(image_path != NULL) | ||||||
| 		if (image_path == NULL) |  | ||||||
| 			goto out; | 			goto out; | ||||||
| 		if ((size_check) && (img_report.projected_size > (uint64_t)SelectedDrive.DiskSize)) { | 		if ((size_check) && (img_report.projected_size > (uint64_t)SelectedDrive.DiskSize)) { | ||||||
| 			// This ISO image is too big for the selected target
 | 			// This ISO image is too big for the selected target
 | ||||||
|  |  | ||||||
|  | @ -15,6 +15,7 @@ | ||||||
|  * You should have received a copy of the GNU General Public License |  * You should have received a copy of the GNU General Public License | ||||||
|  * along with this program.  If not, see <http://www.gnu.org/licenses/>.
 |  * along with this program.  If not, see <http://www.gnu.org/licenses/>.
 | ||||||
|  */ |  */ | ||||||
|  | #include <assert.h> | ||||||
| #include <windows.h> | #include <windows.h> | ||||||
| #include <malloc.h> | #include <malloc.h> | ||||||
| #include <inttypes.h> | #include <inttypes.h> | ||||||
|  | @ -36,6 +37,7 @@ | ||||||
| #define MB                          1048576LL | #define MB                          1048576LL | ||||||
| #define GB                          1073741824LL | #define GB                          1073741824LL | ||||||
| #define TB                          1099511627776LL | #define TB                          1099511627776LL | ||||||
|  | #define PB                          1125899906842624LL | ||||||
| 
 | 
 | ||||||
| /*
 | /*
 | ||||||
|  * Features not ready for prime time and that may *DESTROY* your data - USE AT YOUR OWN RISKS! |  * Features not ready for prime time and that may *DESTROY* your data - USE AT YOUR OWN RISKS! | ||||||
|  | @ -186,6 +188,7 @@ static __inline void static_repchr(char* p, char s, char r) { | ||||||
| } | } | ||||||
| #define to_unix_path(str) static_repchr(str, '\\', '/') | #define to_unix_path(str) static_repchr(str, '\\', '/') | ||||||
| #define to_windows_path(str) static_repchr(str, '/', '\\') | #define to_windows_path(str) static_repchr(str, '/', '\\') | ||||||
|  | #define if_not_assert(cond) assert(cond); if (!(cond)) | ||||||
| 
 | 
 | ||||||
| extern void uprintf(const char *format, ...); | extern void uprintf(const char *format, ...); | ||||||
| extern void uprintfs(const char *str); | extern void uprintfs(const char *str); | ||||||
|  |  | ||||||
							
								
								
									
										10
									
								
								src/rufus.rc
									
										
									
									
									
								
							
							
						
						
									
										10
									
								
								src/rufus.rc
									
										
									
									
									
								
							|  | @ -33,7 +33,7 @@ LANGUAGE LANG_NEUTRAL, SUBLANG_NEUTRAL | ||||||
| IDD_DIALOG DIALOGEX 12, 12, 232, 326 | IDD_DIALOG DIALOGEX 12, 12, 232, 326 | ||||||
| STYLE DS_SETFONT | DS_MODALFRAME | DS_CENTER | WS_MINIMIZEBOX | WS_POPUP | WS_CAPTION | WS_SYSMENU | STYLE DS_SETFONT | DS_MODALFRAME | DS_CENTER | WS_MINIMIZEBOX | WS_POPUP | WS_CAPTION | WS_SYSMENU | ||||||
| EXSTYLE WS_EX_ACCEPTFILES | EXSTYLE WS_EX_ACCEPTFILES | ||||||
| CAPTION "Rufus 4.6.2189" | CAPTION "Rufus 4.6.2190" | ||||||
| FONT 9, "Segoe UI Symbol", 400, 0, 0x0 | FONT 9, "Segoe UI Symbol", 400, 0, 0x0 | ||||||
| BEGIN | BEGIN | ||||||
|     LTEXT           "Drive Properties",IDS_DRIVE_PROPERTIES_TXT,8,6,53,12,NOT WS_GROUP |     LTEXT           "Drive Properties",IDS_DRIVE_PROPERTIES_TXT,8,6,53,12,NOT WS_GROUP | ||||||
|  | @ -397,8 +397,8 @@ END | ||||||
| // | // | ||||||
| 
 | 
 | ||||||
| VS_VERSION_INFO VERSIONINFO | VS_VERSION_INFO VERSIONINFO | ||||||
|  FILEVERSION 4,6,2189,0 |  FILEVERSION 4,6,2190,0 | ||||||
|  PRODUCTVERSION 4,6,2189,0 |  PRODUCTVERSION 4,6,2190,0 | ||||||
|  FILEFLAGSMASK 0x3fL |  FILEFLAGSMASK 0x3fL | ||||||
| #ifdef _DEBUG | #ifdef _DEBUG | ||||||
|  FILEFLAGS 0x1L |  FILEFLAGS 0x1L | ||||||
|  | @ -416,13 +416,13 @@ BEGIN | ||||||
|             VALUE "Comments", "https://rufus.ie" |             VALUE "Comments", "https://rufus.ie" | ||||||
|             VALUE "CompanyName", "Akeo Consulting" |             VALUE "CompanyName", "Akeo Consulting" | ||||||
|             VALUE "FileDescription", "Rufus" |             VALUE "FileDescription", "Rufus" | ||||||
|             VALUE "FileVersion", "4.6.2189" |             VALUE "FileVersion", "4.6.2190" | ||||||
|             VALUE "InternalName", "Rufus" |             VALUE "InternalName", "Rufus" | ||||||
|             VALUE "LegalCopyright", "<22> 2011-2024 Pete Batard (GPL v3)" |             VALUE "LegalCopyright", "<22> 2011-2024 Pete Batard (GPL v3)" | ||||||
|             VALUE "LegalTrademarks", "https://www.gnu.org/licenses/gpl-3.0.html" |             VALUE "LegalTrademarks", "https://www.gnu.org/licenses/gpl-3.0.html" | ||||||
|             VALUE "OriginalFilename", "rufus-4.6.exe" |             VALUE "OriginalFilename", "rufus-4.6.exe" | ||||||
|             VALUE "ProductName", "Rufus" |             VALUE "ProductName", "Rufus" | ||||||
|             VALUE "ProductVersion", "4.6.2189" |             VALUE "ProductVersion", "4.6.2190" | ||||||
|         END |         END | ||||||
|     END |     END | ||||||
|     BLOCK "VarFileInfo" |     BLOCK "VarFileInfo" | ||||||
|  |  | ||||||
							
								
								
									
										12
									
								
								src/stdfn.c
									
										
									
									
									
								
							
							
						
						
									
										12
									
								
								src/stdfn.c
									
										
									
									
									
								
							|  | @ -80,8 +80,7 @@ BOOL htab_create(uint32_t nel, htab_table* htab) | ||||||
| 	if (htab == NULL) { | 	if (htab == NULL) { | ||||||
| 		return FALSE; | 		return FALSE; | ||||||
| 	} | 	} | ||||||
| 	assert(htab->table == NULL); | 	if_not_assert(htab->table == NULL) { | ||||||
| 	if (htab->table != NULL) { |  | ||||||
| 		uprintf("Warning: htab_create() was called with a non empty table"); | 		uprintf("Warning: htab_create() was called with a non empty table"); | ||||||
| 		return FALSE; | 		return FALSE; | ||||||
| 	} | 	} | ||||||
|  | @ -197,8 +196,7 @@ uint32_t htab_hash(char* str, htab_table* htab) | ||||||
| 	// Not found => New entry
 | 	// Not found => New entry
 | ||||||
| 
 | 
 | ||||||
| 	// If the table is full return an error
 | 	// If the table is full return an error
 | ||||||
| 	assert(htab->filled < htab->size); | 	if_not_assert(htab->filled < htab->size) { | ||||||
| 	if (htab->filled >= htab->size) { |  | ||||||
| 		uprintf("Hash table is full (%d entries)", htab->size); | 		uprintf("Hash table is full (%d entries)", htab->size); | ||||||
| 		return 0; | 		return 0; | ||||||
| 	} | 	} | ||||||
|  | @ -1199,7 +1197,8 @@ BOOL MountRegistryHive(const HKEY key, const char* pszHiveName, const char* pszH | ||||||
| 	LSTATUS status; | 	LSTATUS status; | ||||||
| 	HANDLE token = INVALID_HANDLE_VALUE; | 	HANDLE token = INVALID_HANDLE_VALUE; | ||||||
| 
 | 
 | ||||||
| 	assert((key == HKEY_LOCAL_MACHINE) || (key == HKEY_USERS)); | 	if_not_assert((key == HKEY_LOCAL_MACHINE) || (key == HKEY_USERS)) | ||||||
|  | 		return FALSE; | ||||||
| 
 | 
 | ||||||
| 	if (!OpenProcessToken(GetCurrentProcess(), TOKEN_ADJUST_PRIVILEGES, &token)) { | 	if (!OpenProcessToken(GetCurrentProcess(), TOKEN_ADJUST_PRIVILEGES, &token)) { | ||||||
| 		uprintf("Could not get current process token: %s", WindowsErrorString()); | 		uprintf("Could not get current process token: %s", WindowsErrorString()); | ||||||
|  | @ -1230,7 +1229,8 @@ BOOL UnmountRegistryHive(const HKEY key, const char* pszHiveName) | ||||||
| { | { | ||||||
| 	LSTATUS status; | 	LSTATUS status; | ||||||
| 
 | 
 | ||||||
| 	assert((key == HKEY_LOCAL_MACHINE) || (key == HKEY_USERS)); | 	if_not_assert((key == HKEY_LOCAL_MACHINE) || (key == HKEY_USERS)) | ||||||
|  | 		return FALSE; | ||||||
| 
 | 
 | ||||||
| 	status = RegUnLoadKeyA(key, pszHiveName); | 	status = RegUnLoadKeyA(key, pszHiveName); | ||||||
| 	if (status != ERROR_SUCCESS) { | 	if (status != ERROR_SUCCESS) { | ||||||
|  |  | ||||||
|  | @ -857,7 +857,8 @@ uint32_t ResolveDllAddress(dll_resolver_t* resolver) | ||||||
| 
 | 
 | ||||||
| 	// NB: SymLoadModuleEx() does not load a PDB unless the file has an explicit '.pdb' extension
 | 	// NB: SymLoadModuleEx() does not load a PDB unless the file has an explicit '.pdb' extension
 | ||||||
| 	base_address = pfSymLoadModuleEx(hRufus, NULL, path, NULL, DEFAULT_BASE_ADDRESS, 0, NULL, 0); | 	base_address = pfSymLoadModuleEx(hRufus, NULL, path, NULL, DEFAULT_BASE_ADDRESS, 0, NULL, 0); | ||||||
| 	assert(base_address == DEFAULT_BASE_ADDRESS); | 	if_not_assert(base_address == DEFAULT_BASE_ADDRESS) | ||||||
|  | 		goto out; | ||||||
| 	// On Windows 11 ARM64 the following call will return *TWO* different addresses for the same
 | 	// On Windows 11 ARM64 the following call will return *TWO* different addresses for the same
 | ||||||
| 	// call, because most Windows DLL's are ARM64X, which means that they are an unholy union of
 | 	// call, because most Windows DLL's are ARM64X, which means that they are an unholy union of
 | ||||||
| 	// both X64 and ARM64 code in the same binary...
 | 	// both X64 and ARM64 code in the same binary...
 | ||||||
|  |  | ||||||
|  | @ -588,7 +588,8 @@ INT_PTR CALLBACK NotificationCallback(HWND hDlg, UINT message, WPARAM wParam, LP | ||||||
| 			return (INT_PTR)TRUE; | 			return (INT_PTR)TRUE; | ||||||
| 		case IDC_MORE_INFO: | 		case IDC_MORE_INFO: | ||||||
| 			if (notification_more_info != NULL) { | 			if (notification_more_info != NULL) { | ||||||
| 				assert(notification_more_info->callback != NULL); | 				if_not_assert(notification_more_info->callback != NULL) | ||||||
|  | 					return (INT_PTR)FALSE; | ||||||
| 				if (notification_more_info->id == MORE_INFO_URL) { | 				if (notification_more_info->id == MORE_INFO_URL) { | ||||||
| 					ShellExecuteA(hDlg, "open", notification_more_info->url, NULL, NULL, SW_SHOWNORMAL); | 					ShellExecuteA(hDlg, "open", notification_more_info->url, NULL, NULL, SW_SHOWNORMAL); | ||||||
| 				} else { | 				} else { | ||||||
|  |  | ||||||
							
								
								
									
										3
									
								
								src/ui.c
									
										
									
									
									
								
							
							
						
						
									
										3
									
								
								src/ui.c
									
										
									
									
									
								
							|  | @ -575,7 +575,8 @@ void SetSectionHeaders(HWND hDlg) | ||||||
| 		memset(wtmp, 0, sizeof(wtmp)); | 		memset(wtmp, 0, sizeof(wtmp)); | ||||||
| 		GetWindowTextW(hCtrl, wtmp, ARRAYSIZE(wtmp) - 4); | 		GetWindowTextW(hCtrl, wtmp, ARRAYSIZE(wtmp) - 4); | ||||||
| 		wlen = wcslen(wtmp); | 		wlen = wcslen(wtmp); | ||||||
| 		assert(wlen < ARRAYSIZE(wtmp) - 2); | 		if_not_assert(wlen < ARRAYSIZE(wtmp) - 2) | ||||||
|  | 			break; | ||||||
| 		wtmp[wlen++] = L' '; | 		wtmp[wlen++] = L' '; | ||||||
| 		wtmp[wlen++] = L' '; | 		wtmp[wlen++] = L' '; | ||||||
| 		SetWindowTextW(hCtrl, wtmp); | 		SetWindowTextW(hCtrl, wtmp); | ||||||
|  |  | ||||||
|  | @ -1006,8 +1006,9 @@ static DWORD WINAPI VhdSaveImageThread(void* param) | ||||||
| 	OVERLAPPED overlapped = { 0 }; | 	OVERLAPPED overlapped = { 0 }; | ||||||
| 	DWORD r = ERROR_NOT_FOUND, flags; | 	DWORD r = ERROR_NOT_FOUND, flags; | ||||||
| 
 | 
 | ||||||
| 	assert(img_save->Type == VIRTUAL_STORAGE_TYPE_DEVICE_VHD || | 	if_not_assert(img_save->Type == VIRTUAL_STORAGE_TYPE_DEVICE_VHD || | ||||||
| 		img_save->Type == VIRTUAL_STORAGE_TYPE_DEVICE_VHDX); | 		img_save->Type == VIRTUAL_STORAGE_TYPE_DEVICE_VHDX) | ||||||
|  | 		return ERROR_INVALID_PARAMETER; | ||||||
| 
 | 
 | ||||||
| 	UpdateProgressWithInfoInit(NULL, FALSE); | 	UpdateProgressWithInfoInit(NULL, FALSE); | ||||||
| 
 | 
 | ||||||
|  |  | ||||||
|  | @ -905,7 +905,8 @@ BOOL ApplyWindowsCustomization(char drive_letter, int flags) | ||||||
| 			// If we have a windowsPE section, copy the answer files to the root of boot.wim as
 | 			// If we have a windowsPE section, copy the answer files to the root of boot.wim as
 | ||||||
| 			// Autounattend.xml. This also results in that file being automatically copied over
 | 			// Autounattend.xml. This also results in that file being automatically copied over
 | ||||||
| 			// to %WINDIR%\Panther\unattend.xml for later passes processing.
 | 			// to %WINDIR%\Panther\unattend.xml for later passes processing.
 | ||||||
| 			assert(mount_path != NULL); | 			if_not_assert(mount_path != NULL) | ||||||
|  | 				goto out; | ||||||
| 			static_sprintf(path, "%s\\Autounattend.xml", mount_path); | 			static_sprintf(path, "%s\\Autounattend.xml", mount_path); | ||||||
| 			if (!CopyFileU(unattend_xml_path, path, TRUE)) { | 			if (!CopyFileU(unattend_xml_path, path, TRUE)) { | ||||||
| 				uprintf("Could not create boot.wim 'Autounattend.xml': %s", WindowsErrorString()); | 				uprintf("Could not create boot.wim 'Autounattend.xml': %s", WindowsErrorString()); | ||||||
|  |  | ||||||
		Loading…
	
	Add table
		Add a link
		
	
		Reference in a new issue