You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
5714 lines
166 KiB
5714 lines
166 KiB
#include "precomp.h"
|
|
#pragma hdrstop
|
|
#if defined(_X86_) //NEC98 I970721
|
|
#include <stdlib.h>
|
|
#include <stdio.h>
|
|
#include <winbase.h>
|
|
#include <n98boot.h>
|
|
#endif // PC98
|
|
|
|
#include <pencrypt.h>
|
|
#include <winsta.h>
|
|
#include <ntverp.h>
|
|
#include <undo.h>
|
|
#include "errorrep.h"
|
|
#include "faulth.h"
|
|
|
|
void PrepareBillBoard(HWND hwnd);
|
|
void TerminateBillBoard();
|
|
void CreateMainWindow();
|
|
UINT GetMediaProductBuildNumber (VOID);
|
|
void CopyExtraBVTDirs();
|
|
|
|
HWND BackgroundWnd2 = NULL;
|
|
|
|
//
|
|
// Misc globals.
|
|
//
|
|
HINSTANCE hInst;
|
|
DWORD TlsIndex;
|
|
|
|
//
|
|
// Upgrade information block
|
|
//
|
|
|
|
WINNT32_PLUGIN_INIT_INFORMATION_BLOCK info;
|
|
|
|
|
|
|
|
#if defined(_AMD64_) || defined(_X86_)
|
|
WINNT32_WIN9XUPG_INIT_INFORMATION_BLOCK Win9xInfo;
|
|
#if defined(_X86_)
|
|
PWINNT32_PLUGIN_SETAUTOBOOT_ROUTINE W95SetAutoBootFlag;
|
|
#endif
|
|
#endif
|
|
|
|
//
|
|
// This is the title of the application. It changes dynamically depending on
|
|
// whether we're on server or workstation, etc.
|
|
//
|
|
UINT AppTitleStringId = IDS_APPTITLE;
|
|
|
|
//
|
|
// Flag indicating whether we are initiating an MSI-install.
|
|
//
|
|
BOOL RunFromMSI = FALSE;
|
|
|
|
//
|
|
// Flag indicating whether we are initiating an Typical install
|
|
// Initialize to Typical install.
|
|
DWORD dwSetupFlags = UPG_FLAG_TYPICAL;
|
|
//
|
|
// Flag indicating whether we are initiating an upgrade.
|
|
//
|
|
BOOL Upgrade = TRUE;
|
|
|
|
//
|
|
// Flag to say if we need to write the AcpiHAL value to the winnt.sif file
|
|
//
|
|
BOOL WriteAcpiHalValue = FALSE;
|
|
|
|
//
|
|
// What should we write as the value for the AcpiHalValue
|
|
//
|
|
BOOL AcpiHalValue = FALSE;
|
|
|
|
//
|
|
// Flag indicating whether we're installing/upgrading to NT Server
|
|
//
|
|
BOOL Server;
|
|
|
|
//
|
|
// Flag to indicate if we are running BVT's
|
|
//
|
|
BOOL RunningBVTs = FALSE;
|
|
|
|
//
|
|
// When running BVT's, what baudrate should we set the debugger to?
|
|
//
|
|
LONG lDebugBaudRate = 115200;
|
|
|
|
//
|
|
// When running BVT's, what comport should we set the debugger to?
|
|
//
|
|
LONG lDebugComPort = 0;
|
|
|
|
//
|
|
// When running BVT's, should we copy the symbols locally?
|
|
//
|
|
BOOL CopySymbols = TRUE;
|
|
|
|
//
|
|
// Flag to indicate if we are running ASR tests
|
|
//
|
|
DWORD AsrQuickTest = 0;
|
|
|
|
//
|
|
// Flags for product type and flavor for upgrade modules
|
|
//
|
|
|
|
PRODUCTTYPE UpgradeProductType = UNKNOWN;
|
|
UINT ProductFlavor = UNKNOWN_PRODUCTTYPE;
|
|
|
|
//
|
|
// Global flag indicating whether the entire overall program operation
|
|
// was successful. Also a flag indicating whether to shut down automatically
|
|
// when the wizard is done in the non-unattended case.
|
|
//
|
|
BOOL GlobalResult = FALSE;
|
|
BOOL AutomaticallyShutDown = TRUE;
|
|
|
|
//
|
|
// Global OS version info.
|
|
//
|
|
OSVERSIONINFO OsVersion;
|
|
DWORD OsVersionNumber = 0;
|
|
|
|
|
|
//
|
|
// Flags indicating how we were run and whether to create
|
|
// a local source.
|
|
//
|
|
BOOL RunFromCD;
|
|
BOOL MakeLocalSource;
|
|
BOOL UserSpecifiedMakeLocalSource = FALSE;
|
|
BOOL NoLs = FALSE;
|
|
TCHAR UserSpecifiedLocalSourceDrive;
|
|
//
|
|
// the default for MLS is CD1 only
|
|
//
|
|
DWORD MLSDiskID = 1;
|
|
|
|
//
|
|
// advanced install options
|
|
//
|
|
BOOL ChoosePartition = TRUE;
|
|
BOOL UseSignatures = TRUE;
|
|
TCHAR InstallDir[MAX_PATH];
|
|
|
|
//
|
|
// SMS support
|
|
//
|
|
typedef DWORD (*SMSPROC) (char *, char*, char*, char*, char *, char *, char *, BOOL);
|
|
PSTR LastMessage = NULL;
|
|
|
|
#if defined(REMOTE_BOOT)
|
|
//
|
|
// Flag indicating whether we're running on a remote boot client.
|
|
//
|
|
BOOL RemoteBoot;
|
|
|
|
//
|
|
// Path to the machine directory for a remote boot client.
|
|
//
|
|
TCHAR MachineDirectory[MAX_PATH];
|
|
#endif // defined(REMOTE_BOOT)
|
|
|
|
//
|
|
// Flags indicating which Accessibility utilities to use
|
|
//
|
|
BOOL AccessibleMagnifier;
|
|
BOOL AccessibleKeyboard;
|
|
BOOL AccessibleVoice;
|
|
BOOL AccessibleReader;
|
|
|
|
//
|
|
// Build number we're upgrading from
|
|
//
|
|
DWORD BuildNumber = 0;
|
|
|
|
//
|
|
// Are any of the Accesssibility utilities enabled?
|
|
//
|
|
BOOL AccessibleSetup;
|
|
|
|
//
|
|
// Name of unattended script file to be used for Accessible Setup
|
|
//
|
|
TCHAR AccessibleScriptFile[MAX_PATH] = TEXT("setupacc.txt");
|
|
|
|
//
|
|
// Flags and values relating to unattended operation.
|
|
//
|
|
BOOL UnattendedOperation;
|
|
BOOL UnattendSwitchSpecified = FALSE;
|
|
PTSTR UnattendedScriptFile;
|
|
UINT UnattendedShutdownTimeout;
|
|
BOOL BatchMode;
|
|
|
|
//
|
|
// Source paths and count of paths.
|
|
//
|
|
TCHAR SourcePaths[MAX_SOURCE_COUNT][MAX_PATH];
|
|
UINT SourceCount;
|
|
|
|
//
|
|
// source paths to current architecture's files
|
|
//
|
|
TCHAR NativeSourcePaths[MAX_SOURCE_COUNT][MAX_PATH];
|
|
|
|
TCHAR *UserSpecifiedOEMShare = NULL;
|
|
|
|
//
|
|
// Local source information.
|
|
//
|
|
TCHAR LocalSourceDrive;
|
|
DWORD LocalSourceDriveOffset;
|
|
TCHAR LocalSourceDirectory[MAX_PATH];
|
|
TCHAR LocalSourceWithPlatform[MAX_PATH];
|
|
TCHAR LocalBootDirectory[MAX_PATH];
|
|
#if defined(_AMD64_) || defined(_X86_)
|
|
TCHAR LocalBackupDirectory[MAX_PATH];
|
|
TCHAR FirstFloppyDriveLetter;
|
|
#endif
|
|
|
|
|
|
|
|
LONGLONG LocalSourceSpaceRequired;
|
|
LONGLONG WinDirSpaceFor9x = 0l;
|
|
BOOL BlockOnNotEnoughSpace = TRUE;
|
|
UINT UpgRequiredMb;
|
|
UINT UpgAvailableMb;
|
|
BOOL UpginfsUpdated = FALSE;
|
|
|
|
//
|
|
// Optional directory stuff.
|
|
//
|
|
UINT OptionalDirectoryCount;
|
|
TCHAR OptionalDirectories[MAX_OPTIONALDIRS][MAX_PATH];
|
|
UINT OptionalDirectoryFlags[MAX_OPTIONALDIRS];
|
|
|
|
//
|
|
// Name of INF. Constructed so we don't have to realloc anything.
|
|
// Note the default.
|
|
// Also, handles to dosnet.inf and txtsetup.sif.
|
|
//
|
|
TCHAR InfName[] = TEXT("DOSNET.INF");
|
|
PVOID MainInf;
|
|
TCHAR FullInfName[MAX_PATH];
|
|
PVOID TxtsetupSif;
|
|
PVOID NtcompatInf;
|
|
|
|
//
|
|
// Array of drive letters for all system partitions.
|
|
// Note that on amd64/x86 there will always be exactly one.
|
|
// The list is 0-terminated.
|
|
//
|
|
TCHAR SystemPartitionDriveLetters[27];
|
|
TCHAR SystemPartitionDriveLetter;
|
|
|
|
#ifdef UNICODE
|
|
UINT SystemPartitionCount;
|
|
PWSTR* SystemPartitionNtNames;
|
|
PWSTR SystemPartitionNtName;
|
|
#else
|
|
//
|
|
// if running on Win9x, there may be a LocalSourcePath passed as parameter
|
|
//
|
|
PCSTR g_LocalSourcePath;
|
|
#endif
|
|
|
|
//
|
|
// UDF stuff
|
|
//
|
|
LPCTSTR UniquenessId;
|
|
LPCTSTR UniquenessDatabaseFile;
|
|
|
|
//
|
|
// Variables relating to the multi string of options that are passed
|
|
// to plugin DLLs (Like Win9xUpg)
|
|
//
|
|
LPTSTR UpgradeOptions;
|
|
DWORD UpgradeOptionsLength;
|
|
DWORD UpgradeOptionsSize;
|
|
|
|
|
|
//
|
|
// Compliance related variables
|
|
//
|
|
BOOL NoCompliance = FALSE;
|
|
|
|
//
|
|
// Variables to hold messages concerning reason that the upgrade cannot be completed.
|
|
//
|
|
#define MSG_UPGRADE_OK 0
|
|
#define MSG_LAST_REASON 0
|
|
#define FAILREASON(x) MSG_##x,
|
|
DWORD UpgradeFailureMessages[] = {
|
|
UPGRADEFAILURES /*,*/ MSG_UPGRADE_INIT_ERROR
|
|
};
|
|
#undef FAILREASON
|
|
|
|
UINT UpgradeFailureReason = 0;
|
|
|
|
|
|
TCHAR UpgradeSourcePath[MAX_PATH];
|
|
|
|
|
|
|
|
//
|
|
// Internal override to version checking. Useful for making quick
|
|
// privates for foreign language versions.
|
|
//
|
|
BOOL SkipLocaleCheck = FALSE;
|
|
|
|
//
|
|
// override for the win9x virus scanner check.
|
|
//
|
|
BOOL SkipVirusScannerCheck = FALSE;
|
|
|
|
BOOL UseBIOSToBoot = FALSE;
|
|
|
|
//
|
|
// Preinstall stuff
|
|
//
|
|
BOOL OemPreinstall;
|
|
#if defined(_AMD64_) || defined(_X86_)
|
|
POEM_BOOT_FILE OemBootFiles;
|
|
#endif
|
|
|
|
//
|
|
// Miscellaneous other command line parameters.
|
|
//
|
|
LPCTSTR CmdToExecuteAtEndOfGui;
|
|
BOOL AutoSkipMissingFiles;
|
|
BOOL HideWinDir;
|
|
TCHAR ProductId[64] = TEXT("\0");
|
|
UINT PIDDays = 0;
|
|
LPTSTR g_EncryptedPID = NULL;
|
|
BOOL g_bDeferPIDValidation = FALSE;
|
|
|
|
//
|
|
// Flag indicating that the user cancelled.
|
|
// Handle for mutex used to guarantee that only one error dialog
|
|
// is on the screen at once.
|
|
//
|
|
BOOL Cancelled;
|
|
HANDLE UiMutex;
|
|
|
|
//
|
|
// Flag indicating user is aborting. This flag suppresses the final screen in
|
|
// cancel mode. I.E. The unsuccssessful completion page.
|
|
// win9xupg ReportOnly mode.
|
|
//
|
|
BOOL Aborted;
|
|
|
|
//
|
|
// Floppy-related stuff.
|
|
// Defined, but not used for ARC based machines.
|
|
//
|
|
BOOL MakeBootMedia = TRUE;
|
|
BOOL Floppyless = TRUE;
|
|
|
|
//
|
|
// Upgrade extension DLL.
|
|
//
|
|
UPGRADE_SUPPORT UpgradeSupport;
|
|
|
|
//
|
|
// Only check to see if we can upgrade or not.
|
|
//
|
|
BOOL CheckUpgradeOnly;
|
|
BOOL CheckUpgradeOnlyQ;
|
|
//
|
|
// Specifies that winnt32 runs as an "Upgrade Advisor"
|
|
// and not all installation files are available
|
|
//
|
|
BOOL UpgradeAdvisorMode;
|
|
|
|
//
|
|
// Build the command console.
|
|
//
|
|
BOOL BuildCmdcons;
|
|
|
|
//
|
|
// Are we doing the PID encyption?
|
|
//
|
|
BOOL PIDEncryption = FALSE;
|
|
BOOL g_Quiet = FALSE;
|
|
#define WINNT_U_ENCRYPT TEXT("ENCRYPT")
|
|
|
|
#ifdef RUN_SYSPARSE
|
|
// Remove this before RTM.
|
|
// Be default run sysparse
|
|
BOOL NoSysparse = FALSE;
|
|
PROCESS_INFORMATION piSysparse = { NULL, NULL, 0, 0};
|
|
LRESULT SysParseDlgProc( IN HWND hdlg, IN UINT msg, IN WPARAM wParam, IN LPARAM lParam);
|
|
HWND GetBBhwnd();
|
|
#endif
|
|
|
|
// Name of module for Program compatibility.
|
|
static const TCHAR ShimEngine_ModuleName[] = TEXT("Shimeng.dll");
|
|
|
|
//
|
|
// Log Functions
|
|
//
|
|
|
|
SETUPOPENLOG fnSetupOpenLog = NULL;
|
|
SETUPLOGERROR fnSetupLogError = NULL;
|
|
SETUPCLOSELOG fnSetupCloseLog = NULL;
|
|
|
|
//
|
|
// Unsupported driver list
|
|
// This list contains the information about the unsupported drivers that needs
|
|
// to be migrated on a clean install or upgrade.
|
|
//
|
|
// PUNSUPORTED_DRIVER_INFO UnsupportedDriverList = NULL;
|
|
|
|
//
|
|
// When Winnt32.exe is launched over a network, these two parameters have valid
|
|
// values and need to be taken into consideration before displaying any dialog box
|
|
//
|
|
|
|
HWND Winnt32Dlg = NULL;
|
|
HANDLE WinNT32StubEvent = NULL;
|
|
HINSTANCE hinstBB = NULL;
|
|
|
|
//
|
|
// List of required privileges (on NT) to run this app
|
|
//
|
|
|
|
#ifdef UNICODE
|
|
|
|
PCTSTR g_RequiredPrivileges[] = {
|
|
SE_SHUTDOWN_NAME,
|
|
SE_BACKUP_NAME,
|
|
SE_RESTORE_NAME,
|
|
SE_SYSTEM_ENVIRONMENT_NAME
|
|
};
|
|
|
|
#define COUNT_OF_PRIVILEGES (ARRAYSIZE(g_RequiredPrivileges))
|
|
|
|
#endif
|
|
|
|
|
|
//
|
|
// Definition for dynamically-loaded InitiateSystemShutdownEx API
|
|
//
|
|
|
|
typedef
|
|
(WINAPI *PFNINITIATESYSTEMSHUTDOWNEX)(LPTSTR,
|
|
LPTSTR,
|
|
DWORD,
|
|
BOOL,
|
|
BOOL,
|
|
DWORD);
|
|
|
|
|
|
//
|
|
// Routines from Setupapi.dll
|
|
//
|
|
|
|
//
|
|
// ISSUE: be careful when using this routine on NT4, as it may fail;
|
|
// setupapi on NT4 doesn't understand LZX compression, currently used to compress files
|
|
//
|
|
DWORD
|
|
(*SetupapiDecompressOrCopyFile)(
|
|
IN PCTSTR SourceFileName,
|
|
OUT PCTSTR TargetFileName,
|
|
OUT PUINT CompressionType OPTIONAL
|
|
);
|
|
|
|
HINF
|
|
(*SetupapiOpenInfFile)(
|
|
IN LPCTSTR FileName,
|
|
IN LPCTSTR InfClass, OPTIONAL
|
|
IN DWORD InfStyle,
|
|
OUT PUINT ErrorLine OPTIONAL
|
|
);
|
|
|
|
VOID
|
|
(*SetupapiCloseInfFile)(
|
|
IN HINF InfHandle
|
|
);
|
|
|
|
BOOL
|
|
(*SetupapiFindFirstLine)(
|
|
IN HINF InfHandle,
|
|
IN PCTSTR Section,
|
|
IN PCTSTR Key, OPTIONAL
|
|
OUT PINFCONTEXT Context
|
|
);
|
|
|
|
BOOL
|
|
(*SetupapiFindNextLine)(
|
|
IN PINFCONTEXT Context1,
|
|
OUT PINFCONTEXT Context2
|
|
);
|
|
|
|
BOOL
|
|
(*SetupapiFindNextMatchLine)(
|
|
IN PINFCONTEXT Context1,
|
|
IN PCTSTR Key,
|
|
OUT PINFCONTEXT Context2
|
|
);
|
|
|
|
LONG
|
|
(*SetupapiGetLineCount)(
|
|
IN HINF InfHandle,
|
|
IN LPCTSTR Section
|
|
);
|
|
|
|
DWORD
|
|
(*SetupapiGetFieldCount)(
|
|
IN PINFCONTEXT Context
|
|
);
|
|
|
|
BOOL
|
|
(*SetupapiGetStringField)(
|
|
IN PINFCONTEXT Context,
|
|
DWORD FieldIndex,
|
|
PTSTR ReturnBuffer,
|
|
DWORD ReturnBufferSize,
|
|
PDWORD RequiredSize
|
|
);
|
|
|
|
BOOL
|
|
(*SetupapiGetLineByIndex)(
|
|
IN HINF InfHandle,
|
|
IN LPCTSTR Section,
|
|
IN DWORD Index,
|
|
OUT PINFCONTEXT Context
|
|
);
|
|
|
|
HSPFILEQ
|
|
(*SetupapiOpenFileQueue) (
|
|
VOID
|
|
);
|
|
|
|
BOOL
|
|
(*SetupapiCloseFileQueue) (
|
|
IN HSPFILEQ QueueHandle
|
|
);
|
|
|
|
BOOL
|
|
(*SetupapiQueueCopy) (
|
|
IN HSPFILEQ QueueHandle,
|
|
IN PCTSTR SourceRootPath, OPTIONAL
|
|
IN PCTSTR SourcePath, OPTIONAL
|
|
IN PCTSTR SourceFilename,
|
|
IN PCTSTR SourceDescription, OPTIONAL
|
|
IN PCTSTR SourceTagfile, OPTIONAL
|
|
IN PCTSTR TargetDirectory,
|
|
IN PCTSTR TargetFilename, OPTIONAL
|
|
IN DWORD CopyStyle
|
|
);
|
|
|
|
BOOL
|
|
(*SetupapiCommitFileQueue) (
|
|
IN HWND Owner, OPTIONAL
|
|
IN HSPFILEQ QueueHandle,
|
|
IN PSP_FILE_CALLBACK_W MsgHandler,
|
|
IN PVOID Context
|
|
);
|
|
|
|
UINT
|
|
(*SetupapiDefaultQueueCallback) (
|
|
IN PVOID Context,
|
|
IN UINT Notification,
|
|
IN UINT_PTR Param1,
|
|
IN UINT_PTR Param2
|
|
);
|
|
|
|
PVOID
|
|
(*SetupapiInitDefaultQueueCallback) (
|
|
HWND OwnerWindow
|
|
);
|
|
|
|
VOID
|
|
(*SetupapiTermDefaultQueueCallback) (
|
|
PVOID Context
|
|
);
|
|
|
|
#ifdef UNICODE
|
|
|
|
BOOL
|
|
(*SetupapiGetSourceFileLocation) (
|
|
HINF InfHandle, // handle of an INF file
|
|
PINFCONTEXT InfContext, // optional, context of an INF file
|
|
PCTSTR FileName, // optional, source file to locate
|
|
PUINT SourceId, // receives the source media ID
|
|
PTSTR ReturnBuffer, // optional, receives the location
|
|
DWORD ReturnBufferSize, // size of the supplied buffer
|
|
PDWORD RequiredSize // optional, buffer size needed
|
|
);
|
|
|
|
BOOL
|
|
(*SetupapiGetInfInformation) (
|
|
LPCVOID InfSpec, // handle or filename of the INF file
|
|
DWORD SearchControl, // how to search for the INF file
|
|
PSP_INF_INFORMATION ReturnBuffer, // optional, receives the INF info
|
|
DWORD ReturnBufferSize, // size of the supplied buffer
|
|
PDWORD RequiredSize // optional, buffer size needed
|
|
);
|
|
|
|
BOOL
|
|
(*SetupapiQueryInfFileInformation) (
|
|
PSP_INF_INFORMATION InfInformation, // structure that contains the INF info
|
|
UINT InfIndex, // index of the file to investigate
|
|
PTSTR ReturnBuffer, // optional, receives the information
|
|
DWORD ReturnBufferSize, // size of the supplied buffer
|
|
PDWORD RequiredSize // optional, buffer size needed
|
|
);
|
|
|
|
BOOL
|
|
(*SetupapiQueryInfOriginalFileInformation) (
|
|
PSP_INF_INFORMATION InfInformation, // structure that contains the INF information
|
|
UINT InfIndex, // index of the file to investigate
|
|
PSP_ALTPLATFORM_INFO AlternatePlatformInfo, // optional, receives the alternate platform information
|
|
PSP_ORIGINAL_FILE_INFO OriginalFileInfo // original file information
|
|
);
|
|
|
|
#endif
|
|
|
|
//
|
|
//srclient.dll (SystemRestore) functions
|
|
//
|
|
DWORD
|
|
(*SRClientDisableSR) (
|
|
LPCWSTR pszDrive
|
|
);
|
|
|
|
|
|
|
|
//
|
|
// NEC98 Specific local function
|
|
//
|
|
|
|
VOID
|
|
DeleteNEC98DriveAssignFlag(
|
|
VOID
|
|
);
|
|
|
|
BOOLEAN
|
|
AdjustPrivilege(
|
|
PCTSTR Privilege
|
|
);
|
|
|
|
VOID
|
|
LocateFirstFloppyDrive(
|
|
VOID
|
|
);
|
|
|
|
VOID
|
|
W95SetABFwFresh(
|
|
int bBootDrvLtr
|
|
);
|
|
|
|
BOOL
|
|
NEC98CheckDMI(
|
|
VOID
|
|
);
|
|
|
|
VOID
|
|
DisableSystemRestore( void );
|
|
|
|
//
|
|
//
|
|
//
|
|
|
|
BOOL
|
|
GetArgsFromUnattendFile(
|
|
VOID
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
This routine read relevent arguments from any specified unattended file.
|
|
Specifically we are concerned here with oem preinstall stuff and whether
|
|
to upgrade.
|
|
|
|
Arguments:
|
|
|
|
None.
|
|
|
|
Return Value:
|
|
|
|
Boolean value indicating whether the unattend file the user specified is
|
|
valid. If not, the user will have been told about why.
|
|
|
|
If the user specified no unattend file on the command line, then the
|
|
return value is TRUE.
|
|
|
|
--*/
|
|
|
|
{
|
|
DWORD d;
|
|
TCHAR Buffer[2*MAX_PATH];
|
|
BOOL b = TRUE;
|
|
PVOID InfHandle;
|
|
LPCTSTR p;
|
|
BOOL userDDU = FALSE;
|
|
#if defined(_AMD64_) || defined(_X86_)
|
|
POEM_BOOT_FILE FileStruct,Previous;
|
|
#endif
|
|
|
|
if(UnattendedScriptFile) {
|
|
|
|
d = GetFileAttributes(UnattendedScriptFile);
|
|
if(d == (DWORD)(-1)) {
|
|
|
|
MessageBoxFromMessage(
|
|
NULL,
|
|
MSG_UNATTEND_FILE_INVALID,
|
|
FALSE,
|
|
AppTitleStringId,
|
|
MB_OK | MB_ICONERROR | MB_TASKMODAL,
|
|
UnattendedScriptFile
|
|
);
|
|
|
|
return(FALSE);
|
|
}
|
|
|
|
//
|
|
// Before we do much else, we should make sure the user has given
|
|
// us a valid answer file. We can't check everything, but a quick
|
|
// and dirty sanity check would be to go ahead and call LoadInfFile
|
|
// and see what he says about it.
|
|
//
|
|
|
|
switch(LoadInfFile(UnattendedScriptFile,FALSE,&InfHandle)) {
|
|
case NO_ERROR:
|
|
break;
|
|
case ERROR_NOT_ENOUGH_MEMORY:
|
|
|
|
MessageBoxFromMessage(
|
|
NULL,
|
|
MSG_OUT_OF_MEMORY,
|
|
FALSE,
|
|
AppTitleStringId,
|
|
MB_OK | MB_ICONERROR | MB_TASKMODAL
|
|
);
|
|
|
|
return(FALSE);
|
|
break;
|
|
|
|
default:
|
|
|
|
MessageBoxFromMessage(
|
|
NULL,
|
|
MSG_UNATTEND_FILE_INVALID,
|
|
FALSE,
|
|
AppTitleStringId,
|
|
MB_OK | MB_ICONERROR | MB_TASKMODAL,
|
|
UnattendedScriptFile
|
|
);
|
|
|
|
return(FALSE);
|
|
break;
|
|
}
|
|
|
|
//
|
|
// Check upgrade.
|
|
//
|
|
// In previous versions of NT the default was not to upgrade if
|
|
// the value wasn't present at all. In addition there was an upgrade
|
|
// type of "single" which meant to upgrade only if there was only one
|
|
// NT build on the machine.
|
|
//
|
|
// We preserve the original default behavior but don't bother with
|
|
// dealing with the "single" semantics -- just accept "single" as
|
|
// a synonym for "yes".
|
|
//
|
|
|
|
GetPrivateProfileString(
|
|
WINNT_UNATTENDED,
|
|
ISNT() ? WINNT_U_NTUPGRADE : WINNT_U_WIN95UPGRADE,
|
|
WINNT_A_NO,
|
|
Buffer,
|
|
ARRAYSIZE(Buffer),
|
|
UnattendedScriptFile
|
|
);
|
|
|
|
Upgrade = ((lstrcmpi(Buffer,WINNT_A_YES) == 0) || (lstrcmpi(Buffer,TEXT("single")) == 0));
|
|
|
|
#if defined(REMOTE_BOOT)
|
|
//
|
|
// Remote boot machines MUST upgrade.
|
|
//
|
|
|
|
if (RemoteBoot) {
|
|
Upgrade = TRUE;
|
|
}
|
|
#endif // defined(REMOTE_BOOT)
|
|
|
|
GetPrivateProfileString(
|
|
WINNT_UNATTENDED,
|
|
WINNT_OEMPREINSTALL,
|
|
WINNT_A_NO,
|
|
Buffer,
|
|
ARRAYSIZE(Buffer),
|
|
UnattendedScriptFile
|
|
);
|
|
|
|
if(!lstrcmpi(Buffer,WINNT_A_YES)) {
|
|
//
|
|
// NTBUG9: 770278
|
|
// block setup if they specify both Upgrade and OemPreinstall
|
|
//
|
|
if (Upgrade) {
|
|
MessageBoxFromMessage(
|
|
NULL,
|
|
MSG_UNATTEND_FILE_INVALID,
|
|
FALSE,
|
|
AppTitleStringId,
|
|
MB_OK | MB_ICONERROR | MB_TASKMODAL,
|
|
UnattendedScriptFile
|
|
);
|
|
return FALSE;
|
|
}
|
|
|
|
OemPreinstall = TRUE;
|
|
|
|
//
|
|
// Add oem system directory to the list of optional directories.
|
|
//
|
|
// The user may have specified a different location for the $OEM$
|
|
// directory, so we need to look in the unattend file for that.
|
|
//
|
|
GetPrivateProfileString(
|
|
WINNT_UNATTENDED,
|
|
WINNT_OEM_DIRLOCATION,
|
|
WINNT_A_NO,
|
|
Buffer,
|
|
ARRAYSIZE(Buffer),
|
|
UnattendedScriptFile
|
|
);
|
|
if( lstrcmpi( Buffer, WINNT_A_NO ) ) {
|
|
//
|
|
// make sure the location ends with "\$oem$". If it
|
|
// doesn't, then append it ourselves.
|
|
//
|
|
_tcsupr( Buffer );
|
|
if( !_tcsstr(Buffer, TEXT("$OEM$")) ) {
|
|
if (!ConcatenatePaths( Buffer, TEXT("$OEM$"), ARRAYSIZE(Buffer) )) {
|
|
DebugLog (
|
|
Winnt32LogError,
|
|
TEXT("The unattend file %1 specifies a path too long for key %2"),
|
|
0,
|
|
UnattendedScriptFile,
|
|
WINNT_OEM_DIRLOCATION
|
|
);
|
|
return FALSE;
|
|
}
|
|
}
|
|
UserSpecifiedOEMShare = DupString( Buffer );
|
|
|
|
RememberOptionalDir( UserSpecifiedOEMShare, OPTDIR_OEMSYS );
|
|
} else {
|
|
RememberOptionalDir(WINNT_OEM_DIR,OPTDIR_OEMSYS | OPTDIR_ADDSRCARCH);
|
|
}
|
|
|
|
if (!IsArc()) {
|
|
#if defined(_AMD64_) || defined(_X86_)
|
|
//
|
|
// Remember all oem boot files and then unload the inf.
|
|
//
|
|
Previous = NULL;
|
|
for(d=0; b && (p=InfGetFieldByIndex(InfHandle,WINNT_OEMBOOTFILES,d,0)); d++) {
|
|
if(FileStruct = MALLOC(sizeof(OEM_BOOT_FILE))) {
|
|
FileStruct->Next = NULL;
|
|
if(FileStruct->Filename = DupString(p)) {
|
|
if(Previous) {
|
|
Previous->Next = FileStruct;
|
|
} else {
|
|
OemBootFiles = FileStruct;
|
|
}
|
|
Previous = FileStruct;
|
|
} else {
|
|
b = FALSE;
|
|
}
|
|
} else {
|
|
b = FALSE;
|
|
}
|
|
}
|
|
|
|
if(!b) {
|
|
MessageBoxFromMessage(
|
|
NULL,
|
|
MSG_OUT_OF_MEMORY,
|
|
FALSE,
|
|
AppTitleStringId,
|
|
MB_OK | MB_ICONERROR | MB_TASKMODAL
|
|
);
|
|
}
|
|
#endif // defined(_AMD64_) || defined(_X86_)
|
|
} // if (!IsArc())
|
|
|
|
}
|
|
|
|
GetPrivateProfileString(
|
|
WINNT_USERDATA,
|
|
WINNT_US_PRODUCTID,
|
|
WINNT_A_NO,
|
|
Buffer,
|
|
ARRAYSIZE(Buffer),
|
|
UnattendedScriptFile
|
|
);
|
|
|
|
if( lstrcmpi( Buffer, WINNT_A_NO ) == 0 )
|
|
{
|
|
GetPrivateProfileString(
|
|
WINNT_USERDATA,
|
|
WINNT_US_PRODUCTKEY,
|
|
WINNT_A_NO,
|
|
Buffer,
|
|
ARRAYSIZE(Buffer),
|
|
UnattendedScriptFile
|
|
);
|
|
}
|
|
|
|
// Buffer contains the Product ID or WINNT_A_NO if none in the unattend file
|
|
// Is the PID encrypted?
|
|
// We would only need to check for the exact length, but since we can defer
|
|
// the decryption of an encrypted PID until GUI mode, 2 time the length should be saver
|
|
if (lstrlen(Buffer) > (4 + MAX_PID30_EDIT*5)*2)
|
|
{
|
|
LPTSTR szDecryptedPID = NULL;
|
|
HRESULT hr = ValidateEncryptedPID(Buffer, &szDecryptedPID);
|
|
DebugLog (Winnt32LogInformation, TEXT("ValidateEncryptedPID returned: <hr=0x%1!lx!>"), 0, hr);
|
|
if (FAILED(hr) || (hr == S_OK))
|
|
{
|
|
// if FAILED(hr) assume Crypto is not installed correct.
|
|
// If we encrypted the data, but the encrypted data did not contain valid data
|
|
// the function does not return a FAILED(hr) and does not return S_OK;
|
|
// It returns 0x01 to 0x04, depending on what failure.
|
|
// In the case we get a failure from Crypto ( it returns FAILED(hr))
|
|
// we want to defer the checking of the PID until GUI mode
|
|
// for that we need to save the encrypted PID
|
|
|
|
// First assume we defer PID validation.
|
|
g_bDeferPIDValidation = TRUE;
|
|
g_EncryptedPID = GlobalAlloc(GPTR, (lstrlen(Buffer) + 1) *sizeof(TCHAR));
|
|
if (g_EncryptedPID)
|
|
{
|
|
// Save the decrypted PID we need to write it to winnt.sif
|
|
lstrcpy(g_EncryptedPID, Buffer);
|
|
}
|
|
// Only if the PID could be decrypted and falls in to the time interval
|
|
// do we save the decrypted PID.
|
|
if (hr == S_OK)
|
|
{
|
|
lstrcpyn(ProductId, szDecryptedPID, ARRAYSIZE(ProductId));
|
|
g_bDeferPIDValidation = FALSE;
|
|
}
|
|
}
|
|
// else we could encrypt the data, but something is wrong
|
|
//
|
|
if (szDecryptedPID)
|
|
{
|
|
GlobalFree(szDecryptedPID);
|
|
}
|
|
}
|
|
else if (lstrcmpi(Buffer, WINNT_A_NO))
|
|
{
|
|
lstrcpyn(ProductId, Buffer, ARRAYSIZE(ProductId));
|
|
}
|
|
else
|
|
{
|
|
*ProductId = TEXT('\0');
|
|
}
|
|
|
|
GetPrivateProfileString(
|
|
WINNT_UNATTENDED,
|
|
TEXT("FileSystem"),
|
|
TEXT(""),
|
|
Buffer,
|
|
ARRAYSIZE(Buffer),
|
|
UnattendedScriptFile
|
|
);
|
|
|
|
ForceNTFSConversion = !lstrcmpi(Buffer, TEXT("ConvertNTFS"));
|
|
|
|
if (!g_DynUpdtStatus->Disabled && !g_DynUpdtStatus->DynamicUpdatesSource[0]) {
|
|
//
|
|
// will Setup do the Dynamic Updates step at all?
|
|
//
|
|
if (GetPrivateProfileString(
|
|
WINNT_UNATTENDED,
|
|
WINNT_U_DYNAMICUPDATESDISABLE,
|
|
TEXT(""),
|
|
Buffer,
|
|
ARRAYSIZE(Buffer),
|
|
UnattendedScriptFile
|
|
)
|
|
#ifdef PRERELEASE
|
|
|| GetPrivateProfileString(
|
|
WINNT_UNATTENDED,
|
|
TEXT("disabledynamicupdates"),
|
|
TEXT(""),
|
|
Buffer,
|
|
ARRAYSIZE(Buffer),
|
|
UnattendedScriptFile
|
|
)
|
|
#endif
|
|
) {
|
|
userDDU = TRUE;
|
|
if( !lstrcmpi( Buffer, WINNT_A_YES ) ) {
|
|
g_DynUpdtStatus->Disabled = TRUE;
|
|
g_DynUpdtStatus->UserSpecifiedUpdates = FALSE;
|
|
}
|
|
}
|
|
}
|
|
if (!g_DynUpdtStatus->Disabled && !g_DynUpdtStatus->DynamicUpdatesSource[0]) {
|
|
//
|
|
// get location of previously downloaded files (if any)
|
|
//
|
|
if (GetPrivateProfileString(
|
|
WINNT_UNATTENDED,
|
|
WINNT_U_DYNAMICUPDATESHARE,
|
|
TEXT(""),
|
|
Buffer,
|
|
ARRAYSIZE(Buffer),
|
|
UnattendedScriptFile
|
|
)) {
|
|
|
|
if (MyGetFullPathName (
|
|
Buffer,
|
|
ARRAYSIZE(g_DynUpdtStatus->DynamicUpdatesSource),
|
|
g_DynUpdtStatus->DynamicUpdatesSource,
|
|
NULL) &&
|
|
DoesDirectoryExist (g_DynUpdtStatus->DynamicUpdatesSource)) {
|
|
|
|
RemoveTrailingWack (g_DynUpdtStatus->DynamicUpdatesSource);
|
|
g_DynUpdtStatus->UserSpecifiedUpdates = TRUE;
|
|
|
|
} else {
|
|
b = FALSE;
|
|
}
|
|
} else {
|
|
if (!userDDU) {
|
|
g_DynUpdtStatus->Disabled = TRUE;
|
|
}
|
|
}
|
|
}
|
|
|
|
UnloadInfFile(InfHandle);
|
|
}
|
|
|
|
return(b);
|
|
}
|
|
|
|
|
|
BOOL
|
|
ParseArguments(
|
|
VOID
|
|
)
|
|
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
Parse arguments passed to the program. Perform syntactic validation
|
|
and fill in defaults where necessary.
|
|
|
|
Valid arguments:
|
|
|
|
/batch suppress message boxes
|
|
|
|
/cmd:command_line command to execute at end of gui setup
|
|
|
|
/copydir:dirname tree copy directory from source into %systemroot%
|
|
Note that this supports ".." syntax to backtrack
|
|
one directory
|
|
|
|
/copysource:dirname copy directory for use as source
|
|
|
|
/debug[level][:filename] maintain debug log at level, defaults to warning level 2
|
|
and file c:\winnt32.log
|
|
|
|
/DynamicUpdatesDisable disable dynamic setup
|
|
|
|
/s:source specify source
|
|
|
|
/syspart:letter force a drive to be considered the system partition
|
|
|
|
/tempdrive:letter manually specify drive for local source
|
|
|
|
/udf:id[,file] uniqueness id and optional udf
|
|
|
|
/unattend[num][:file] unattended mode with optional countdown
|
|
and unattend file. (The countdown is ignored
|
|
on Win95.) 'Unattended' is also accepted.
|
|
|
|
/nodownload not documented; on Win9x installs over the net,
|
|
do NOT download program files to a temporary directory and restart
|
|
from there. Effective in winnt32.exe only; here it's ignored
|
|
|
|
/local not documented; used by winnt32.exe only; ignored in winnt32a|u.dll
|
|
|
|
/# introduces undoc'ed/internal switches. Handed off
|
|
to internal switch handler in internal.c.
|
|
|
|
/restart specified when winnt32.exe was restarted as a result
|
|
of updating one of the underlying modules; internal only
|
|
|
|
/nosysparse suppress running sysparse.
|
|
|
|
/E:"PID:days" To encrypt the PID and add a delta of days,
|
|
needs to have /Unattend:file specified.
|
|
|
|
Arguments:
|
|
|
|
None. Arguments are retreived via GetCommandLine().
|
|
|
|
Return Value:
|
|
|
|
None.
|
|
|
|
--*/
|
|
|
|
{
|
|
LPTSTR Arg;
|
|
LPTSTR BadParam = NULL;
|
|
LPTSTR Colon;
|
|
LPTSTR p;
|
|
BOOL Valid;
|
|
LPCTSTR DebugFileLog;
|
|
LONG DebugLevel;
|
|
BOOL b;
|
|
unsigned u;
|
|
int argc;
|
|
LPTSTR *argv;
|
|
DWORD d;
|
|
WIN32_FIND_DATA fd;
|
|
DWORD attr;
|
|
TCHAR buffer[MAX_PATH];
|
|
|
|
argv = CommandLineToArgv(&argc);
|
|
|
|
//
|
|
// Skip program name. We should always get back argc as at least 1,
|
|
// but be robust anyway.
|
|
//
|
|
if(argc) {
|
|
argc--;
|
|
argv++;
|
|
}
|
|
|
|
DebugFileLog = NULL;
|
|
DebugLevel = 0;
|
|
Valid = TRUE;
|
|
|
|
while(argc--) {
|
|
|
|
Arg = *argv++;
|
|
|
|
if((*Arg == TEXT('/')) || (*Arg == TEXT('-'))) {
|
|
|
|
switch(_totupper(Arg[1])) {
|
|
|
|
case TEXT('B'):
|
|
|
|
if(!_tcsnicmp(Arg+1,TEXT("batch"),LENGTHOF("batch"))) {
|
|
BatchMode = TRUE;
|
|
} else {
|
|
Valid = FALSE;
|
|
}
|
|
break;
|
|
|
|
case TEXT('C'):
|
|
|
|
if(!_tcsnicmp(Arg+1,TEXT("copydir:"),LENGTHOF("copydir:"))) {
|
|
if(Arg[9]) {
|
|
RememberOptionalDir(Arg+9, OPTDIR_PLATFORM_SPECIFIC_FIRST);
|
|
} else {
|
|
Valid = FALSE;
|
|
}
|
|
} else if(!_tcsnicmp(Arg+1,TEXT("copysource:"),LENGTHOF("copysource:"))) {
|
|
if(Arg[12]) {
|
|
TCHAR TempString[MAX_PATH];
|
|
|
|
RememberOptionalDir(Arg+12, OPTDIR_TEMPONLY| OPTDIR_ADDSRCARCH);
|
|
#if defined(_WIN64)
|
|
//
|
|
// Add the i386\<optional dir> folder if it exists. This helps in the lang folder case where
|
|
// we advocate in the network install case to explicitly specify /copysource:lang
|
|
|
|
lstrcpy( TempString, TEXT("..\\I386"));
|
|
if (!ConcatenatePaths ( TempString, Arg+12, ARRAYSIZE(TempString))) {
|
|
Valid = FALSE;
|
|
break;
|
|
}
|
|
|
|
|
|
//Also check if an I386 equivalent WOW directory exists
|
|
|
|
AddCopydirIfExists( TempString, OPTDIR_TEMPONLY | OPTDIR_PLATFORM_INDEP );
|
|
|
|
#endif
|
|
|
|
} else {
|
|
Valid = FALSE;
|
|
}
|
|
} else if(!_tcsnicmp(Arg+1,TEXT("cmd:"),LENGTHOF("cmd:"))) {
|
|
if(CmdToExecuteAtEndOfGui) {
|
|
Valid = FALSE;
|
|
} else {
|
|
CmdToExecuteAtEndOfGui = Arg+5;
|
|
}
|
|
} else if(!_tcsnicmp(Arg+1,TEXT("checkupgradeonly"),LENGTHOF("checkupgradeonly"))) {
|
|
CheckUpgradeOnly = TRUE;
|
|
UnattendedOperation = TRUE;
|
|
|
|
//
|
|
// Tell the win9X upgrade dll to generate a
|
|
// report.
|
|
//
|
|
InternalProcessCmdLineArg( TEXT("/#U:ReportOnly") );
|
|
InternalProcessCmdLineArg( TEXT("/#U:PR") );
|
|
|
|
|
|
//
|
|
// See if the user wants this to run *really*
|
|
// quietly...
|
|
//
|
|
if(!_tcsnicmp(Arg+1,TEXT("checkupgradeonlyq"),LENGTHOF("checkupgradeonlyq"))) {
|
|
//
|
|
// Yep. Tell everyone to go through quietly...
|
|
//
|
|
CheckUpgradeOnlyQ = TRUE;
|
|
InternalProcessCmdLineArg( TEXT("/#U:CheckUpgradeOnlyQ") );
|
|
}
|
|
|
|
} else if(!_tcsnicmp(Arg+1,TEXT("cmdcons"),LENGTHOF("cmdcons"))) {
|
|
BuildCmdcons = TRUE;
|
|
NoCompliance = TRUE; // disable the compliance checking
|
|
} else {
|
|
Valid = FALSE;
|
|
}
|
|
break;
|
|
|
|
case TEXT('D'):
|
|
|
|
if (_tcsicmp(Arg+1,WINNT_U_DYNAMICUPDATESDISABLE) == 0
|
|
#ifdef PRERELEASE
|
|
|| _tcsicmp(Arg+1,TEXT("disabledynamicupdates")) == 0
|
|
#endif
|
|
) {
|
|
g_DynUpdtStatus->Disabled = TRUE;
|
|
break;
|
|
}
|
|
|
|
if (!_tcsnicmp (Arg + 1, WINNT_U_DYNAMICUPDATESHARE, LENGTHOF(WINNT_U_DYNAMICUPDATESHARE)) &&
|
|
Arg[LENGTHOF(WINNT_U_DYNAMICUPDATESHARE) + 1] == TEXT(':')) {
|
|
//
|
|
// Updated files specified on the command line
|
|
//
|
|
if (g_DynUpdtStatus->DynamicUpdatesSource[0]) {
|
|
Valid = FALSE;
|
|
break;
|
|
}
|
|
|
|
if (!MyGetFullPathName (
|
|
Arg + 1 + LENGTHOF(WINNT_U_DYNAMICUPDATESHARE) + 1,
|
|
ARRAYSIZE(g_DynUpdtStatus->DynamicUpdatesSource),
|
|
g_DynUpdtStatus->DynamicUpdatesSource,
|
|
NULL) ||
|
|
!DoesDirectoryExist (g_DynUpdtStatus->DynamicUpdatesSource)) {
|
|
|
|
Valid = FALSE;
|
|
break;
|
|
}
|
|
|
|
RemoveTrailingWack (g_DynUpdtStatus->DynamicUpdatesSource);
|
|
g_DynUpdtStatus->UserSpecifiedUpdates = !g_DynUpdtStatus->Disabled;
|
|
break;
|
|
}
|
|
|
|
if (!_tcsnicmp (Arg + 1, WINNT_U_DYNAMICUPDATESPREPARE, LENGTHOF(WINNT_U_DYNAMICUPDATESPREPARE)) &&
|
|
Arg[LENGTHOF(WINNT_U_DYNAMICUPDATESPREPARE) + 1] == TEXT(':')) {
|
|
|
|
if (g_DynUpdtStatus->DynamicUpdatesSource[0]) {
|
|
Valid = FALSE;
|
|
break;
|
|
}
|
|
|
|
if (!MyGetFullPathName (
|
|
Arg + 1 + LENGTHOF(WINNT_U_DYNAMICUPDATESPREPARE) + 1,
|
|
ARRAYSIZE(g_DynUpdtStatus->DynamicUpdatesSource),
|
|
g_DynUpdtStatus->DynamicUpdatesSource,
|
|
NULL) ||
|
|
!DoesDirectoryExist (g_DynUpdtStatus->DynamicUpdatesSource)) {
|
|
|
|
Valid = FALSE;
|
|
break;
|
|
}
|
|
|
|
RemoveTrailingWack (g_DynUpdtStatus->DynamicUpdatesSource);
|
|
|
|
g_DynUpdtStatus->PrepareWinnt32 = TRUE;
|
|
g_DynUpdtStatus->UserSpecifiedUpdates = !g_DynUpdtStatus->Disabled;
|
|
break;
|
|
}
|
|
|
|
if(DebugFileLog || _tcsnicmp(Arg+1,TEXT("debug"),LENGTHOF("debug"))) {
|
|
Valid = FALSE;
|
|
break;
|
|
}
|
|
|
|
DebugLevel = _tcstol(Arg+6,&Colon,10);
|
|
if((DebugLevel == -1) || (*Colon && (*Colon != TEXT(':')))) {
|
|
Valid = FALSE;
|
|
break;
|
|
}
|
|
|
|
if(Colon == Arg+6) {
|
|
//
|
|
// No debug level specified, use default
|
|
//
|
|
DebugLevel = Winnt32LogInformation;
|
|
}
|
|
|
|
if(*Colon) {
|
|
//
|
|
// Log file name was specified.
|
|
//
|
|
Colon++;
|
|
if(*Colon) {
|
|
DebugFileLog = Colon;
|
|
} else {
|
|
Valid = FALSE;
|
|
break;
|
|
}
|
|
}
|
|
break;
|
|
|
|
case TEXT('E'):
|
|
|
|
//
|
|
// Take care of headless parameters.
|
|
//
|
|
if( !_tcsnicmp(Arg+1,WINNT_U_HEADLESS_REDIRECT,LENGTHOF(WINNT_U_HEADLESS_REDIRECT)) ) {
|
|
if( Arg[LENGTHOF(WINNT_U_HEADLESS_REDIRECT)+2] ) {
|
|
if (FAILED (StringCchCopy (
|
|
HeadlessSelection,
|
|
ARRAYSIZE(HeadlessSelection),
|
|
Arg+(LENGTHOF(WINNT_U_HEADLESS_REDIRECT)+2)
|
|
))) {
|
|
Valid = FALSE;
|
|
}
|
|
} else {
|
|
Valid = FALSE;
|
|
}
|
|
} else if( !_tcsnicmp(Arg+1,WINNT_U_HEADLESS_REDIRECTBAUDRATE,LENGTHOF(WINNT_U_HEADLESS_REDIRECTBAUDRATE)) ) {
|
|
if( Arg[LENGTHOF(WINNT_U_HEADLESS_REDIRECTBAUDRATE)+2] ) {
|
|
HeadlessBaudRate = _tcstoul(Arg+(LENGTHOF(WINNT_U_HEADLESS_REDIRECTBAUDRATE)+2),NULL,10);
|
|
} else {
|
|
Valid = FALSE;
|
|
}
|
|
}
|
|
else if ( _tcsnicmp(Arg+1,WINNT_U_ENCRYPT,LENGTHOF(WINNT_U_ENCRYPT)) == 0 )
|
|
{
|
|
LPTSTR pTmp;
|
|
pTmp = &Arg[LENGTHOF(WINNT_U_ENCRYPT)+1];
|
|
Valid = FALSE;
|
|
// Make sure we have /Encrypt:
|
|
if (*pTmp == TEXT(':'))
|
|
{
|
|
pTmp++;
|
|
while (*pTmp && (*pTmp != TEXT(':')))
|
|
{
|
|
pTmp = CharNext(pTmp);
|
|
}
|
|
if (*pTmp == TEXT(':'))
|
|
{
|
|
*pTmp = TEXT('\0');
|
|
++pTmp;
|
|
PIDDays = _tcstoul(pTmp, NULL, 10);
|
|
Valid = ((PIDDays >= 5) && (PIDDays <= 60));
|
|
}
|
|
// Save the product ID.
|
|
if (FAILED (StringCchCopy (
|
|
ProductId,
|
|
ARRAYSIZE(ProductId),
|
|
&Arg[LENGTHOF(WINNT_U_ENCRYPT)+2]
|
|
))) {
|
|
Valid = FALSE;
|
|
break;
|
|
}
|
|
PIDEncryption = TRUE;
|
|
}
|
|
}else{
|
|
Valid = FALSE;
|
|
}
|
|
break;
|
|
|
|
case TEXT('L'):
|
|
if (_tcsicmp (Arg+1, TEXT("local"))) {
|
|
Valid = FALSE;
|
|
}
|
|
break;
|
|
|
|
case TEXT('M'):
|
|
//
|
|
// Alternate source for missing files
|
|
//
|
|
if(Arg[2] == TEXT(':')) {
|
|
if (!MyGetFullPathName (Arg+3, ARRAYSIZE(AlternateSourcePath), AlternateSourcePath, NULL) ||
|
|
!DoesDirectoryExist (AlternateSourcePath)) {
|
|
|
|
Valid = FALSE;
|
|
break;
|
|
}
|
|
|
|
//
|
|
// If the user is using the /M switch, he's got privates
|
|
// that he wants to use. It's possible that some of these
|
|
// privates will be in the driver cab, inwhich case, he'd
|
|
// have to make a copy of the cab with his private. Unreasonable.
|
|
// We can get around this by simply copying all the files
|
|
// from the user-specified private directory (/M<foobar>)
|
|
// into the local source. textmode and guimode will look
|
|
// for files before extractifi ming them from the CAB. All we
|
|
// need to do here is add the user's directory to the master
|
|
// copy list.
|
|
//
|
|
RememberOptionalDir(AlternateSourcePath,OPTDIR_OVERLAY);
|
|
|
|
//
|
|
// If we're using privates, go ahead and copy the
|
|
// source local.
|
|
//
|
|
MakeLocalSource = TRUE;
|
|
UserSpecifiedMakeLocalSource = TRUE;
|
|
} else if( !_tcsnicmp( Arg+1, TEXT("MakeLocalSource"), 15)) {
|
|
//
|
|
// check if there are any options for this switch
|
|
//
|
|
if (Arg[16] && Arg[16] != TEXT(':')) {
|
|
Valid = FALSE;
|
|
break;
|
|
}
|
|
MakeLocalSource = TRUE;
|
|
UserSpecifiedMakeLocalSource = TRUE;
|
|
if (!Arg[16]) {
|
|
break;
|
|
}
|
|
if (!Arg[17]) {
|
|
//
|
|
// add this for W2K backwards compatibility
|
|
//
|
|
break;
|
|
}
|
|
if (!_tcsicmp (Arg + 17, TEXT("all"))) {
|
|
//
|
|
// copy ALL CDs
|
|
//
|
|
MLSDiskID = 0;
|
|
} else {
|
|
DWORD chars;
|
|
if (!_stscanf (Arg + 17, TEXT("%u%n"), &MLSDiskID, &chars) || Arg[17 + chars] != 0) {
|
|
Valid = FALSE;
|
|
}
|
|
}
|
|
} else {
|
|
Valid = FALSE;
|
|
}
|
|
break;
|
|
|
|
case TEXT('N'):
|
|
//
|
|
// Possibly a /noreboot or /nosysparse?
|
|
//
|
|
if( !_tcsnicmp( Arg+1, TEXT("noreboot"), LENGTHOF("noreboot"))
|
|
//
|
|
// add this hack for W2K backwards compatibility
|
|
//
|
|
&& (!Arg[LENGTHOF("noreboot") + 1] ||
|
|
Arg[LENGTHOF("noreboot") + 1] == TEXT(':') && !Arg[LENGTHOF("noreboot") + 2]) ) {
|
|
AutomaticallyShutDown = FALSE;
|
|
}
|
|
#ifdef RUN_SYSPARSE
|
|
else if( !_tcsicmp( Arg+1, TEXT("nosysparse"))) {
|
|
NoSysparse = TRUE;
|
|
}
|
|
#endif
|
|
else if( _tcsicmp( Arg+1, TEXT("nodownload"))) {
|
|
Valid = FALSE;
|
|
}
|
|
break;
|
|
|
|
case TEXT('Q'):
|
|
g_Quiet = TRUE;
|
|
break;
|
|
|
|
case TEXT('R'):
|
|
if (!_tcsnicmp (Arg + 1, TEXT("Restart"), LENGTHOF("Restart"))) {
|
|
g_DynUpdtStatus->Winnt32Restarted = TRUE;
|
|
if (Arg[LENGTHOF("Restart") + 1] == TEXT(':')) {
|
|
lstrcpy (g_DynUpdtStatus->RestartAnswerFile, Arg + LENGTHOF("Restart:") + 1);
|
|
} else if (Arg[LENGTHOF("Restart") + 1]) {
|
|
Valid = FALSE;
|
|
}
|
|
} else {
|
|
Valid = FALSE;
|
|
}
|
|
|
|
break;
|
|
|
|
case TEXT('S'):
|
|
|
|
if((Arg[2] == TEXT(':')) && Arg[3]) {
|
|
//
|
|
// Ignore extraneous sources
|
|
//
|
|
if(SourceCount < MAX_SOURCE_COUNT) {
|
|
if (GetFullPathName (
|
|
Arg+3,
|
|
ARRAYSIZE(NativeSourcePaths[SourceCount]),
|
|
NativeSourcePaths[SourceCount],
|
|
NULL
|
|
)) {
|
|
SourceCount++;
|
|
} else {
|
|
Valid = FALSE;
|
|
}
|
|
}
|
|
} else {
|
|
if(!_tcsnicmp(Arg+1,TEXT("syspart:"),LENGTHOF("syspart:"))
|
|
&& Arg[1 + LENGTHOF("syspart:")]
|
|
&& (_totupper(Arg[1 + LENGTHOF("syspart:")]) >= TEXT('A'))
|
|
&& (_totupper(Arg[1 + LENGTHOF("syspart:")]) <= TEXT('Z'))
|
|
&& !ForcedSystemPartition) {
|
|
#ifdef _X86_
|
|
if (IsNEC98()){
|
|
if (!IsValidDrive(Arg[1 + LENGTHOF("syspart:")])){
|
|
Valid = FALSE;
|
|
break;
|
|
}
|
|
}
|
|
#endif
|
|
ForcedSystemPartition = (TCHAR)_totupper(Arg[1 + LENGTHOF("syspart:")]);
|
|
|
|
} else {
|
|
Valid = FALSE;
|
|
}
|
|
}
|
|
break;
|
|
|
|
case TEXT('T'):
|
|
|
|
if(_tcsnicmp(Arg+1,TEXT("tempdrive:"),LENGTHOF("tempdrive:"))
|
|
|| !(UserSpecifiedLocalSourceDrive = (TCHAR)_totupper(Arg[1 + LENGTHOF("tempdrive:")]))
|
|
|| (UserSpecifiedLocalSourceDrive < TEXT('A'))
|
|
|| (UserSpecifiedLocalSourceDrive > TEXT('Z'))) {
|
|
|
|
Valid = FALSE;
|
|
}
|
|
break;
|
|
|
|
case TEXT('U'):
|
|
|
|
if (_tcsicmp (Arg+1, TEXT("UpgradeAdvisor")) == 0) {
|
|
UpgradeAdvisorMode = TRUE;
|
|
break;
|
|
}
|
|
|
|
//
|
|
// Accept unattend and unattended as synonyms
|
|
//
|
|
b = FALSE;
|
|
if(!_tcsnicmp(Arg+1,TEXT("unattended"),LENGTHOF("unattended"))) {
|
|
b = TRUE;
|
|
u = 1 + LENGTHOF("unattended");
|
|
} else {
|
|
if(!_tcsnicmp(Arg+1,TEXT("unattend"),LENGTHOF("unattend"))) {
|
|
b = TRUE;
|
|
u = 1 + LENGTHOF("unattend");
|
|
}
|
|
}
|
|
|
|
if(b) {
|
|
if(!CheckUpgradeOnly && UnattendedOperation) {
|
|
Valid = FALSE;
|
|
break;
|
|
}
|
|
|
|
UnattendedOperation = TRUE;
|
|
UnattendSwitchSpecified = TRUE;
|
|
|
|
UnattendedShutdownTimeout = _tcstoul(Arg+u,&Colon,10);
|
|
if(UnattendedShutdownTimeout == (DWORD)(-1)) {
|
|
UnattendedShutdownTimeout = 0;
|
|
}
|
|
|
|
if(*Colon == 0) {
|
|
break;
|
|
}
|
|
|
|
if(*Colon++ != TEXT(':')) {
|
|
Valid = FALSE;
|
|
break;
|
|
}
|
|
|
|
if(*Colon) {
|
|
// UnattendedScriptFile = Colon;
|
|
//
|
|
// Get the name of the unattended script file
|
|
//
|
|
UnattendedScriptFile = MALLOC(MAX_PATH*sizeof(TCHAR));
|
|
if(UnattendedScriptFile) {
|
|
if(!GetFullPathName(
|
|
Colon,
|
|
MAX_PATH,
|
|
UnattendedScriptFile,
|
|
&p)) {
|
|
|
|
Valid = FALSE;
|
|
}
|
|
} else {
|
|
Valid = FALSE;
|
|
}
|
|
|
|
} else {
|
|
Valid = FALSE;
|
|
}
|
|
|
|
} else if(!_tcsnicmp(Arg+1,TEXT("udf:"),LENGTHOF("udf:"))) {
|
|
|
|
if(!Arg[1 + LENGTHOF("udf:")] || (Arg[1 + LENGTHOF("udf:")] == TEXT(',')) || UniquenessId) {
|
|
Valid = FALSE;
|
|
break;
|
|
}
|
|
|
|
//
|
|
// Get p to point to the filename if there is one specified,
|
|
// and terminate the ID part.
|
|
//
|
|
if(p = _tcschr(Arg+LENGTHOF("udf:")+2,TEXT(','))) {
|
|
*p++ = 0;
|
|
if(*p == 0) {
|
|
Valid = FALSE;
|
|
break;
|
|
}
|
|
}
|
|
|
|
UniquenessId = Arg + LENGTHOF("udf:") + 1;
|
|
UniquenessDatabaseFile = p;
|
|
} else {
|
|
Valid = FALSE;
|
|
}
|
|
break;
|
|
|
|
case TEXT('#'):
|
|
|
|
InternalProcessCmdLineArg(Arg);
|
|
break;
|
|
|
|
default:
|
|
|
|
Valid = FALSE;
|
|
break;
|
|
}
|
|
} else {
|
|
Valid = FALSE;
|
|
}
|
|
if(!Valid && !BadParam) {
|
|
BadParam = Arg;
|
|
}
|
|
}
|
|
|
|
if(Valid) {
|
|
if( DebugLevel == 0 ) {
|
|
DebugLevel = Winnt32LogInformation;
|
|
}
|
|
if( DebugFileLog == NULL ) {
|
|
MyGetWindowsDirectory (buffer, ARRAYSIZE(buffer));
|
|
if (ConcatenatePaths (buffer, S_WINNT32LOGFILE, ARRAYSIZE(buffer))) {
|
|
DebugFileLog = DupString (buffer);
|
|
}
|
|
}
|
|
if( DebugFileLog )
|
|
StartDebugLog(DebugFileLog,DebugLevel);
|
|
|
|
// If we do PID encryption (/Encrypt on the command line)
|
|
// we don't read the unattend file. We will write the encrypted PID to it later.
|
|
if (!PIDEncryption)
|
|
{
|
|
Valid = GetArgsFromUnattendFile();
|
|
}
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// try to log the invalid argument pointed by BadParam
|
|
// this may not actually work if the log wasn't initialized yet
|
|
//
|
|
DebugLog (
|
|
Winnt32LogError,
|
|
TEXT("Error: Invalid argument [%1]"),
|
|
0,
|
|
BadParam
|
|
);
|
|
|
|
if (PIDEncryption)
|
|
{
|
|
// Invalid encrypt command line, Time frame invalid
|
|
if (!g_Quiet)
|
|
{
|
|
MessageBoxFromMessage(
|
|
NULL,
|
|
MSG_INVALID_TIME_FRAME,
|
|
FALSE,
|
|
AppTitleStringId,
|
|
MB_OK | MB_ICONINFORMATION | MB_TASKMODAL
|
|
);
|
|
}
|
|
}
|
|
else if(BatchMode) {
|
|
//
|
|
// Tell SMS about bad paramters
|
|
//
|
|
SaveMessageForSMS( MSG_INVALID_PARAMETER, BadParam );
|
|
|
|
} else {
|
|
//
|
|
// Show user the valid command line parameters
|
|
//
|
|
MyWinHelp(NULL,HELP_CONTEXT,IDH_USAGE);
|
|
}
|
|
}
|
|
|
|
return(Valid);
|
|
}
|
|
|
|
|
|
BOOL
|
|
RememberOptionalDir(
|
|
IN LPCTSTR Directory,
|
|
IN UINT Flags
|
|
)
|
|
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
This routine adds a directory to the list of optional directories
|
|
to be copied. If the directory is already present it is not added
|
|
again.
|
|
|
|
Arguments:
|
|
|
|
Directory - supplies name of directory to be copied.
|
|
|
|
Flags - supplies flags for the directory. If the directory already
|
|
existed in the list, the current flags are NOT overwritten.
|
|
|
|
Return Value:
|
|
|
|
Boolean value indicating outcome. If FALSE, the caller can assume that
|
|
we've overflowed the number of allowed optional dirs.
|
|
|
|
--*/
|
|
|
|
{
|
|
UINT u;
|
|
|
|
//
|
|
// See if we have room.
|
|
//
|
|
if(OptionalDirectoryCount == MAX_OPTIONALDIRS) {
|
|
return(FALSE);
|
|
}
|
|
|
|
//
|
|
// If already there, do nothing.
|
|
//
|
|
for(u=0; u<OptionalDirectoryCount; u++) {
|
|
if(!lstrcmpi(OptionalDirectories[u],Directory)) {
|
|
return(TRUE);
|
|
}
|
|
}
|
|
|
|
//
|
|
// OK, add it.
|
|
//
|
|
DebugLog (Winnt32LogInformation, TEXT("Optional Directory <%1> added"), 0, Directory);
|
|
lstrcpy(OptionalDirectories[OptionalDirectoryCount],Directory);
|
|
OptionalDirectoryFlags[OptionalDirectoryCount] = Flags;
|
|
OptionalDirectoryCount++;
|
|
return(TRUE);
|
|
}
|
|
|
|
|
|
BOOL
|
|
CheckBuildNumber(
|
|
)
|
|
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
This routine checks the build number of the NT system we're currently
|
|
running. Note that the build number is stored in a global variable
|
|
because we'll need it again later.
|
|
|
|
Arguments:
|
|
|
|
None.
|
|
|
|
Return Value:
|
|
|
|
Boolean value indicating whether to allow an upgrade from this build.
|
|
|
|
--*/
|
|
|
|
{
|
|
return( BuildNumber <= NT40 || BuildNumber >= NT50B1 );
|
|
}
|
|
|
|
|
|
BOOL
|
|
LoadSetupapi(
|
|
VOID
|
|
)
|
|
{
|
|
TCHAR Name[MAX_PATH], *p;
|
|
WIN32_FIND_DATA FindData;
|
|
HANDLE FindHandle;
|
|
HMODULE Setupapi;
|
|
BOOL WeLoadedLib = FALSE;
|
|
BOOL b = FALSE;
|
|
PCTSTR Header;
|
|
|
|
|
|
//
|
|
// Use the setupapi.dll that was loaded by an upgrade module
|
|
//
|
|
|
|
Setupapi = GetModuleHandle (TEXT("SETUPAPI.DLL"));
|
|
|
|
if (!Setupapi) {
|
|
|
|
//
|
|
// Upgrade module did not load SETUPAPI.DLL, so we must load it.
|
|
// If setupapi.dll is in the system directory, use the one that's there.
|
|
//
|
|
if (GetSystemDirectory(Name,ARRAYSIZE(Name)) &&
|
|
ConcatenatePaths(Name,TEXT("SETUPAPI.DLL"),ARRAYSIZE(Name))) {
|
|
|
|
FindHandle = FindFirstFile(Name,&FindData);
|
|
if(FindHandle == INVALID_HANDLE_VALUE) {
|
|
//
|
|
// Not there. Fetch the dll out of the win95 upgrade
|
|
// support directory.
|
|
//
|
|
if(MyGetModuleFileName(NULL,Name,ARRAYSIZE(Name)) && (p = _tcsrchr(Name,TEXT('\\')))){
|
|
*p= 0;
|
|
if (ConcatenatePaths(Name,WINNT_WIN95UPG_95_DIR,ARRAYSIZE(Name)) &&
|
|
ConcatenatePaths(Name,TEXT("SETUPAPI.DLL"),ARRAYSIZE(Name))) {
|
|
|
|
Setupapi = LoadLibraryEx(Name,NULL,LOAD_WITH_ALTERED_SEARCH_PATH);
|
|
}
|
|
}
|
|
|
|
} else {
|
|
//
|
|
// Already in system directory.
|
|
//
|
|
FindClose(FindHandle);
|
|
Setupapi = LoadLibrary(TEXT("SETUPAPI.DLL"));
|
|
}
|
|
|
|
if (Setupapi) {
|
|
WeLoadedLib = TRUE;
|
|
}
|
|
}
|
|
}
|
|
|
|
if(Setupapi) {
|
|
#ifdef UNICODE
|
|
b = (((FARPROC)SetupapiDecompressOrCopyFile = GetProcAddress(Setupapi,"SetupDecompressOrCopyFileW")) != NULL);
|
|
b = b && ((FARPROC)SetupapiOpenInfFile = GetProcAddress(Setupapi,"SetupOpenInfFileW"));
|
|
b = b && ((FARPROC)SetupapiGetLineCount = GetProcAddress(Setupapi,"SetupGetLineCountW"));
|
|
b = b && ((FARPROC)SetupapiGetStringField = GetProcAddress(Setupapi,"SetupGetStringFieldW"));
|
|
b = b && ((FARPROC)SetupapiGetLineByIndex = GetProcAddress(Setupapi,"SetupGetLineByIndexW"));
|
|
b = b && ((FARPROC)SetupapiFindFirstLine = GetProcAddress(Setupapi,"SetupFindFirstLineW"));
|
|
b = b && ((FARPROC)SetupapiFindNextMatchLine = GetProcAddress(Setupapi,"SetupFindNextMatchLineW"));
|
|
//
|
|
// needed for DU
|
|
//
|
|
b = b && ((FARPROC)SetupapiQueueCopy = GetProcAddress(Setupapi,"SetupQueueCopyW"));
|
|
b = b && ((FARPROC)SetupapiCommitFileQueue = GetProcAddress(Setupapi,"SetupCommitFileQueueW"));
|
|
b = b && ((FARPROC)SetupapiDefaultQueueCallback = GetProcAddress(Setupapi,"SetupDefaultQueueCallbackW"));
|
|
//
|
|
// needed in unsupdrv.c
|
|
//
|
|
b = b && ((FARPROC)SetupapiGetInfInformation = GetProcAddress(Setupapi,"SetupGetInfInformationW"));
|
|
b = b && ((FARPROC)SetupapiQueryInfFileInformation = GetProcAddress(Setupapi,"SetupQueryInfFileInformationW"));
|
|
(FARPROC)SetupapiGetSourceFileLocation = GetProcAddress(Setupapi,"SetupGetSourceFileLocationW");
|
|
(FARPROC)SetupapiQueryInfOriginalFileInformation = GetProcAddress(Setupapi,"SetupQueryInfOriginalFileInformationW");
|
|
|
|
|
|
#else
|
|
b = (((FARPROC)SetupapiDecompressOrCopyFile = GetProcAddress(Setupapi,"SetupDecompressOrCopyFileA")) != NULL);
|
|
b = b && ((FARPROC)SetupapiOpenInfFile = GetProcAddress(Setupapi,"SetupOpenInfFileA"));
|
|
b = b && ((FARPROC)SetupapiGetLineCount = GetProcAddress(Setupapi,"SetupGetLineCountA"));
|
|
b = b && ((FARPROC)SetupapiGetStringField = GetProcAddress(Setupapi,"SetupGetStringFieldA"));
|
|
b = b && ((FARPROC)SetupapiGetLineByIndex = GetProcAddress(Setupapi,"SetupGetLineByIndexA"));
|
|
b = b && ((FARPROC)SetupapiFindFirstLine = GetProcAddress(Setupapi,"SetupFindFirstLineA"));
|
|
b = b && ((FARPROC)SetupapiFindNextMatchLine = GetProcAddress(Setupapi,"SetupFindNextMatchLineA"));
|
|
//
|
|
// needed for DU
|
|
//
|
|
b = b && ((FARPROC)SetupapiQueueCopy = GetProcAddress(Setupapi,"SetupQueueCopyA"));
|
|
b = b && ((FARPROC)SetupapiCommitFileQueue = GetProcAddress(Setupapi,"SetupCommitFileQueueA"));
|
|
b = b && ((FARPROC)SetupapiDefaultQueueCallback = GetProcAddress(Setupapi,"SetupDefaultQueueCallbackA"));
|
|
|
|
#endif
|
|
b = b && ((FARPROC)SetupapiCloseInfFile = GetProcAddress(Setupapi,"SetupCloseInfFile"));
|
|
//
|
|
// needed for DU
|
|
//
|
|
b = b && ((FARPROC)SetupapiOpenFileQueue = GetProcAddress(Setupapi,"SetupOpenFileQueue"));
|
|
b = b && ((FARPROC)SetupapiCloseFileQueue = GetProcAddress(Setupapi,"SetupCloseFileQueue"));
|
|
b = b && ((FARPROC)SetupapiInitDefaultQueueCallback = GetProcAddress(Setupapi,"SetupInitDefaultQueueCallback"));
|
|
b = b && ((FARPROC)SetupapiTermDefaultQueueCallback = GetProcAddress(Setupapi,"SetupTermDefaultQueueCallback"));
|
|
b = b && ((FARPROC)SetupapiGetFieldCount = GetProcAddress(Setupapi,"SetupGetFieldCount"));
|
|
|
|
|
|
b = b && ((FARPROC)SetupapiFindNextLine = GetProcAddress(Setupapi,"SetupFindNextLine"));
|
|
|
|
(FARPROC)fnSetupOpenLog = GetProcAddress(Setupapi, "SetupOpenLog");
|
|
|
|
#ifdef UNICODE
|
|
(FARPROC)fnSetupLogError = GetProcAddress(Setupapi, "SetupLogErrorW");
|
|
#else
|
|
(FARPROC)fnSetupLogError = GetProcAddress(Setupapi, "SetupLogErrorA");
|
|
#endif
|
|
|
|
(FARPROC)fnSetupCloseLog = GetProcAddress(Setupapi, "SetupCloseLog");
|
|
}
|
|
|
|
//
|
|
// If the below if() fails, we must be on a platform that has
|
|
// a setupapi.dll without the new log API. In that case, neither
|
|
// upgrade DLLs have loaded their own setupapi, so we don't care
|
|
// about logging, and we eat the error.
|
|
//
|
|
|
|
if (fnSetupOpenLog && fnSetupLogError && fnSetupCloseLog) {
|
|
if (!Winnt32Restarted ()) {
|
|
//
|
|
// Log APIs exist, so delete setupact.log and setuperr.log, write header
|
|
//
|
|
|
|
fnSetupOpenLog (TRUE);
|
|
|
|
Header = GetStringResource (MSG_LOG_BEGIN);
|
|
if (Header) {
|
|
fnSetupLogError (Header, LogSevInformation);
|
|
FreeStringResource (Header);
|
|
}
|
|
|
|
fnSetupCloseLog();
|
|
}
|
|
}
|
|
|
|
|
|
|
|
if(!b) {
|
|
|
|
if (WeLoadedLib) {
|
|
FreeLibrary(Setupapi);
|
|
}
|
|
|
|
MessageBoxFromMessage(
|
|
NULL,
|
|
MSG_CANT_LOAD_SETUPAPI,
|
|
FALSE,
|
|
AppTitleStringId,
|
|
MB_OK | MB_ICONERROR | MB_TASKMODAL,
|
|
TEXT("setupapi.dll")
|
|
);
|
|
}
|
|
|
|
return b;
|
|
}
|
|
|
|
|
|
VOID
|
|
LoadUpgradeSupport(
|
|
VOID
|
|
)
|
|
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
This routine loads the Win95 upgrade dll or the NT upgrade dll and
|
|
retreives its significant entry points.
|
|
|
|
Arguments:
|
|
|
|
None.
|
|
|
|
Return Value:
|
|
|
|
--*/
|
|
|
|
{
|
|
DWORD d;
|
|
DWORD i;
|
|
LPTSTR *sourceDirectories;
|
|
HKEY hKey;
|
|
DWORD dwErr = ERROR_SUCCESS;
|
|
DWORD dwSize;
|
|
TCHAR buffer[MAX_PATH];
|
|
PTSTR p;
|
|
TCHAR dst[MAX_PATH];
|
|
TCHAR src[MAX_PATH];
|
|
|
|
ZeroMemory(&UpgradeSupport,sizeof(UpgradeSupport));
|
|
|
|
if (!ISNT()) {
|
|
//
|
|
// Don't load on server
|
|
//
|
|
|
|
// assert that the Server global variable is accurate
|
|
MYASSERT (UpgradeProductType != UNKNOWN);
|
|
|
|
if (Server) {
|
|
return;
|
|
}
|
|
|
|
//
|
|
// Form full Win95 path of DLL.
|
|
//
|
|
if (!BuildPath(buffer, WINNT_WIN95UPG_95_DIR, WINNT_WIN95UPG_95_DLL)) {
|
|
buffer[0] = 0;
|
|
}
|
|
} else {
|
|
//
|
|
// Form full NT path of DLL.
|
|
//
|
|
if (!BuildPath(buffer, WINNT_WINNTUPG_DIR, WINNT_WINNTUPG_DLL)) {
|
|
buffer[0] = 0;
|
|
}
|
|
}
|
|
|
|
if (buffer[0] &&
|
|
FindPathToWinnt32File (buffer, UpgradeSupport.DllPath, ARRAYSIZE(UpgradeSupport.DllPath))) {
|
|
//
|
|
// Load the library. Use LoadLibraryEx to get the system to resolve DLL
|
|
// references starting in the dir where w95upg.dll is, instead of the
|
|
// directory where winnt32.exe is.
|
|
//
|
|
// If we're upgrading from NT5, use the system's setupapi.
|
|
//
|
|
//
|
|
// HACK HACK HACK - see NTBUG9: 354926
|
|
// some OEM machines have KnownDlls registered, but actually missing
|
|
// this leads to a failure of LoadLibrary
|
|
// we need a workaround for this
|
|
//
|
|
PSTRINGLIST missingKnownDlls = NULL;
|
|
FixMissingKnownDlls (&missingKnownDlls, TEXT("imagehlp.dll\0"));
|
|
if (!ISNT()) {
|
|
UpgradeSupport.DllModuleHandle = LoadLibraryEx(
|
|
UpgradeSupport.DllPath,
|
|
NULL,
|
|
LOAD_WITH_ALTERED_SEARCH_PATH
|
|
);
|
|
} else {
|
|
UpgradeSupport.DllModuleHandle = LoadLibraryEx(
|
|
UpgradeSupport.DllPath,
|
|
NULL,
|
|
(BuildNumber > NT40) ? 0 : LOAD_WITH_ALTERED_SEARCH_PATH
|
|
);
|
|
}
|
|
if (missingKnownDlls) {
|
|
DWORD rc = GetLastError ();
|
|
UndoFixMissingKnownDlls (missingKnownDlls);
|
|
SetLastError (rc);
|
|
}
|
|
} else {
|
|
//
|
|
// just for display purposes, use default path
|
|
//
|
|
MyGetModuleFileName (NULL, UpgradeSupport.DllPath, ARRAYSIZE(UpgradeSupport.DllPath));
|
|
p = _tcsrchr (UpgradeSupport.DllPath, TEXT('\\'));
|
|
if (p) {
|
|
*p = 0;
|
|
}
|
|
ConcatenatePaths (UpgradeSupport.DllPath, buffer, ARRAYSIZE(buffer));
|
|
SetLastError (ERROR_FILE_NOT_FOUND);
|
|
}
|
|
|
|
if(!UpgradeSupport.DllModuleHandle) {
|
|
|
|
d = GetLastError();
|
|
if(d == ERROR_DLL_NOT_FOUND) {
|
|
d = ERROR_FILE_NOT_FOUND;
|
|
}
|
|
|
|
MessageBoxFromMessageAndSystemError(
|
|
NULL,
|
|
MSG_UPGRADE_DLL_ERROR,
|
|
d,
|
|
AppTitleStringId,
|
|
MB_OK | MB_ICONERROR | MB_TASKMODAL,
|
|
UpgradeSupport.DllPath
|
|
);
|
|
|
|
goto c0;
|
|
} else {
|
|
DebugLog (Winnt32LogInformation, TEXT("Loaded upgrade module: <%1>"), 0, UpgradeSupport.DllPath);
|
|
}
|
|
|
|
//
|
|
// Get entry points.
|
|
//
|
|
(FARPROC)UpgradeSupport.InitializeRoutine = GetProcAddress(
|
|
UpgradeSupport.DllModuleHandle,
|
|
WINNT32_PLUGIN_INIT_NAME
|
|
);
|
|
|
|
(FARPROC)UpgradeSupport.GetPagesRoutine = GetProcAddress(
|
|
UpgradeSupport.DllModuleHandle,
|
|
WINNT32_PLUGIN_GETPAGES_NAME
|
|
);
|
|
|
|
(FARPROC)UpgradeSupport.WriteParamsRoutine = GetProcAddress(
|
|
UpgradeSupport.DllModuleHandle,
|
|
WINNT32_PLUGIN_WRITEPARAMS_NAME
|
|
);
|
|
|
|
(FARPROC)UpgradeSupport.CleanupRoutine = GetProcAddress(
|
|
UpgradeSupport.DllModuleHandle,
|
|
WINNT32_PLUGIN_CLEANUP_NAME
|
|
);
|
|
|
|
#ifdef _X86_
|
|
if (IsNEC98()){
|
|
(FARPROC)W95SetAutoBootFlag = GetProcAddress(
|
|
UpgradeSupport.DllModuleHandle,
|
|
WINNT32_PLUGIN_SETAUTOBOOT_NAME
|
|
);
|
|
}
|
|
info.Boot16 = &g_Boot16;
|
|
|
|
|
|
if (!ISNT()) {
|
|
|
|
(FARPROC)UpgradeSupport.OptionalDirsRoutine = GetProcAddress (
|
|
UpgradeSupport.DllModuleHandle,
|
|
WINNT32_PLUGIN_GETOPTIONALDIRS_NAME
|
|
);
|
|
}
|
|
#endif
|
|
|
|
if(!UpgradeSupport.InitializeRoutine
|
|
|| !UpgradeSupport.GetPagesRoutine
|
|
|| !UpgradeSupport.WriteParamsRoutine
|
|
|| !UpgradeSupport.CleanupRoutine) {
|
|
|
|
//
|
|
// Entry points couldn't be found. The upgrade dll is corrupt.
|
|
//
|
|
MessageBoxFromMessage(
|
|
NULL,
|
|
MSG_UPGRADE_DLL_CORRUPT,
|
|
FALSE,
|
|
AppTitleStringId,
|
|
MB_OK | MB_ICONERROR | MB_TASKMODAL,
|
|
UpgradeSupport.DllPath
|
|
);
|
|
|
|
goto c1;
|
|
}
|
|
|
|
//
|
|
// Fill in the info structure. This will be passed to the DLL's init routine.
|
|
//
|
|
info.Size = sizeof(info);
|
|
info.UnattendedFlag = &UnattendedOperation;
|
|
info.CancelledFlag = &Cancelled;
|
|
info.AbortedFlag = &Aborted;
|
|
info.UpgradeFlag = &Upgrade;
|
|
info.LocalSourceModeFlag = &MakeLocalSource;
|
|
info.CdRomInstallFlag = &RunFromCD;
|
|
info.UnattendedScriptFile = &UnattendedScriptFile;
|
|
info.UpgradeOptions = &UpgradeOptions;
|
|
info.NotEnoughSpaceBlockFlag = &BlockOnNotEnoughSpace;
|
|
info.LocalSourceDrive = &LocalSourceDriveOffset;
|
|
info.LocalSourceSpaceRequired = &LocalSourceSpaceRequired;
|
|
info.ForceNTFSConversion = &ForceNTFSConversion;
|
|
info.ProductFlavor = &ProductFlavor;
|
|
info.SetupFlags = &dwSetupFlags;
|
|
//
|
|
// Version info fields
|
|
//
|
|
|
|
info.ProductType = &UpgradeProductType;
|
|
info.BuildNumber = VER_PRODUCTBUILD;
|
|
info.ProductVersion = VER_PRODUCTVERSION_W;
|
|
|
|
#if DBG
|
|
info.Debug = TRUE;
|
|
#else
|
|
info.Debug = FALSE;
|
|
#endif
|
|
|
|
#ifdef PRERELEASE
|
|
info.PreRelease = TRUE;
|
|
#else
|
|
info.PreRelease = FALSE;
|
|
#endif
|
|
|
|
//
|
|
// Source directories
|
|
//
|
|
|
|
sourceDirectories = (LPTSTR *) MALLOC(sizeof(LPTSTR) * MAX_SOURCE_COUNT);
|
|
if (sourceDirectories) {
|
|
for (i=0;i<MAX_SOURCE_COUNT;i++) {
|
|
sourceDirectories[i] = NativeSourcePaths[i];
|
|
}
|
|
}
|
|
|
|
info.SourceDirectories = sourceDirectories;
|
|
info.SourceDirectoryCount = &SourceCount;
|
|
|
|
info.UnattendSwitchSpecified = &UnattendSwitchSpecified;
|
|
info.DUCompletedSuccessfully = &g_DynUpdtStatus->Successful;
|
|
|
|
if (!IsArc()) {
|
|
#if defined(_AMD64_) || defined(_X86_)
|
|
if (!ISNT()) {
|
|
|
|
//
|
|
// Fill in win9xupg specific information. This is done so that the win9xupg
|
|
// team can add more parameters to the structure without disturbing other
|
|
// upgrade dll writers. If a paramter is needed in both cases, it should
|
|
// be placed in the info structure above.
|
|
//
|
|
|
|
Win9xInfo.Size = sizeof (Win9xInfo);
|
|
Win9xInfo.BaseInfo = &info;
|
|
Win9xInfo.WinDirSpace = &WinDirSpaceFor9x;
|
|
Win9xInfo.RequiredMb = &UpgRequiredMb;
|
|
Win9xInfo.AvailableMb = &UpgAvailableMb;
|
|
Win9xInfo.DynamicUpdateLocalDir = g_DynUpdtStatus->WorkingDir;
|
|
Win9xInfo.DynamicUpdateDrivers = g_DynUpdtStatus->SelectedDrivers;
|
|
Win9xInfo.UpginfsUpdated = &UpginfsUpdated;
|
|
|
|
//
|
|
// Save the location of the original location of w95upg.dll. Because of dll
|
|
// replacement, this may be different than the actual w95upg.dll location
|
|
// used.
|
|
//
|
|
MyGetModuleFileName (NULL, UpgradeSourcePath, ARRAYSIZE(UpgradeSourcePath));
|
|
p = _tcsrchr (UpgradeSourcePath, TEXT('\\'));
|
|
if (p) {
|
|
*p = 0;
|
|
}
|
|
|
|
if (!ConcatenatePaths (UpgradeSourcePath, WINNT_WIN95UPG_95_DIR, ARRAYSIZE(UpgradeSourcePath))) {
|
|
d = ERROR_INSUFFICIENT_BUFFER;
|
|
} else {
|
|
Win9xInfo.UpgradeSourcePath = UpgradeSourcePath;
|
|
|
|
//
|
|
// Copy over optional directories just as we did with source directories above.
|
|
//
|
|
sourceDirectories = (LPTSTR *) MALLOC(sizeof(LPTSTR) * MAX_OPTIONALDIRS);
|
|
if (sourceDirectories) {
|
|
for (i=0;i<MAX_OPTIONALDIRS;i++) {
|
|
sourceDirectories[i] = OptionalDirectories[i];
|
|
}
|
|
}
|
|
|
|
Win9xInfo.OptionalDirectories = sourceDirectories;
|
|
Win9xInfo.OptionalDirectoryCount = &OptionalDirectoryCount;
|
|
Win9xInfo.UpgradeFailureReason = &UpgradeFailureReason;
|
|
|
|
//
|
|
// Read disk sectors routine. Win9xUpg uses this when looking for other os installations.
|
|
//
|
|
Win9xInfo.ReadDiskSectors = ReadDiskSectors;
|
|
|
|
d = UpgradeSupport.InitializeRoutine((PWINNT32_PLUGIN_INIT_INFORMATION_BLOCK) &Win9xInfo);
|
|
}
|
|
}
|
|
else {
|
|
d = UpgradeSupport.InitializeRoutine(&info);
|
|
}
|
|
#endif // defined(_AMD64_) || defined(_X86_)
|
|
} else {
|
|
#ifdef UNICODE // Always true for ARC, never true for Win9x upgrade
|
|
//
|
|
// Call the DLL's init routine and get-pages routine. If either fails tell the user.
|
|
//
|
|
d = UpgradeSupport.InitializeRoutine(&info);
|
|
#endif // UNICODE
|
|
} // if (!IsArc())
|
|
|
|
if(d == NO_ERROR) {
|
|
d = UpgradeSupport.GetPagesRoutine(
|
|
&UpgradeSupport.AfterWelcomePageCount,
|
|
&UpgradeSupport.Pages1,
|
|
&UpgradeSupport.AfterOptionsPageCount,
|
|
&UpgradeSupport.Pages2,
|
|
&UpgradeSupport.BeforeCopyPageCount,
|
|
&UpgradeSupport.Pages3
|
|
);
|
|
}
|
|
|
|
|
|
//
|
|
// By returning ERROR_REQUEST_ABORTED, an upgrade dll can refuse to upgrade the machine.
|
|
// In this case, no message will be generated by this routine and the option to upgrade
|
|
// will be grayed out on the wizard page. In the case of all other error messages, winnt32
|
|
// will warn the user that the upgrade dll failed to initialize. The upgrade.dll is expected
|
|
// to provide whatever UI is necessary before returning from its init routine.
|
|
//
|
|
if (UpgradeFailureReason > REASON_LAST_REASON) {
|
|
UpgradeFailureReason = REASON_LAST_REASON;
|
|
}
|
|
|
|
if(d == NO_ERROR) {
|
|
return;
|
|
}
|
|
|
|
if (d != ERROR_REQUEST_ABORTED) {
|
|
SkipVirusScannerCheck = TRUE;
|
|
MessageBoxFromMessageAndSystemError(
|
|
NULL,
|
|
MSG_UPGRADE_INIT_ERROR,
|
|
d,
|
|
AppTitleStringId,
|
|
MB_OK | MB_ICONERROR | MB_TASKMODAL
|
|
);
|
|
|
|
c1:
|
|
FreeLibrary(UpgradeSupport.DllModuleHandle);
|
|
ZeroMemory (&UpgradeSupport, sizeof (UpgradeSupport));
|
|
}
|
|
|
|
c0:
|
|
Upgrade = FALSE;
|
|
return;
|
|
}
|
|
|
|
|
|
#ifdef _X86_
|
|
|
|
BOOL
|
|
CheckVirusScanners (
|
|
VOID
|
|
)
|
|
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
This routine is used to check for virus scanners on win9x machines that can
|
|
impeed setup (either in a clean install or upgrade case.) The function simply
|
|
calls an entry point within the w95upg.dll and that module performs the
|
|
actual check.
|
|
|
|
Arguments:
|
|
|
|
None.
|
|
|
|
Return Value:
|
|
|
|
TRUE if no virus scanners were detected that could cause problems. FALSE if a virus
|
|
scanner was detected that could cause setup to fail. We rely on the w95upg.dll code
|
|
to provide an appropriate message to the user before returning to us.
|
|
|
|
--*/
|
|
|
|
{
|
|
HANDLE dllHandle;
|
|
PWINNT32_PLUGIN_VIRUSSCANNER_CHECK_ROUTINE virusScanRoutine;
|
|
|
|
//
|
|
// This check is win9xupg specific.
|
|
//
|
|
if (ISNT()) {
|
|
return TRUE;
|
|
}
|
|
dllHandle = GetModuleHandle (WINNT_WIN95UPG_95_DLL);
|
|
//
|
|
// If the module was not loaded, we'll skip this check.
|
|
//
|
|
if (!dllHandle) {
|
|
return TRUE;
|
|
}
|
|
//
|
|
// Get entry points.
|
|
//
|
|
(FARPROC) virusScanRoutine = GetProcAddress(dllHandle, WINNT32_PLUGIN_VIRUSSCANCHECK_NAME);
|
|
if (!virusScanRoutine) {
|
|
//
|
|
// corrupt dll or something
|
|
//
|
|
return FALSE;
|
|
}
|
|
|
|
//
|
|
// Now, simply call the routine. It will handle the actuall checking as well as informing the user.
|
|
//
|
|
return virusScanRoutine ();
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
BOOL
|
|
ValidateSourceLocation(
|
|
VOID
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
This routine checks the initial source location to see if it's
|
|
valid. The first source location must be valid for setup to
|
|
work, and this catches typos by the user. It cannot detect
|
|
transient network conditions, so this is not foolproof.
|
|
|
|
We check this by looking for a required file, dosnet.inf, at
|
|
the source location.
|
|
|
|
Arguments:
|
|
|
|
None.
|
|
|
|
Return Value:
|
|
|
|
TRUE if the source location appears valid
|
|
|
|
--*/
|
|
{
|
|
TCHAR FileName[MAX_PATH];
|
|
WIN32_FIND_DATA fd;
|
|
|
|
if (FAILED (StringCchCopy (FileName, ARRAYSIZE(FileName), NativeSourcePaths[0])) ||
|
|
!ConcatenatePaths(FileName, InfName, ARRAYSIZE(FileName))) {
|
|
|
|
return FALSE;
|
|
}
|
|
|
|
if (!FileExists( FileName, &fd) || (fd.dwFileAttributes & FILE_ATTRIBUTE_DIRECTORY)) {
|
|
return FALSE;
|
|
}
|
|
//
|
|
// also look for system32\ntdll.dll as a second check
|
|
//
|
|
if (FAILED (StringCchCopy (FileName, ARRAYSIZE(FileName), NativeSourcePaths[0])) ||
|
|
!ConcatenatePaths(FileName, TEXT("system32\\ntdll.dll"), ARRAYSIZE(FileName))) {
|
|
return(FALSE);
|
|
}
|
|
|
|
return FileExists( FileName, &fd) && !(fd.dwFileAttributes & FILE_ATTRIBUTE_DIRECTORY);
|
|
}
|
|
|
|
|
|
VOID
|
|
pRemoveOutdatedBackupImage (
|
|
VOID
|
|
)
|
|
{
|
|
REMOVEUNINSTALLIMAGE removeFn;
|
|
HMODULE lib;
|
|
UINT build;
|
|
|
|
//
|
|
// Is this current build > build we plan to install?
|
|
//
|
|
|
|
if (!ISNT() || !Upgrade) {
|
|
return;
|
|
}
|
|
|
|
build = GetMediaProductBuildNumber();
|
|
|
|
if (!build) {
|
|
return;
|
|
}
|
|
|
|
if (build == BuildNumber) {
|
|
return;
|
|
}
|
|
|
|
//
|
|
// Attempt to remove uninstall image
|
|
//
|
|
|
|
lib = LoadLibraryA ("osuninst.dll");
|
|
if (!lib) {
|
|
return;
|
|
}
|
|
|
|
removeFn = (REMOVEUNINSTALLIMAGE) GetProcAddress (lib, "RemoveUninstallImage");
|
|
|
|
if (removeFn) {
|
|
removeFn();
|
|
}
|
|
|
|
FreeLibrary (lib);
|
|
}
|
|
|
|
|
|
BOOL
|
|
GetProductType (
|
|
VOID
|
|
)
|
|
{
|
|
TCHAR buffer[256];
|
|
|
|
if (!FullInfName[0]) {
|
|
if (!FindPathToWinnt32File (InfName, FullInfName, ARRAYSIZE(InfName))) {
|
|
FullInfName[0] = 0;
|
|
return FALSE;
|
|
}
|
|
}
|
|
//
|
|
// get some data from the main inf
|
|
//
|
|
if (!GetPrivateProfileString (
|
|
TEXT("Miscellaneous"),
|
|
TEXT("ProductType"),
|
|
TEXT(""),
|
|
buffer,
|
|
ARRAYSIZE(buffer),
|
|
FullInfName
|
|
)) {
|
|
DebugLog (
|
|
Winnt32LogError,
|
|
TEXT("%1 key in [%2] section is missing from %3; aborting operation"),
|
|
0,
|
|
TEXT("ProductType"),
|
|
TEXT("Miscellaneous"),
|
|
FullInfName
|
|
);
|
|
return FALSE;
|
|
}
|
|
// Test for valid product type (0 == pro, 6 == sbs)
|
|
if (buffer[0] < TEXT('0') || buffer[0] > TEXT('6') || buffer[1]) {
|
|
DebugLog (
|
|
Winnt32LogError,
|
|
TEXT("Invalid %1 value (%2) in %3"),
|
|
0,
|
|
TEXT("ProductType"),
|
|
buffer,
|
|
FullInfName
|
|
);
|
|
return FALSE;
|
|
}
|
|
|
|
ProductFlavor = buffer[0] - TEXT('0');
|
|
Server = (ProductFlavor != PROFESSIONAL_PRODUCTTYPE && ProductFlavor != PERSONAL_PRODUCTTYPE);
|
|
UpgradeProductType = Server ? NT_SERVER : NT_WORKSTATION;
|
|
return TRUE;
|
|
}
|
|
|
|
|
|
UINT
|
|
GetMediaProductBuildNumber (
|
|
VOID
|
|
)
|
|
{
|
|
TCHAR buffer[256];
|
|
PCTSTR p;
|
|
PTSTR q;
|
|
UINT build;
|
|
|
|
if (!FullInfName[0]) {
|
|
if (!FindPathToWinnt32File (InfName, FullInfName, MAX_PATH)) {
|
|
return 0;
|
|
}
|
|
}
|
|
//
|
|
// get some data from the main inf
|
|
//
|
|
if (!GetPrivateProfileString (
|
|
TEXT("Version"),
|
|
TEXT("DriverVer"),
|
|
TEXT(""),
|
|
buffer,
|
|
ARRAYSIZE(buffer),
|
|
FullInfName
|
|
)) {
|
|
DebugLog (
|
|
Winnt32LogError,
|
|
TEXT("Version key in [DriverVer] section is missing from %1; aborting operation"),
|
|
0,
|
|
FullInfName
|
|
);
|
|
return 0;
|
|
}
|
|
|
|
p = _tcschr (buffer, TEXT(','));
|
|
if (p) {
|
|
//
|
|
// p should point to ",<major>.<minor>.<build>.0" -- extract <build>
|
|
//
|
|
|
|
p = _tcschr (p + 1, TEXT('.'));
|
|
if (p) {
|
|
p = _tcschr (p + 1, TEXT('.'));
|
|
if (p) {
|
|
p = _tcsinc (p);
|
|
q = _tcschr (p, TEXT('.'));
|
|
if (q) {
|
|
*q = 0;
|
|
} else {
|
|
p = NULL;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
if (p) {
|
|
build = _tcstoul (p, &q, 10);
|
|
if (*q) {
|
|
p = NULL;
|
|
}
|
|
}
|
|
|
|
if (!p || build < NT51B2) {
|
|
DebugLog (
|
|
Winnt32LogError,
|
|
TEXT("Unexpected data %1, found in Version key in [DriverVer] section of %2; aborting operation"),
|
|
0,
|
|
buffer,
|
|
FullInfName
|
|
);
|
|
return 0;
|
|
}
|
|
|
|
return build;
|
|
}
|
|
|
|
typedef HANDLE (WINAPI * PWINSTATIONOPENSERVERW)(LPWSTR);
|
|
typedef BOOLEAN (WINAPI * PWINSTATIONCLOSESERVER)(HANDLE);
|
|
|
|
|
|
UINT GetLoggedOnUserCount()
|
|
{
|
|
UINT iCount = 0;
|
|
HMODULE hwinsta;
|
|
PWINSTATIONOPENSERVERW pfnWinStationOpenServerW;
|
|
PWINSTATIONENUMERATEW pfnWinStationEnumerateW;
|
|
PWINSTATIONFREEMEMORY pfnWinStationFreeMemory;
|
|
PWINSTATIONCLOSESERVER pfnWinStationCloseServer;
|
|
|
|
/*
|
|
* Get handle to winsta.dll
|
|
*/
|
|
hwinsta = LoadLibraryA("WINSTA");
|
|
if (hwinsta != NULL)
|
|
{
|
|
pfnWinStationOpenServerW = (PWINSTATIONOPENSERVERW)GetProcAddress(hwinsta, "WinStationOpenServerW");
|
|
pfnWinStationEnumerateW = (PWINSTATIONENUMERATEW)GetProcAddress(hwinsta, "WinStationEnumerateW");
|
|
pfnWinStationFreeMemory = (PWINSTATIONFREEMEMORY)GetProcAddress(hwinsta, "WinStationFreeMemory");
|
|
pfnWinStationCloseServer = (PWINSTATIONCLOSESERVER)GetProcAddress(hwinsta, "WinStationCloseServer");
|
|
|
|
if (pfnWinStationOpenServerW &&
|
|
pfnWinStationEnumerateW &&
|
|
pfnWinStationFreeMemory &&
|
|
pfnWinStationCloseServer)
|
|
{
|
|
HANDLE hServer;
|
|
|
|
// Open a connection to terminal services and get the number of sessions.
|
|
hServer = pfnWinStationOpenServerW((LPWSTR)SERVERNAME_CURRENT);
|
|
if (hServer != NULL)
|
|
{
|
|
PLOGONIDW pLogonIDs;
|
|
ULONG ulEntries;
|
|
|
|
if (pfnWinStationEnumerateW(hServer, &pLogonIDs, &ulEntries))
|
|
{
|
|
ULONG ul;
|
|
PLOGONIDW pLogonID;
|
|
|
|
/*
|
|
* Iterate the sessions looking for active and disconnected sessions only.
|
|
* Then match the user name and domain (case INsensitive) for a result.
|
|
*/
|
|
for (ul = 0, pLogonID = pLogonIDs; ul < ulEntries; ul++, pLogonID++)
|
|
{
|
|
if ((pLogonID->State == State_Active) ||
|
|
(pLogonID->State == State_Disconnected) ||
|
|
(pLogonID->State == State_Shadow))
|
|
{
|
|
iCount++;
|
|
}
|
|
}
|
|
|
|
/*
|
|
* Free any resources used.
|
|
*/
|
|
pfnWinStationFreeMemory(pLogonIDs);
|
|
}
|
|
|
|
pfnWinStationCloseServer(hServer);
|
|
}
|
|
}
|
|
|
|
FreeLibrary(hwinsta);
|
|
}
|
|
|
|
return iCount;
|
|
}
|
|
|
|
// From winuser.h, but since we cannot define WINVER >= 0x0500 I copied it here.
|
|
#define SM_REMOTESESSION 0x1000
|
|
|
|
BOOL DisplayExitWindowsWarnings(uExitWindowsFlags)
|
|
{
|
|
BOOL bRet = TRUE;
|
|
BOOL fIsRemote = GetSystemMetrics(SM_REMOTESESSION);
|
|
UINT iNumUsers = GetLoggedOnUserCount();
|
|
UINT uID = 0;
|
|
|
|
switch (uExitWindowsFlags)
|
|
{
|
|
case EWX_POWEROFF:
|
|
case EWX_SHUTDOWN:
|
|
{
|
|
if (fIsRemote)
|
|
{
|
|
// We are running as part of a terminal server session
|
|
if (iNumUsers > 1)
|
|
{
|
|
// Warn the user if remote shut down w/ active users
|
|
uID = IDS_SHUTDOWN_REMOTE_OTHERUSERS;
|
|
}
|
|
else
|
|
{
|
|
// Warn the user if remote shut down (won't be able to restart via TS client!)
|
|
uID = IDS_SHUTDOWN_REMOTE;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
if (iNumUsers > 1)
|
|
{
|
|
// Warn the user if more than one user session active
|
|
uID = IDS_SHUTDOWN_OTHERUSERS;
|
|
}
|
|
}
|
|
}
|
|
break;
|
|
|
|
case EWX_REBOOT:
|
|
{
|
|
// Warn the user if more than one user session active.
|
|
if (iNumUsers > 1)
|
|
{
|
|
uID = IDS_RESTART_OTHERUSERS;
|
|
}
|
|
}
|
|
break;
|
|
}
|
|
|
|
if (uID != 0)
|
|
{
|
|
TCHAR szTitle[MAX_PATH] = TEXT("");
|
|
TCHAR szMessage[MAX_PATH] = TEXT("");
|
|
|
|
LoadString(hInst, IDS_APPTITLE, szTitle, sizeof(szTitle)/sizeof(szTitle[0]));
|
|
LoadString(hInst, uID, szMessage, sizeof(szMessage)/sizeof(szMessage[0]));
|
|
|
|
if (MessageBox(NULL,
|
|
szMessage,
|
|
szTitle,
|
|
MB_ICONEXCLAMATION | MB_YESNO | MB_SYSTEMMODAL | MB_SETFOREGROUND) == IDNO)
|
|
{
|
|
bRet = FALSE;
|
|
}
|
|
}
|
|
|
|
return bRet;
|
|
}
|
|
|
|
#define SETUP_MEMORY_MIN_REQUIREMENT ((ULONG_PTR)(50<<20)) //50MB
|
|
#define SETUP_DISK_MIN_REQUIREMENT ((ULONG_PTR)(70<<20)) //70MB
|
|
|
|
BOOL
|
|
pIsEnoughVMAndDiskSpace(
|
|
OUT ULARGE_INTEGER * OutRemainFreeSpace, OPTIONAL
|
|
IN BOOL bCheckOnlyRAM OPTIONAL
|
|
)
|
|
{
|
|
PVOID pMemory;
|
|
TCHAR winDir[MAX_PATH];
|
|
TCHAR winDrive[] = TEXT("?:\\");
|
|
ULARGE_INTEGER RemainFreeSpace = {0, 0};
|
|
DWORD sectorPerCluster;
|
|
DWORD bytesPerSector;
|
|
ULARGE_INTEGER numberOfFreeClusters = {0, 0};
|
|
ULARGE_INTEGER totalNumberOfClusters = {0, 0};
|
|
BOOL bResult = TRUE;
|
|
|
|
|
|
if(OutRemainFreeSpace){
|
|
OutRemainFreeSpace->QuadPart = 0;
|
|
}
|
|
|
|
|
|
|
|
pMemory = VirtualAlloc(NULL, SETUP_MEMORY_MIN_REQUIREMENT, MEM_COMMIT, PAGE_NOACCESS);
|
|
if(!pMemory){
|
|
return FALSE;
|
|
}
|
|
|
|
if(!bCheckOnlyRAM){
|
|
if (!MyGetWindowsDirectory(winDir, ARRAYSIZE(winDir))) {
|
|
bResult = FALSE;
|
|
goto exit;
|
|
}
|
|
|
|
winDrive[0] = winDir[0];
|
|
bCheckOnlyRAM = GetDriveType(winDrive) != DRIVE_FIXED;
|
|
}
|
|
if(!bCheckOnlyRAM){
|
|
if(Winnt32GetDiskFreeSpaceNew(winDrive,
|
|
§orPerCluster,
|
|
&bytesPerSector,
|
|
&numberOfFreeClusters,
|
|
&totalNumberOfClusters)){
|
|
|
|
RemainFreeSpace.QuadPart = sectorPerCluster * bytesPerSector;
|
|
RemainFreeSpace.QuadPart *= numberOfFreeClusters.QuadPart;
|
|
|
|
if(OutRemainFreeSpace){
|
|
OutRemainFreeSpace->QuadPart = RemainFreeSpace.QuadPart;
|
|
}
|
|
|
|
if(RemainFreeSpace.QuadPart < SETUP_DISK_MIN_REQUIREMENT){
|
|
bResult = FALSE;
|
|
}
|
|
}
|
|
else{
|
|
MYASSERT(FALSE);
|
|
}
|
|
|
|
}
|
|
|
|
exit:
|
|
VirtualFree(pMemory, SETUP_MEMORY_MIN_REQUIREMENT, MEM_DECOMMIT);
|
|
|
|
|
|
return bResult;
|
|
}
|
|
|
|
|
|
LPTOP_LEVEL_EXCEPTION_FILTER pLastExceptionFilter = NULL;
|
|
|
|
LONG MyFilter(EXCEPTION_POINTERS *pep)
|
|
{
|
|
static BOOL fGotHere = FALSE;
|
|
PSETUP_FAULT_HANDLER pSetupFH = NULL;
|
|
HMODULE hmodFaultRep = NULL;
|
|
PFAULTHCreate pfnCreate = NULL;
|
|
PFAULTHDelete pfnDelete = NULL;
|
|
DWORD dwRetRep = EXCEPTION_CONTINUE_SEARCH;
|
|
DWORD dwLength;
|
|
TCHAR faulthDllPath[MAX_PATH];
|
|
TCHAR additionalFiles[DW_MAX_ADDFILES];
|
|
TCHAR title[DW_MAX_ERROR_CWC];
|
|
TCHAR errortext[DW_MAX_ERROR_CWC];
|
|
TCHAR lcid[10];
|
|
LCID dwlcid;
|
|
|
|
|
|
if( fGotHere) {
|
|
goto c0;
|
|
}
|
|
|
|
fGotHere = TRUE;
|
|
// No way to upload then quit
|
|
if( !IsNetConnectivityAvailable()) {
|
|
DebugLog (Winnt32LogWarning, TEXT("Warning: Faulthandler did not find netconnectivity."), 0);
|
|
goto c0;
|
|
}
|
|
|
|
if( !FindPathToWinnt32File( TEXT(SETUP_FAULTH_APPNAME),faulthDllPath,ARRAYSIZE(faulthDllPath))) {
|
|
DebugLog (Winnt32LogWarning, TEXT("Warning: Could not find faulthandler %1"), 0, TEXT(SETUP_FAULTH_APPNAME));
|
|
goto c0;
|
|
}
|
|
|
|
additionalFiles[0] = TEXT('0');
|
|
//The buffer size should be able to hold both files. Be careful when adding more!
|
|
MYASSERT( 2*MAX_PATH < ARRAYSIZE(additionalFiles));
|
|
|
|
if (MyGetWindowsDirectory (additionalFiles, ARRAYSIZE(additionalFiles))) {
|
|
ConcatenatePaths (additionalFiles, S_WINNT32LOGFILE, ARRAYSIZE(additionalFiles));
|
|
}
|
|
dwLength = lstrlen( additionalFiles);
|
|
|
|
// Check for case where we could not get winnt32.log
|
|
if( dwLength > 0) {
|
|
dwLength++; //Reserve space for pipe
|
|
}
|
|
|
|
if (MyGetWindowsDirectory (additionalFiles+dwLength, ARRAYSIZE(additionalFiles)-dwLength)) {
|
|
ConcatenatePaths (additionalFiles+dwLength, S_DEFAULT_NT_COMPAT_FILENAME, ARRAYSIZE(additionalFiles)-dwLength);
|
|
// If we at least got the first file then add the separator.
|
|
if( dwLength) {
|
|
additionalFiles[dwLength-1] = TEXT('|');
|
|
}
|
|
}
|
|
|
|
hmodFaultRep = LoadLibrary(faulthDllPath);
|
|
|
|
if (hmodFaultRep == NULL) {
|
|
DebugLog (Winnt32LogError, TEXT("Error: Could not load faulthandler %1."), 0, TEXT(SETUP_FAULTH_APPNAME));
|
|
goto c0;
|
|
}
|
|
|
|
pfnCreate = (PFAULTHCreate)GetProcAddress(hmodFaultRep, FAULTH_CREATE_NAME);
|
|
pfnDelete = (PFAULTHDelete)GetProcAddress(hmodFaultRep, FAULTH_DELETE_NAME);
|
|
if (pfnCreate == NULL || pfnDelete == NULL) {
|
|
DebugLog (Winnt32LogError, TEXT("Error: Could not get faulthandler exports."), 0);
|
|
goto c0;
|
|
}
|
|
|
|
pSetupFH = (*pfnCreate)();
|
|
|
|
if( pSetupFH == NULL) {
|
|
DebugLog (Winnt32LogError, TEXT("Error: Could not get faulthandler object."), 0);
|
|
goto c0;
|
|
}
|
|
|
|
if( pSetupFH->IsSupported(pSetupFH) == FALSE) {
|
|
DebugLog (Winnt32LogError, TEXT("Error: Dr Watson not supported."), 0);
|
|
goto c0;
|
|
}
|
|
|
|
title[0] = TEXT('\0');
|
|
lcid[0] = TEXT('\0');
|
|
errortext[0] = TEXT('\0');
|
|
LoadString(hInst, IDS_APPTITLE, title, sizeof(title)/sizeof(title[0]));
|
|
LoadString(hInst, IDS_DRWATSON_ERRORTEXT, errortext, sizeof(errortext)/sizeof(errortext[0]));
|
|
LoadString(hInst, IDS_DRWATSON_LCID, lcid, sizeof(lcid)/sizeof(lcid[0]));
|
|
if( !StringToInt( lcid, &dwlcid)) {
|
|
dwlcid = 1033;
|
|
}
|
|
|
|
pSetupFH->SetLCID(pSetupFH, dwlcid);
|
|
pSetupFH->SetURLA(pSetupFH, SETUP_URL);
|
|
#ifdef UNICODE
|
|
pSetupFH->SetAdditionalFilesW(pSetupFH, additionalFiles);
|
|
pSetupFH->SetAppNameW(pSetupFH, title);
|
|
pSetupFH->SetErrorTextW(pSetupFH, errortext);
|
|
#else
|
|
pSetupFH->SetAdditionalFilesA(pSetupFH, additionalFiles);
|
|
pSetupFH->SetAppNameA(pSetupFH, title);
|
|
pSetupFH->SetErrorTextA(pSetupFH, errortext);
|
|
#endif
|
|
CloseDebugLog(); //Close log file or else it cannot be uploaded.
|
|
dwRetRep = pSetupFH->Report(pSetupFH, pep, 0);
|
|
|
|
(*pfnDelete)(pSetupFH);
|
|
|
|
// Pass the error to the default unhandled exception handler
|
|
// which will terminate the process.
|
|
|
|
dwRetRep = EXCEPTION_EXECUTE_HANDLER;
|
|
|
|
c0:
|
|
if (hmodFaultRep != NULL) {
|
|
FreeLibrary(hmodFaultRep);
|
|
}
|
|
SetUnhandledExceptionFilter( pLastExceptionFilter);
|
|
return dwRetRep;
|
|
}
|
|
|
|
#ifdef TEST_EXCEPTION
|
|
struct {
|
|
DWORD dwException;
|
|
DWORD dwSetupArea;
|
|
} exceptionInfo;
|
|
|
|
void DoException( DWORD dwSetupArea)
|
|
{
|
|
TCHAR _testBuffer[10];
|
|
TCHAR *_ptestCh = 0;
|
|
|
|
if( exceptionInfo.dwSetupArea == dwSetupArea) {
|
|
switch( exceptionInfo.dwException) {
|
|
case 1:
|
|
*_ptestCh = TEXT('1');
|
|
MessageBox(NULL,TEXT("Exception not hit!"),TEXT("Access violation"),MB_OK);
|
|
break;
|
|
case 2:
|
|
{
|
|
DWORD i;
|
|
for( i =0; i < 0xffffffff;i++) {
|
|
_testBuffer[i] = TEXT('1');
|
|
|
|
}
|
|
}
|
|
MessageBox(NULL,TEXT("Exception not hit!"),TEXT("Buffer Overflow"),MB_OK);
|
|
break;
|
|
case 3:
|
|
{
|
|
LPVOID pv;
|
|
DWORD i;
|
|
|
|
for (i = 0; i < 0xffffffff; i++) {
|
|
pv = MALLOC(2048);
|
|
}
|
|
}
|
|
MessageBox(NULL,TEXT("Exception not hit!"),TEXT("Stack Overflow"),MB_OK);
|
|
break;
|
|
case 4:
|
|
{
|
|
typedef DWORD (*FAULT_FN)(void);
|
|
FAULT_FN pfn;
|
|
BYTE rgc[2048];
|
|
|
|
FillMemory(rgc, sizeof(rgc), 0);
|
|
pfn = (FAULT_FN)(DWORD_PTR)rgc;
|
|
(*pfn)();
|
|
}
|
|
MessageBox(NULL,TEXT("Exception not hit!"),TEXT("Invalid Instruction"),MB_OK);
|
|
break;
|
|
case 5:
|
|
for(;dwSetupArea;dwSetupArea--) ;
|
|
exceptionInfo.dwSetupArea = 4/dwSetupArea;
|
|
MessageBox(NULL,TEXT("Exception not hit!"),TEXT("Divide by zero"),MB_OK);
|
|
break;
|
|
default:
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
|
|
void GetTestException( void)
|
|
{
|
|
TCHAR exceptionType[32];
|
|
TCHAR exceptionSetupArea[32];
|
|
|
|
exceptionType[0] = TEXT('\0');
|
|
exceptionSetupArea[0] = TEXT('\0');
|
|
exceptionInfo.dwException = 0;
|
|
exceptionInfo.dwSetupArea = 0;
|
|
|
|
GetPrivateProfileString( TEXT("Exception"),
|
|
TEXT("ExceptionType"),
|
|
TEXT("none"),
|
|
exceptionType,
|
|
sizeof(exceptionType)/sizeof(exceptionType[0]),
|
|
TEXT("c:\\except.inf"));
|
|
|
|
GetPrivateProfileString( TEXT("Exception"),
|
|
TEXT("ExceptionSetupArea"),
|
|
TEXT("none"),
|
|
exceptionSetupArea,
|
|
sizeof(exceptionSetupArea)/sizeof(exceptionSetupArea[0]),
|
|
TEXT("c:\\except.inf"));
|
|
|
|
StringToInt( exceptionType, &exceptionInfo.dwException);
|
|
StringToInt( exceptionSetupArea, &exceptionInfo.dwSetupArea);
|
|
}
|
|
|
|
#endif
|
|
|
|
HRESULT WriteEncryptedPIDtoUnattend(LPTSTR szPID)
|
|
{
|
|
HRESULT hr = E_FAIL;
|
|
LPTSTR szLine = NULL;
|
|
HANDLE hFile;
|
|
|
|
szLine = GlobalAlloc(GPTR, (lstrlen(szPID) + 3)*sizeof(TCHAR)); // + 3 for 2 " and \0
|
|
if (szLine)
|
|
{
|
|
wsprintf(szLine, TEXT("\"%s\""), szPID);
|
|
if (WritePrivateProfileString(WINNT_USERDATA, WINNT_US_PRODUCTKEY, szLine, UnattendedScriptFile) &&
|
|
WritePrivateProfileString(WINNT_USERDATA, WINNT_US_PRODUCTID, NULL, UnattendedScriptFile))
|
|
{
|
|
hr = S_OK;
|
|
}
|
|
else
|
|
{
|
|
// Error message, Unable to write
|
|
if (!g_Quiet)
|
|
{
|
|
MessageBoxFromMessage(
|
|
NULL,
|
|
MSG_WRITE_FAILURE_UNATTEND,
|
|
FALSE,
|
|
AppTitleStringId,
|
|
MB_OK | MB_ICONINFORMATION | MB_TASKMODAL
|
|
);
|
|
}
|
|
}
|
|
GlobalFree(szLine);
|
|
if (hr == S_OK)
|
|
{
|
|
hFile = CreateFile(UnattendedScriptFile,
|
|
GENERIC_READ | GENERIC_WRITE,
|
|
0,
|
|
NULL,
|
|
OPEN_EXISTING,
|
|
FILE_ATTRIBUTE_NORMAL,
|
|
NULL);
|
|
if (hFile != INVALID_HANDLE_VALUE)
|
|
{
|
|
SYSTEMTIME st;
|
|
FILETIME ft;
|
|
ZeroMemory(&st, sizeof(st));
|
|
st.wDay = 1;
|
|
st.wMonth = 4;
|
|
st.wYear = 2002;
|
|
|
|
SystemTimeToFileTime(&st, &ft); // converts to file time format
|
|
LocalFileTimeToFileTime(&ft, &ft); // Make sure we get this as UTC
|
|
SetFileTime(hFile, &ft, &ft, &ft); // Set it.
|
|
CloseHandle(hFile);
|
|
}
|
|
}
|
|
}
|
|
return hr;
|
|
}
|
|
|
|
DWORD
|
|
winnt32 (
|
|
IN PCSTR LocalSourcePath, OPTIONAL
|
|
IN HWND Dlg, OPTIONAL
|
|
IN HANDLE WinNT32Stub, OPTIONAL
|
|
OUT PCSTR* RestartCmdLine OPTIONAL
|
|
)
|
|
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
winnt32 is the main setup routine.
|
|
|
|
Arguments:
|
|
|
|
LocalSourcePath - Specifies the local path of installation in case
|
|
this DLL is running from a local directory
|
|
after download; always ANSI if not NULL
|
|
|
|
Dlg - Specifies the handle of the welcome dialog displayed by
|
|
the stub; it will stay on screen untill the wizard dialog
|
|
appears; may be NULL
|
|
|
|
WinNT32Stub - Specifies the handle of an event that will be
|
|
signaled before the Wizard appears on the screen;
|
|
may be NULL
|
|
|
|
RestartCmdLine - Receives a pointer to a command line to be executed
|
|
by the caller after this function returns;
|
|
always ANSI
|
|
|
|
Return Value:
|
|
|
|
none
|
|
|
|
--*/
|
|
|
|
{
|
|
HMODULE SMSHandle = NULL;
|
|
SMSPROC InstallStatusMIF = NULL;
|
|
HANDLE Mutex;
|
|
BOOL b;
|
|
TCHAR Text[MAX_PATH];
|
|
PCTSTR Footer;
|
|
DWORD i;
|
|
BOOL rc = ERROR_SUCCESS;
|
|
BOOL bScreenSaverOn = FALSE;
|
|
PCTSTR skuPersonal;
|
|
#if !defined(UNICODE)
|
|
ULARGE_INTEGER RemainFreeSpace;
|
|
#endif
|
|
#ifdef UNICODE
|
|
PTSTR privName[COUNT_OF_PRIVILEGES];
|
|
DWORD privSize[COUNT_OF_PRIVILEGES];
|
|
DWORD langId[COUNT_OF_PRIVILEGES];
|
|
#endif
|
|
|
|
|
|
#ifdef TEST_EXCEPTION
|
|
GetTestException();
|
|
DoException( 1);
|
|
#endif
|
|
|
|
// Initialize these variables because the exceptionfilter calls FindPathToWinnt32File
|
|
#ifndef UNICODE
|
|
//
|
|
// if running on Win9x, there may be a LocalSourcePath passed as parameter
|
|
// use that
|
|
//
|
|
g_LocalSourcePath = LocalSourcePath;
|
|
#endif
|
|
|
|
AlternateSourcePath[0] = 0;
|
|
g_DynUpdtStatus = NULL;
|
|
SourceCount = 0;
|
|
pLastExceptionFilter = SetUnhandledExceptionFilter(MyFilter);
|
|
|
|
|
|
#ifdef TEST_EXCEPTION
|
|
DoException( 2);
|
|
#endif
|
|
|
|
SetErrorMode(SEM_FAILCRITICALERRORS);
|
|
|
|
|
|
InitCommonControls();
|
|
|
|
#if !defined(UNICODE)
|
|
//
|
|
// Check virtual memory requirements (only for regular Win9x winnt32 execution)
|
|
//
|
|
if(!IsWinPEMode()){
|
|
RemainFreeSpace.QuadPart = 0;
|
|
if(!pIsEnoughVMAndDiskSpace(&RemainFreeSpace, FALSE)){
|
|
if(!RemainFreeSpace.QuadPart){
|
|
MessageBoxFromMessage(
|
|
NULL,
|
|
MSG_OUT_OF_MEMORY,
|
|
FALSE,
|
|
AppTitleStringId,
|
|
MB_OK | MB_ICONERROR | MB_TASKMODAL
|
|
);
|
|
}
|
|
else{
|
|
MessageBoxFromMessage(
|
|
NULL,
|
|
MSG_COPY_ERROR_DISKFULL,
|
|
FALSE,
|
|
AppTitleStringId,
|
|
MB_OK | MB_ICONERROR | MB_TASKMODAL
|
|
);
|
|
}
|
|
rc = -1;
|
|
goto EXITNOW;
|
|
}
|
|
}
|
|
#endif
|
|
if(GetModuleHandle(ShimEngine_ModuleName)){
|
|
MessageBoxFromMessage(
|
|
NULL,
|
|
MSG_RUNNING_UNDER_COMPATIBILITY,
|
|
FALSE,
|
|
AppTitleStringId,
|
|
MB_OK | MB_ICONERROR | MB_TASKMODAL
|
|
);
|
|
rc = -1;
|
|
goto EXITNOW;
|
|
}
|
|
|
|
//
|
|
// Init Dynamic update status
|
|
//
|
|
g_DynUpdtStatus = MALLOC (sizeof (*g_DynUpdtStatus));
|
|
if (!g_DynUpdtStatus) {
|
|
rc = -1;
|
|
goto EXITNOW;
|
|
}
|
|
|
|
//
|
|
// start with all defaults
|
|
//
|
|
ZeroMemory (g_DynUpdtStatus, sizeof (*g_DynUpdtStatus));
|
|
g_DynUpdtStatus->Connection = INVALID_HANDLE_VALUE;
|
|
|
|
#if defined(REMOTE_BOOT)
|
|
g_DynUpdtStatus->Disabled = TRUE;
|
|
#endif
|
|
|
|
//
|
|
// If we are running WINNT32 under WINPE we disable Dynamic Update as WINPE
|
|
// is primarily for OEM's and Dynamic Update feature is not meant for OEM's
|
|
//
|
|
if (IsWinPEMode()){
|
|
g_DynUpdtStatus->Disabled = TRUE;
|
|
}
|
|
|
|
// Save the screen saver state
|
|
SystemParametersInfo(SPI_GETSCREENSAVEACTIVE, 0, &bScreenSaverOn ,0);
|
|
// Disable the screen saver
|
|
SystemParametersInfo(SPI_SETSCREENSAVEACTIVE, FALSE, NULL ,0);
|
|
//
|
|
// Gather os version info, before we parse arguments
|
|
// since we use ISNT() function
|
|
//
|
|
OsVersion.dwOSVersionInfoSize = sizeof(OSVERSIONINFO);
|
|
GetVersionEx(&OsVersion);
|
|
BuildNumber = OsVersion.dwBuildNumber;
|
|
OsVersionNumber = OsVersion.dwMajorVersion*100 + OsVersion.dwMinorVersion;
|
|
//
|
|
// Parse/check arguments first.
|
|
//
|
|
if (!ParseArguments()) {
|
|
rc = 1;
|
|
goto c0;
|
|
}
|
|
|
|
// if we are running to encrypt the PID into an unattend file, don't log the command line.
|
|
if (!PIDEncryption)
|
|
{
|
|
DebugLog (Winnt32LogInformation, TEXT("The command line is: <%1>"), 0, GetCommandLine ());
|
|
}
|
|
//
|
|
// also log the location of the upgrade module
|
|
//
|
|
if (MyGetModuleFileName (hInst, Text, ARRAYSIZE(Text))) {
|
|
DebugLog (Winnt32LogInformation, TEXT("Main module path: <%1>"), 0, Text);
|
|
}
|
|
|
|
if (CheckUpgradeOnly)
|
|
{
|
|
AppTitleStringId = IDS_APPTITLE_CHECKUPGRADE;
|
|
}
|
|
|
|
//
|
|
// If we didn't get any source paths on the command line,
|
|
// make one up here. The path will be the path where we were run from.
|
|
//
|
|
if(!SourceCount) {
|
|
|
|
PTSTR p;
|
|
|
|
if (!MyGetModuleFileName (NULL, NativeSourcePaths[0],ARRAYSIZE(NativeSourcePaths[0])) ||
|
|
!(p = _tcsrchr (NativeSourcePaths[0], TEXT('\\')))) {
|
|
|
|
rc = 1;
|
|
MessageBoxFromMessage(
|
|
NULL,
|
|
GetLastError(),
|
|
TRUE,
|
|
AppTitleStringId,
|
|
MB_OK | MB_ICONERROR | MB_TASKMODAL
|
|
);
|
|
|
|
goto c1;
|
|
}
|
|
|
|
//
|
|
// check if running from a private build
|
|
//
|
|
*p = 0;
|
|
if ((p = _tcsrchr (NativeSourcePaths[0], TEXT('\\'))) != NULL &&
|
|
lstrcmpi (p + 1, INTERNAL_WINNT32_DIR) == 0
|
|
) {
|
|
*p = 0;
|
|
}
|
|
|
|
SourceCount = 1;
|
|
}
|
|
|
|
|
|
//
|
|
// setup the SourcePaths array from the legacy source paths array
|
|
//
|
|
for (i = 0; i < MAX_SOURCE_COUNT; i++) {
|
|
if (NativeSourcePaths[i]) {
|
|
LPTSTR p;
|
|
MYASSERT (ARRAYSIZE(SourcePaths[i]) == ARRAYSIZE(NativeSourcePaths[i]));
|
|
lstrcpy(SourcePaths[i], NativeSourcePaths[i]);
|
|
p = _tcsrchr (SourcePaths[i], TEXT('\\'));
|
|
if (p) {
|
|
*++p = TEXT('\0');
|
|
}
|
|
}
|
|
}
|
|
|
|
//
|
|
// Validate the source location
|
|
//
|
|
if (!ValidateSourceLocation()) {
|
|
rc = 1;
|
|
MessageBoxFromMessage(
|
|
NULL,
|
|
MSG_INVALID_SOURCEPATH,
|
|
FALSE,
|
|
IDS_APPTITLE,
|
|
MB_OK | MB_ICONERROR | MB_TASKMODAL,
|
|
NULL );
|
|
goto c0;
|
|
|
|
}
|
|
|
|
//
|
|
//At this point we have the NativeSourcePaths setup and it si safe for operations involving it to be called
|
|
//
|
|
if (PIDEncryption)
|
|
{
|
|
rc = 1;
|
|
if (UnattendedScriptFile)
|
|
{
|
|
BOOL bDontCare, bSelect;
|
|
GetSourceInstallType(0);
|
|
if (ValidatePidEx(ProductId, &bDontCare, &bSelect) && bSelect)
|
|
{
|
|
LPTSTR szEncryptedPID = NULL;
|
|
HRESULT hr = PrepareEncryptedPID(ProductId, PIDDays, &szEncryptedPID);
|
|
if (hr != S_OK)
|
|
{
|
|
DebugLog (Winnt32LogInformation, TEXT("PrepareEncryptedPID failed: <hr=0x%1!lX!>"), 0, hr);
|
|
// Error Excryption failed
|
|
if (!g_Quiet)
|
|
{
|
|
MessageBoxFromMessage(
|
|
NULL,
|
|
MSG_ENCRYPT_FAILURE,
|
|
FALSE,
|
|
AppTitleStringId,
|
|
MB_OK | MB_ICONINFORMATION | MB_TASKMODAL
|
|
);
|
|
}
|
|
}
|
|
else
|
|
{
|
|
if (WriteEncryptedPIDtoUnattend(szEncryptedPID) == S_OK)
|
|
{
|
|
DebugLog (Winnt32LogInformation, TEXT("Encrypted PID succeeded"), 0);
|
|
if (!g_Quiet)
|
|
{
|
|
MessageBoxFromMessage(
|
|
NULL,
|
|
MSG_ENCRYPT_SUCCESS,
|
|
FALSE,
|
|
AppTitleStringId,
|
|
MB_OK | MB_ICONINFORMATION | MB_TASKMODAL
|
|
);
|
|
}
|
|
}
|
|
if (szEncryptedPID)
|
|
{
|
|
GlobalFree(szEncryptedPID);
|
|
}
|
|
rc = 0;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
if (!g_Quiet)
|
|
{
|
|
MessageBoxFromMessage(
|
|
NULL,
|
|
MSG_INVALID_PID,
|
|
FALSE,
|
|
AppTitleStringId,
|
|
MB_OK | MB_ICONINFORMATION | MB_TASKMODAL
|
|
);
|
|
}
|
|
}
|
|
}
|
|
else
|
|
{
|
|
// No unattend switch specified
|
|
if (!g_Quiet)
|
|
{
|
|
MessageBoxFromMessage(
|
|
NULL,
|
|
MSG_ENCRYPT_NOUNATTEND,
|
|
FALSE,
|
|
AppTitleStringId,
|
|
MB_OK | MB_ICONINFORMATION | MB_TASKMODAL
|
|
);
|
|
}
|
|
}
|
|
goto c0;
|
|
}
|
|
|
|
if( RunningBVTs ){
|
|
CopyExtraBVTDirs();
|
|
}
|
|
|
|
if (!DynamicUpdateInitialize ()) {
|
|
DebugLog (
|
|
Winnt32LogError,
|
|
TEXT("DynamicUpdateInitialize failed: no dynamic update processing will be done"),
|
|
0
|
|
);
|
|
g_DynUpdtStatus->Disabled = TRUE;
|
|
}
|
|
|
|
if (!GetProductType()) {
|
|
MessageBoxFromMessage(
|
|
NULL,
|
|
MSG_INVALID_INF_FILE,
|
|
FALSE,
|
|
AppTitleStringId,
|
|
MB_OK | MB_ICONINFORMATION | MB_TASKMODAL,
|
|
FullInfName[0] ? FullInfName : InfName
|
|
);
|
|
rc = 1;
|
|
goto c0;
|
|
}
|
|
|
|
if (!g_DynUpdtStatus->Disabled) {
|
|
if (Winnt32Restarted ()) {
|
|
DebugLog (Winnt32LogWarning, TEXT("\r\n*** Winnt32 restarted ***\r\n"), 0);
|
|
if (g_DynUpdtStatus->RestartAnswerFile[0]) {
|
|
#ifdef PRERELEASE
|
|
TCHAR buf[MAX_PATH];
|
|
if (MyGetWindowsDirectory (buf, ARRAYSIZE(buf))) {
|
|
if (ConcatenatePaths (buf, S_RESTART_TXT, ARRAYSIZE(buf)) &&
|
|
CopyFile (g_DynUpdtStatus->RestartAnswerFile, buf, FALSE)) {
|
|
DebugLog (DynUpdtLogLevel, TEXT("Winnt32 restart file backed up to %1"), 0, buf);
|
|
}
|
|
}
|
|
#endif
|
|
} else {
|
|
DebugLog (DynUpdtLogLevel, TEXT("No restart file is used"), 0);
|
|
}
|
|
}
|
|
}
|
|
|
|
//
|
|
// Init support for SMS.
|
|
//
|
|
try {
|
|
if( SMSHandle = LoadLibrary( TEXT("ISMIF32")) ) {
|
|
InstallStatusMIF = (SMSPROC)GetProcAddress(SMSHandle,"InstallStatusMIF");
|
|
}
|
|
if(LastMessage = MALLOC(1))
|
|
LastMessage[0] = '\0';
|
|
} except(EXCEPTION_EXECUTE_HANDLER) {
|
|
}
|
|
|
|
Winnt32Dlg = Dlg;
|
|
WinNT32StubEvent = WinNT32Stub;
|
|
|
|
// If the user specified /cmdcons (install the recovery consol) , don't show the
|
|
// billboards.
|
|
if (!BuildCmdcons && !CheckUpgradeOnly)
|
|
{
|
|
CreateMainWindow();
|
|
PrepareBillBoard(BackgroundWnd2);
|
|
if (hinstBB)
|
|
{
|
|
if (!LoadString (
|
|
hInst,
|
|
IDS_ESC_TOCANCEL,
|
|
Text,
|
|
ARRAYSIZE(Text)
|
|
)) {
|
|
Text[0] = 0;
|
|
}
|
|
BB_SetInfoText(Text);
|
|
|
|
UpdateWindow (BackgroundWnd2);
|
|
}
|
|
else
|
|
{
|
|
// If we could not load the billboard dll, destroy the backbround window
|
|
// This window is currently only here to catch pressing ESC and forward
|
|
// this to the wizard dialog proc. If the wizard is always visible, this
|
|
// is not needed.
|
|
DestroyWindow(BackgroundWnd2);
|
|
BackgroundWnd2 = NULL;
|
|
}
|
|
}
|
|
if (!LoadString (hInst, IDS_TIMEESTIMATE_UNKNOWN, Text, ARRAYSIZE(Text)))
|
|
{
|
|
Text[0] = 0;
|
|
}
|
|
// BB_SetTimeEstimateText does nothing if the billboard dll is not loaded.
|
|
BB_SetTimeEstimateText((PTSTR)Text);
|
|
|
|
//
|
|
// Only let one of this guy run.
|
|
// account for TS case (make the mutex global)
|
|
//
|
|
#ifdef UNICODE
|
|
_snwprintf (Text, ARRAYSIZE(Text), TEXT("Global\\%s"), TEXT("Winnt32 Is Running"));
|
|
Text[ARRAYSIZE(Text) - 1] = 0;
|
|
Mutex = CreateMutex(NULL,FALSE,Text);
|
|
// NT4 without TS does not support the "Global\Mutex name", make sure that
|
|
// if we could not create the Mutext that the error code is ERROR_PATH_NOT_FOUND
|
|
// If that is the case fall back and use the name with out the Global prefix.
|
|
if ((Mutex == NULL) && (GetLastError() == ERROR_PATH_NOT_FOUND)) {
|
|
#else
|
|
Mutex = NULL;
|
|
if(Mutex == NULL) {
|
|
#endif
|
|
|
|
Mutex = CreateMutex(NULL,FALSE,TEXT("Winnt32 Is Running"));
|
|
if(Mutex == NULL) {
|
|
rc = 1;
|
|
//
|
|
// An error (like out of memory) has occurred.
|
|
// Bail now.
|
|
//
|
|
MessageBoxFromMessage(
|
|
NULL,
|
|
MSG_OUT_OF_MEMORY,
|
|
FALSE,
|
|
AppTitleStringId,
|
|
MB_OK | MB_ICONERROR | MB_TASKMODAL
|
|
);
|
|
|
|
goto c0;
|
|
}
|
|
}
|
|
|
|
//
|
|
// Make sure we are the only process with a handle to our named mutex.
|
|
//
|
|
if ((Mutex == NULL) || (GetLastError() == ERROR_ALREADY_EXISTS)) {
|
|
|
|
rc = 1;
|
|
MessageBoxFromMessage(
|
|
NULL,
|
|
MSG_ALREADY_RUNNING,
|
|
FALSE,
|
|
AppTitleStringId,
|
|
MB_OK | MB_ICONINFORMATION | MB_TASKMODAL
|
|
);
|
|
|
|
goto c1;
|
|
}
|
|
|
|
//
|
|
// Ensure that the user has privilege/access to run this app.
|
|
//
|
|
if(!IsUserAdmin()) {
|
|
|
|
rc = 1;
|
|
MessageBoxFromMessage(
|
|
NULL,
|
|
MSG_NOT_ADMIN,
|
|
FALSE,
|
|
AppTitleStringId,
|
|
MB_OK | MB_ICONSTOP | MB_TASKMODAL
|
|
);
|
|
|
|
goto c1;
|
|
}
|
|
|
|
#ifdef UNICODE
|
|
|
|
rc = 0;
|
|
for (i = 0; i < COUNT_OF_PRIVILEGES; i++) {
|
|
if (!DoesUserHavePrivilege(g_RequiredPrivileges[i])) {
|
|
rc = 1;
|
|
break;
|
|
}
|
|
}
|
|
|
|
if (rc) {
|
|
for (i = 0; i < COUNT_OF_PRIVILEGES; i++) {
|
|
privSize[i] = 0;
|
|
LookupPrivilegeDisplayName (NULL, g_RequiredPrivileges[i], NULL, &privSize[i], &langId[i]);
|
|
privName[i] = MALLOC ((privSize[i] + 1) * sizeof (TCHAR));
|
|
if (privName[i]) {
|
|
privName[i][0] = privName[i][privSize[i]] = 0;
|
|
LookupPrivilegeDisplayName (NULL, g_RequiredPrivileges[i], privName[i], &privSize[i], &langId[i]);
|
|
}
|
|
}
|
|
|
|
MYASSERT (COUNT_OF_PRIVILEGES >= 4);
|
|
MessageBoxFromMessage(
|
|
NULL,
|
|
MSG_PRIVILEGE_NOT_HELD,
|
|
FALSE,
|
|
AppTitleStringId,
|
|
MB_OK | MB_ICONSTOP | MB_TASKMODAL,
|
|
privName[0],
|
|
privName[1],
|
|
privName[2],
|
|
privName[3]
|
|
);
|
|
|
|
goto c1;
|
|
}
|
|
|
|
#endif
|
|
|
|
#if 0
|
|
//
|
|
// Don't run if we're a TS client.
|
|
//
|
|
if( (ISNT()) &&
|
|
(BuildNumber >= NT40) ) {
|
|
|
|
//
|
|
// From winuser.h
|
|
//
|
|
#define SM_REMOTESESSION 0x1000
|
|
|
|
if( GetSystemMetrics(SM_REMOTESESSION) == TRUE ) {
|
|
|
|
rc = 1;
|
|
//
|
|
// Someone is trying to run us inside of a TerminalServer client!!
|
|
// Bail.
|
|
//
|
|
MessageBoxFromMessage(
|
|
NULL,
|
|
MSG_TS_CLIENT_FAIL,
|
|
FALSE,
|
|
IDS_APPTITLE,
|
|
MB_OK | MB_ICONSTOP | MB_TASKMODAL
|
|
);
|
|
|
|
goto c1;
|
|
}
|
|
}
|
|
#endif
|
|
|
|
|
|
//
|
|
// inititialize com
|
|
//
|
|
|
|
CoInitialize(NULL);
|
|
|
|
#if defined(REMOTE_BOOT)
|
|
//
|
|
// Determine whether this is a remote boot client.
|
|
//
|
|
|
|
RemoteBoot = FALSE;
|
|
*MachineDirectory = 0;
|
|
if (ISNT()) {
|
|
HMODULE hModuleKernel32 = LoadLibrary(TEXT("kernel32"));
|
|
if (hModuleKernel32) {
|
|
BOOL (*getSystemInfoEx)(
|
|
IN SYSTEMINFOCLASS dwSystemInfoClass,
|
|
OUT LPVOID lpSystemInfoBuffer,
|
|
IN OUT LPDWORD nSize);
|
|
(FARPROC)getSystemInfoEx = GetProcAddress(
|
|
hModuleKernel32,
|
|
#if defined(UNICODE)
|
|
"GetSystemInfoExW"
|
|
#else
|
|
"GetSystemInfoExA"
|
|
#endif
|
|
);
|
|
if (getSystemInfoEx != NULL) {
|
|
BOOL flag;
|
|
DWORD size = sizeof(BOOL);
|
|
if (getSystemInfoEx(SystemInfoRemoteBoot, &flag, &size)) {
|
|
RemoteBoot = flag;
|
|
size = sizeof(MachineDirectory);
|
|
if (!getSystemInfoEx(
|
|
SystemInfoRemoteBootServerPath,
|
|
MachineDirectory,
|
|
&size)) {
|
|
DWORD error = GetLastError();
|
|
MYASSERT( !"GetSystemInfoExW failed!" );
|
|
} else {
|
|
PTCHAR p;
|
|
p = _tcsrchr(MachineDirectory, TEXT('\\'));
|
|
MYASSERT(p != NULL);
|
|
if (p) {
|
|
*p = 0;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
FreeLibrary(hModuleKernel32);
|
|
}
|
|
}
|
|
#endif // defined(REMOTE_BOOT)
|
|
|
|
|
|
#ifdef _X86_
|
|
|
|
if (IsNEC98 ()) {
|
|
//
|
|
// don't install on NEC98 machines (#141004)
|
|
//
|
|
MessageBoxFromMessage(
|
|
NULL,
|
|
MSG_PLATFORM_NOT_SUPPORTED,
|
|
FALSE,
|
|
AppTitleStringId,
|
|
MB_OK | MB_ICONSTOP | MB_TASKMODAL
|
|
);
|
|
rc = 1;
|
|
goto c1;
|
|
}
|
|
|
|
//
|
|
// Check setup sources and platform.
|
|
// NEC98 NT5 have 98PNTN16.DLL.
|
|
// I use this file for check platform NEC98 or x86.
|
|
//
|
|
{
|
|
|
|
|
|
#define WINNT_NEC98SPECIFIC_MODULE TEXT("98PTN16.DLL")
|
|
|
|
TCHAR MyPath[MAX_PATH];
|
|
int CheckNEC98Sources=FALSE;
|
|
WIN32_FIND_DATA fdata;
|
|
PTSTR p;
|
|
HANDLE h;
|
|
|
|
if( !MyGetModuleFileName (NULL, MyPath, ARRAYSIZE(MyPath)) || !(p=_tcsrchr (MyPath, TEXT('\\')))) {
|
|
rc = 1;
|
|
goto c1;
|
|
}
|
|
p = 0;
|
|
if (ConcatenatePaths (MyPath, WINNT_NEC98SPECIFIC_MODULE, ARRAYSIZE(MyPath)) &&
|
|
(h = FindFirstFile(MyPath, &fdata)) != INVALID_HANDLE_VALUE) {
|
|
|
|
CloseHandle (h);
|
|
CheckNEC98Sources=TRUE;
|
|
}
|
|
|
|
if(CheckNEC98Sources){
|
|
if (!IsNEC98()){
|
|
rc = 1;
|
|
MessageBoxFromMessage(
|
|
NULL,
|
|
MSG_INCORRECT_PLATFORM,
|
|
FALSE,
|
|
AppTitleStringId,
|
|
MB_OK | MB_ICONINFORMATION | MB_TASKMODAL
|
|
);
|
|
|
|
goto c1;
|
|
}
|
|
} else {
|
|
if (IsNEC98()){
|
|
rc = 1;
|
|
MessageBoxFromMessage(
|
|
NULL,
|
|
MSG_INCORRECT_PLATFORM,
|
|
FALSE,
|
|
AppTitleStringId,
|
|
MB_OK | MB_ICONINFORMATION | MB_TASKMODAL
|
|
);
|
|
goto c1;
|
|
}
|
|
}
|
|
}
|
|
|
|
//
|
|
// Some NEC98 Windows NT4 system is installed DMITOOL
|
|
// This AP block the CreateFile API
|
|
// Setup need to check this AP
|
|
//
|
|
if (IsNEC98() && ISNT()){
|
|
if (NEC98CheckDMI() == TRUE){
|
|
rc = 1;
|
|
MessageBoxFromMessage(
|
|
NULL,
|
|
MSG_NEC98_NEED_UNINSTALL_DMITOOL,
|
|
FALSE,
|
|
AppTitleStringId,
|
|
MB_OK | MB_ICONINFORMATION | MB_TASKMODAL
|
|
);
|
|
goto c1;
|
|
}
|
|
}
|
|
|
|
LocateFirstFloppyDrive();
|
|
|
|
//
|
|
// Fix up boot messages.
|
|
// NEC98 FAT16/FAT32 boot code does't have message area.
|
|
//
|
|
if (!IsNEC98())
|
|
{
|
|
if(!PatchTextIntoBootCode()) {
|
|
rc = 1;
|
|
MessageBoxFromMessage(
|
|
NULL,
|
|
MSG_BOOT_TEXT_TOO_LONG,
|
|
FALSE,
|
|
AppTitleStringId,
|
|
MB_OK | MB_ICONERROR | MB_TASKMODAL
|
|
);
|
|
goto c1;
|
|
}
|
|
}
|
|
//
|
|
// Disallow installing/upgrading on a 386 or 486
|
|
// 3.51 and Win9x ran on 386's so this check is still necessary.
|
|
//
|
|
{
|
|
SYSTEM_INFO SysInfo;
|
|
PCTSTR DestinationPlatform;
|
|
|
|
GetSystemInfo(&SysInfo);
|
|
if (SysInfo.dwProcessorType == PROCESSOR_INTEL_386 ||
|
|
SysInfo.dwProcessorType == PROCESSOR_INTEL_486) {
|
|
rc = 1;
|
|
MessageBoxFromMessage(
|
|
NULL,
|
|
MSG_REQUIRES_586,
|
|
FALSE,
|
|
AppTitleStringId,
|
|
MB_OK | MB_ICONINFORMATION | MB_TASKMODAL
|
|
);
|
|
|
|
goto c1;
|
|
}
|
|
|
|
#ifdef UNICODE
|
|
|
|
#ifdef _X86_
|
|
//
|
|
// 32-bit to 64-bit AMD should only be clean install.
|
|
//
|
|
|
|
DestinationPlatform = InfGetFieldByKey(MainInf, TEXT("Miscellaneous"), TEXT("DestinationPlatform"),0);
|
|
|
|
if (lstrcmpi (DestinationPlatform, TEXT("amd64")) == 0)
|
|
{
|
|
Upgrade = FALSE;
|
|
}
|
|
else
|
|
#endif
|
|
|
|
//
|
|
// Disallow amd64 and IA64 machines from running an x86
|
|
// version of winnt32.exe.
|
|
//
|
|
{
|
|
ULONG_PTR p;
|
|
NTSTATUS status;
|
|
|
|
status = NtQueryInformationProcess (
|
|
NtCurrentProcess (),
|
|
ProcessWow64Information,
|
|
&p,
|
|
sizeof (p),
|
|
NULL
|
|
);
|
|
if (NT_SUCCESS (status) && p) {
|
|
|
|
HMODULE hModuleKernel32 = LoadLibrary(TEXT("kernel32"));
|
|
|
|
//
|
|
// 64-bit to 32-bit clean install is allowed on AMD64
|
|
//
|
|
|
|
RtlZeroMemory (&SysInfo, sizeof (SysInfo));
|
|
|
|
if (hModuleKernel32 != NULL) {
|
|
|
|
typedef VOID (WINAPI *PFNGetNativeSystemInfo)(PSYSTEM_INFO);
|
|
PFNGetNativeSystemInfo pfnGetNativeSystemInfo;
|
|
|
|
pfnGetNativeSystemInfo = (PFNGetNativeSystemInfo)GetProcAddress (hModuleKernel32, "GetNativeSystemInfo");
|
|
if (pfnGetNativeSystemInfo != NULL) {
|
|
pfnGetNativeSystemInfo (&SysInfo);
|
|
}
|
|
|
|
FreeLibrary(hModuleKernel32);
|
|
}
|
|
|
|
if (SysInfo.dwProcessorType == PROCESSOR_AMD_X8664) {
|
|
Upgrade = FALSE;
|
|
} else {
|
|
|
|
rc = 1;
|
|
//
|
|
// 32-bit code running on Win64
|
|
//
|
|
|
|
MessageBoxFromMessage(
|
|
NULL,
|
|
MSG_NO_CROSS_PLATFORM,
|
|
FALSE,
|
|
AppTitleStringId,
|
|
MB_OK | MB_ICONINFORMATION | MB_TASKMODAL
|
|
);
|
|
|
|
goto c1;
|
|
}
|
|
}
|
|
}
|
|
#endif
|
|
}
|
|
|
|
#endif // _X86_
|
|
|
|
if (!g_DynUpdtStatus->Disabled) {
|
|
if (g_DynUpdtStatus->PrepareWinnt32) {
|
|
if (!g_DynUpdtStatus->DynamicUpdatesSource[0]) {
|
|
//
|
|
// no share to update was specified
|
|
//
|
|
MessageBoxFromMessage(
|
|
NULL,
|
|
MSG_NO_UPDATE_SHARE,
|
|
FALSE,
|
|
AppTitleStringId,
|
|
MB_OK | MB_ICONSTOP | MB_TASKMODAL
|
|
);
|
|
rc = 1;
|
|
goto c1;
|
|
}
|
|
} else {
|
|
//
|
|
// spec change: even if /unattend is specified, still do DU
|
|
//
|
|
#if 0
|
|
if (UnattendedOperation && !g_DynUpdtStatus->UserSpecifiedUpdates) {
|
|
//
|
|
// if unattended, disable Dynamic Setup page by default
|
|
//
|
|
g_DynUpdtStatus->Disabled = TRUE;
|
|
}
|
|
#endif
|
|
}
|
|
}
|
|
|
|
//
|
|
// Load extension/downlevel DLLs.
|
|
//
|
|
|
|
// Don't load upgrade support if we're running in WinPE.
|
|
//
|
|
if (!IsWinPEMode()) {
|
|
LoadUpgradeSupport();
|
|
}
|
|
else {
|
|
ZeroMemory(&UpgradeSupport, sizeof(UpgradeSupport));
|
|
Upgrade = FALSE;
|
|
}
|
|
|
|
//
|
|
// Load setupapi. Do this *AFTER* we load upgrade support,
|
|
// because one of the upgrade support dlls might link to or load
|
|
// setupapi.dll. That dll might be picky but we can use any old
|
|
// setupapi.dll for what we need.
|
|
//
|
|
if (!LoadSetupapi()) {
|
|
rc = 1;
|
|
goto c1;
|
|
}
|
|
|
|
|
|
#ifdef _X86_
|
|
|
|
//
|
|
// If this is a win9x machine, check to ensure that there are no
|
|
// virus scanners that could block a successful upgrade _or_
|
|
// clean install.
|
|
//
|
|
if (!ISNT() && !SkipVirusScannerCheck && !CheckVirusScanners()) {
|
|
|
|
rc = 1;
|
|
goto c1;
|
|
}
|
|
|
|
#endif
|
|
|
|
if(!IsArc()) {
|
|
#if defined(_AMD64_) || defined(_X86_)
|
|
if(!InitializeArcStuff(NULL)) {
|
|
rc = 1;
|
|
goto c1;
|
|
}
|
|
#endif // defined(_AMD64_) || defined(_X86_)
|
|
} else {
|
|
#ifdef UNICODE // Always true for ARC, never true for Win9x upgrade
|
|
if(!ArcInitializeArcStuff(NULL)) {
|
|
rc = 1;
|
|
goto c1;
|
|
}
|
|
#endif // UNICODE
|
|
} // if (!IsArc())
|
|
|
|
//
|
|
// Don't allow upgrades from early NT 5 builds.
|
|
//
|
|
if( !CheckBuildNumber() ) {
|
|
|
|
MessageBoxFromMessage(
|
|
NULL,
|
|
MSG_CANT_UPGRADE_FROM_BUILD_NUMBER,
|
|
FALSE,
|
|
AppTitleStringId,
|
|
MB_OK | MB_ICONSTOP | MB_TASKMODAL
|
|
);
|
|
|
|
Upgrade = FALSE;
|
|
}
|
|
|
|
#if defined(REMOTE_BOOT)
|
|
//
|
|
// If this is a remote boot client, it MUST upgrade. It cannot install a new
|
|
// version of the OS. If upgrade has been disabled for some reason, stop now.
|
|
//
|
|
|
|
if (RemoteBoot && !Upgrade) {
|
|
rc = 1;
|
|
MessageBoxFromMessage(
|
|
NULL,
|
|
MSG_REQUIRES_UPGRADE,
|
|
FALSE,
|
|
AppTitleStringId,
|
|
MB_OK | MB_ICONINFORMATION | MB_TASKMODAL
|
|
);
|
|
goto c1;
|
|
}
|
|
#endif // defined(REMOTE_BOOT)
|
|
|
|
//if(UnattendedOperation && UnattendedScriptFile && !FetchArguments()) {
|
|
// rc = 1;
|
|
// goto c1;
|
|
//}
|
|
|
|
//
|
|
// Set up various other option defaults.
|
|
//
|
|
InitVariousOptions();
|
|
|
|
|
|
if (!g_DynUpdtStatus->PrepareWinnt32) {
|
|
//
|
|
// Make sure the Source files and target operating system
|
|
// are of the same locale. If they aren't, we'll disable
|
|
// ability to upgrade.
|
|
//
|
|
// Init the locale engine.
|
|
//
|
|
//
|
|
if( InitLanguageDetection( NativeSourcePaths[0], TEXT("intl.inf") ) ) {
|
|
|
|
if( !SkipLocaleCheck && (Upgrade || UpgradeFailureReason) && !IsLanguageMatched) {
|
|
|
|
//
|
|
// Tell the user we can't upgrade then kill his ability to do so.
|
|
//
|
|
MessageBoxFromMessage( NULL,
|
|
MSG_UPGRADE_LANG_ERROR,
|
|
FALSE,
|
|
IDS_APPTITLE,
|
|
MB_OK | MB_ICONERROR | MB_TASKMODAL,
|
|
NULL );
|
|
|
|
Upgrade = FALSE;
|
|
}
|
|
}
|
|
|
|
//
|
|
// Now that we have done the language check, go ahead and see if we have a message
|
|
// to give to the user about why they cannot upgrade.
|
|
//
|
|
if (IsLanguageMatched && UpgradeFailureReason && UpgradeFailureMessages[UpgradeFailureReason]) {
|
|
|
|
//
|
|
// Tell the user we can't upgrade then kill his ability to do so.
|
|
//
|
|
MessageBoxFromMessage( NULL,
|
|
UpgradeFailureMessages[UpgradeFailureReason],
|
|
FALSE,
|
|
IDS_APPTITLE,
|
|
MB_OK | MB_ICONERROR | MB_TASKMODAL,
|
|
NULL );
|
|
|
|
Upgrade = FALSE;
|
|
}
|
|
|
|
|
|
//
|
|
// Check to see if we're on a cluster. If so, and the user
|
|
// didn't specify a tempdrive, then it's possible for us to
|
|
// select a shared disk, which may not be available for us
|
|
// when we come back up into textmode. Warn the user.
|
|
//
|
|
// Note that we need to wait until now because RunFromCD
|
|
// doesn't get set until InitVariousOptions().
|
|
//
|
|
if( ISNT() &&
|
|
(RunFromCD == FALSE) &&
|
|
(!UserSpecifiedLocalSourceDrive) ) {
|
|
int i;
|
|
HMODULE ClusApiHandle;
|
|
FARPROC MyProc;
|
|
HANDLE hCluster;
|
|
BOOL OnCluster = FALSE;
|
|
|
|
try {
|
|
if( ClusApiHandle = LoadLibrary( TEXT("clusapi") ) ) {
|
|
|
|
if( MyProc = GetProcAddress(ClusApiHandle,"OpenCluster")) {
|
|
|
|
hCluster = (HANDLE)MyProc(NULL);
|
|
|
|
if( hCluster != NULL ) {
|
|
//
|
|
// Fire.
|
|
//
|
|
OnCluster = TRUE;
|
|
|
|
if( MyProc = GetProcAddress( ClusApiHandle, "CloseCluster")) {
|
|
MyProc( hCluster );
|
|
}
|
|
}
|
|
}
|
|
|
|
FreeLibrary( ClusApiHandle );
|
|
}
|
|
} except(EXCEPTION_EXECUTE_HANDLER) {
|
|
}
|
|
|
|
if( OnCluster ) {
|
|
i = MessageBoxFromMessage( NULL,
|
|
MSG_CLUSTER_WARNING,
|
|
FALSE,
|
|
IDS_APPTITLE,
|
|
MB_OKCANCEL | MB_ICONEXCLAMATION,
|
|
NULL );
|
|
if(i == IDCANCEL) {
|
|
rc = 1;
|
|
goto c1;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
//
|
|
// setup source install type(retail,oem,or select)
|
|
//
|
|
GetSourceInstallType(0);
|
|
|
|
if (FAILED (StringCchCopy (InstallDir, ARRAYSIZE(InstallDir), DEFAULT_INSTALL_DIR ))) {
|
|
MYASSERT (FALSE);
|
|
}
|
|
|
|
//
|
|
// Create a mutex to serialize error ui.
|
|
//
|
|
UiMutex = CreateMutex(NULL,FALSE,NULL);
|
|
if(!UiMutex) {
|
|
rc = 1;
|
|
MessageBoxFromMessage(
|
|
NULL,
|
|
GetLastError(),
|
|
TRUE,
|
|
AppTitleStringId,
|
|
MB_OK | MB_ICONERROR | MB_TASKMODAL
|
|
);
|
|
|
|
goto c1;
|
|
}
|
|
|
|
//
|
|
// Attempt to disable the PM engine from powering down
|
|
// the machine while the wizard is going. The API we're
|
|
// going to call doesn't exist on all versions of Windows,
|
|
// so manually try and load the entry point. If we fail,
|
|
// so be it.
|
|
//
|
|
{
|
|
typedef EXECUTION_STATE (WINAPI *PTHREADPROC) (IN EXECUTION_STATE esFlags);
|
|
HMODULE Kernel32Handle;
|
|
PTHREADPROC MyProc;
|
|
|
|
if( Kernel32Handle = LoadLibrary( TEXT("kernel32") ) ) {
|
|
|
|
if( MyProc = (PTHREADPROC)GetProcAddress(Kernel32Handle,"SetThreadExecutionState")) {
|
|
|
|
MyProc( ES_SYSTEM_REQUIRED |
|
|
ES_DISPLAY_REQUIRED |
|
|
ES_CONTINUOUS );
|
|
}
|
|
|
|
FreeLibrary( Kernel32Handle );
|
|
}
|
|
}
|
|
|
|
//
|
|
// Go off and do it.
|
|
//
|
|
|
|
if (Winnt32Dlg) {
|
|
DestroyWindow (Winnt32Dlg);
|
|
Winnt32Dlg = NULL;
|
|
}
|
|
if (WinNT32StubEvent) {
|
|
SetEvent (WinNT32StubEvent);
|
|
WinNT32StubEvent = NULL;
|
|
}
|
|
|
|
if( BuildCmdcons ) {
|
|
// if we were told to build a cmdcons boot we do this instead
|
|
if (!IsArc()) {
|
|
#if defined(_AMD64_) || defined(_X86_)
|
|
if (ISNT()) {
|
|
CalcThroughput();
|
|
DoBuildCmdcons();
|
|
} else {
|
|
//
|
|
// We don't support building a cmdcons from Win9x.
|
|
//
|
|
MessageBoxFromMessage( NULL,
|
|
MSG_CMDCONS_WIN9X,
|
|
FALSE,
|
|
IDS_APPTITLE,
|
|
MB_OK | MB_ICONEXCLAMATION,
|
|
NULL );
|
|
|
|
GlobalResult = FALSE;
|
|
}
|
|
#endif
|
|
} else {
|
|
#ifdef UNICODE
|
|
//
|
|
// We don't support building a cmdcons on Alpha platforms.
|
|
//
|
|
MessageBoxFromMessage( NULL,
|
|
MSG_CMDCONS_RISC,
|
|
FALSE,
|
|
IDS_APPTITLE,
|
|
MB_OK | MB_ICONEXCLAMATION,
|
|
NULL );
|
|
GlobalResult = FALSE;
|
|
#endif
|
|
}
|
|
|
|
} else if (g_DynUpdtStatus->PrepareWinnt32) {
|
|
|
|
if (!DynamicUpdateProcessFiles (&b)) {
|
|
MessageBoxFromMessage (
|
|
NULL,
|
|
MSG_PREPARE_SHARE_FAILED,
|
|
FALSE,
|
|
IDS_APPTITLE,
|
|
MB_OK | MB_ICONEXCLAMATION,
|
|
NULL
|
|
);
|
|
rc = 1;
|
|
}
|
|
//
|
|
// clean up stuff
|
|
//
|
|
if (g_DynUpdtStatus->WorkingDir[0]) {
|
|
MyDelnode (g_DynUpdtStatus->WorkingDir);
|
|
}
|
|
|
|
} else {
|
|
if (g_DynUpdtStatus->Disabled) {
|
|
DebugLog (Winnt32LogInformation, NULL, LOG_DYNUPDT_DISABLED);
|
|
}
|
|
CalcThroughput();
|
|
Wizard();
|
|
}
|
|
|
|
//
|
|
// Back from the wizard. Either clean up or shut down, as appropriate.
|
|
//
|
|
if(GlobalResult) {
|
|
|
|
#ifdef _X86_
|
|
MYASSERT (SystemPartitionDriveLetter);
|
|
MarkPartitionActive(SystemPartitionDriveLetter);
|
|
|
|
if(IsNEC98()){
|
|
// If System is NT and NEC98 Driver assign.
|
|
// We need delete registry key "DriveLetter=C" in setupreg.hive
|
|
if (ISNT() && (IsDriveAssignNEC98() == TRUE)){
|
|
DeleteNEC98DriveAssignFlag();
|
|
}
|
|
|
|
//
|
|
// If floppyless setup, set AUTO-BOOT flag in boot sector on NEC98
|
|
//
|
|
if((Floppyless || UnattendedOperation)) {
|
|
SetAutomaticBootselector();
|
|
}
|
|
}
|
|
#endif
|
|
|
|
//
|
|
// Uninstall: blow away existing backup of OS, if we are upgrading to
|
|
// a newer build.
|
|
//
|
|
|
|
pRemoveOutdatedBackupImage();
|
|
|
|
//
|
|
// SMS: report success
|
|
//
|
|
if(InstallStatusMIF) {
|
|
|
|
PSTR Buffer;
|
|
|
|
FormatMessageA(
|
|
FORMAT_MESSAGE_FROM_HMODULE | FORMAT_MESSAGE_ALLOCATE_BUFFER,
|
|
hInst,
|
|
MSG_SMS_SUCCEED,
|
|
0,
|
|
(PSTR)&Buffer,
|
|
0,
|
|
NULL
|
|
);
|
|
|
|
InstallStatusMIF(
|
|
"setupinf",
|
|
"Microsoft",
|
|
"Windows NT",
|
|
"5.0",
|
|
"",
|
|
"",
|
|
Buffer,
|
|
TRUE
|
|
);
|
|
|
|
LocalFree( Buffer );
|
|
}
|
|
|
|
//
|
|
// Close the log if it was open
|
|
//
|
|
|
|
if (fnSetupCloseLog) {
|
|
Footer = GetStringResource (MSG_LOG_END);
|
|
if (Footer) {
|
|
fnSetupOpenLog (FALSE);
|
|
fnSetupLogError (Footer, LogSevInformation);
|
|
FreeStringResource (Footer);
|
|
fnSetupCloseLog();
|
|
}
|
|
|
|
}
|
|
|
|
//
|
|
// Success. Attempt to shut down the system. On NT we have
|
|
// a cool API that does this with a countdown. On Win95 we don't.
|
|
// On NT5 and beyond, we have an even cooler API that takes
|
|
// a reason for shutting down. Don't statically link to it
|
|
// or else this will fall over when run from an NT4 machine.
|
|
//
|
|
if(AutomaticallyShutDown) {
|
|
|
|
#ifdef RUN_SYSPARSE
|
|
DWORD ret;
|
|
// Wait up to 90 seconds for sysparse to finish
|
|
if (!NoSysparse && piSysparse.hProcess) {
|
|
ret = WaitForSingleObject( piSysparse.hProcess, 0);
|
|
if( ret != WAIT_OBJECT_0) {
|
|
DialogBox(
|
|
hInst,
|
|
MAKEINTRESOURCE(IDD_SYSPARSE),
|
|
GetBBhwnd(),
|
|
SysParseDlgProc
|
|
);
|
|
}
|
|
CloseHandle(piSysparse.hProcess);
|
|
CloseHandle(piSysparse.hThread);
|
|
piSysparse.hProcess = NULL;
|
|
}
|
|
#endif
|
|
|
|
//
|
|
// On upgrades we disable System Restore. This saves us space in GUI mode by cleaning out its cache.
|
|
// We do this only at the point where we reboot. In the /noreboot case we decide to ignore this
|
|
// Not many people would run into that as it is a commandline option. The routine chaecks for presence of
|
|
// srclient.dll and only does this on the platforms it is present in.
|
|
//
|
|
|
|
DisableSystemRestore();
|
|
|
|
// reset the screen saver to what we found when we entered winnt32
|
|
// This is in the reboot case
|
|
SystemParametersInfo(SPI_SETSCREENSAVEACTIVE, bScreenSaverOn, NULL,0);
|
|
|
|
if(ISNT()) {
|
|
|
|
HINSTANCE hAdvapi = GetModuleHandle(TEXT("advapi32.dll"));
|
|
PFNINITIATESYSTEMSHUTDOWNEX pfnShutdownEx = NULL;
|
|
LPCSTR lpProcName;
|
|
|
|
if (UnattendedOperation || DisplayExitWindowsWarnings(EWX_REBOOT))
|
|
{
|
|
#ifdef UNICODE
|
|
lpProcName = "InitiateSystemShutdownExW";
|
|
#else
|
|
lpProcName = "InitiateSystemShutdownExA";
|
|
#endif
|
|
|
|
LoadString(hInst,IDS_REBOOT_MESSAGE,Text,ARRAYSIZE(Text));
|
|
|
|
if (hAdvapi) {
|
|
pfnShutdownEx = (PFNINITIATESYSTEMSHUTDOWNEX)
|
|
GetProcAddress(hAdvapi,
|
|
lpProcName);
|
|
}
|
|
|
|
|
|
//
|
|
// We checked up front whether we have the privilege,
|
|
// so getting it should be no problem. If we can't,
|
|
// then just let shutdown fail -- it will tell us why it failed.
|
|
//
|
|
EnablePrivilege(SE_SHUTDOWN_NAME,TRUE);
|
|
|
|
if (pfnShutdownEx) {
|
|
b = pfnShutdownEx(NULL,
|
|
Text,
|
|
UnattendedShutdownTimeout,
|
|
UnattendedShutdownTimeout != 0,
|
|
TRUE,
|
|
SHTDN_REASON_FLAG_PLANNED |
|
|
SHTDN_REASON_MAJOR_OPERATINGSYSTEM |
|
|
(Upgrade ? SHTDN_REASON_MINOR_UPGRADE : SHTDN_REASON_MINOR_INSTALLATION)
|
|
);
|
|
//
|
|
// on 5.1, force a shutdown even if the machine was locked
|
|
// to maintain W2K compatibility
|
|
// only do this if an unattended install was in progress
|
|
//
|
|
if (!b && (GetLastError () == ERROR_MACHINE_LOCKED) && UnattendSwitchSpecified) {
|
|
b = pfnShutdownEx (
|
|
NULL,
|
|
Text,
|
|
0,
|
|
TRUE,
|
|
TRUE,
|
|
SHTDN_REASON_FLAG_PLANNED |
|
|
SHTDN_REASON_MAJOR_OPERATINGSYSTEM |
|
|
(Upgrade ? SHTDN_REASON_MINOR_UPGRADE : SHTDN_REASON_MINOR_INSTALLATION)
|
|
);
|
|
}
|
|
}
|
|
else {
|
|
b = InitiateSystemShutdown(NULL,
|
|
Text,
|
|
UnattendedShutdownTimeout,
|
|
UnattendedShutdownTimeout != 0,
|
|
TRUE);
|
|
}
|
|
}
|
|
} else {
|
|
b = ExitWindowsEx(EWX_REBOOT,0);
|
|
if(!b) {
|
|
b = ExitWindowsEx(EWX_REBOOT | EWX_FORCE,0);
|
|
}
|
|
}
|
|
|
|
if(!b) {
|
|
|
|
rc = 1;
|
|
MessageBoxFromMessageAndSystemError(
|
|
NULL,
|
|
MSG_REBOOT_FAILED,
|
|
GetLastError(),
|
|
AppTitleStringId,
|
|
MB_OK | MB_ICONWARNING | MB_TASKMODAL
|
|
);
|
|
|
|
goto c2;
|
|
}
|
|
}
|
|
} else {
|
|
if (CheckUpgradeOnly) {
|
|
//
|
|
// perform some DU cleanup here since the cleanup routine
|
|
// doesn't get called in /checkupgradeonly mode
|
|
//
|
|
if (g_DynUpdtStatus->ForceRemoveWorkingDir || !g_DynUpdtStatus->PreserveWorkingDir) {
|
|
if (g_DynUpdtStatus->WorkingDir[0] && !g_DynUpdtStatus->RestartWinnt32) {
|
|
MyDelnode (g_DynUpdtStatus->WorkingDir);
|
|
}
|
|
|
|
GetCurrentWinnt32RegKey (Text, ARRAYSIZE(Text));
|
|
if (ConcatenatePaths (Text, WINNT_U_DYNAMICUPDATESHARE, ARRAYSIZE(Text))) {
|
|
RegDeleteKey (HKEY_LOCAL_MACHINE, Text);
|
|
}
|
|
}
|
|
|
|
} else {
|
|
|
|
if (!g_DynUpdtStatus->RestartWinnt32 && !g_DynUpdtStatus->PrepareWinnt32) {
|
|
rc = 1;
|
|
}
|
|
}
|
|
}
|
|
|
|
c2:
|
|
CloseHandle(UiMutex);
|
|
c1:
|
|
//
|
|
// Destroy the mutex.
|
|
//
|
|
CloseHandle(Mutex);
|
|
c0:
|
|
|
|
// reset the screen saver to what we found when we entered winnt32
|
|
// This is if we don't reboot. e.g.: user canceled
|
|
SystemParametersInfo(SPI_SETSCREENSAVEACTIVE, bScreenSaverOn, NULL,0);
|
|
//
|
|
// destroy the welcome dialog if still active
|
|
//
|
|
if (Dlg) {
|
|
DestroyWindow (Dlg);
|
|
Dlg = NULL;
|
|
}
|
|
//
|
|
// and release the original process if launched over a network
|
|
//
|
|
if (WinNT32Stub) {
|
|
SetEvent (WinNT32Stub);
|
|
WinNT32Stub = NULL;
|
|
}
|
|
|
|
if (g_EncryptedPID)
|
|
{
|
|
GlobalFree(g_EncryptedPID);
|
|
g_EncryptedPID = NULL;
|
|
}
|
|
|
|
//
|
|
// SMS: report failure
|
|
//
|
|
if(!GlobalResult && !g_DynUpdtStatus->RestartWinnt32 && InstallStatusMIF) {
|
|
|
|
PSTR Buffer = NULL;
|
|
|
|
FormatMessageA(
|
|
FORMAT_MESSAGE_FROM_HMODULE | FORMAT_MESSAGE_ALLOCATE_BUFFER |
|
|
FORMAT_MESSAGE_ARGUMENT_ARRAY,
|
|
hInst,
|
|
MSG_SMS_FAIL,
|
|
0,
|
|
(PSTR)&Buffer,
|
|
0,
|
|
(va_list *)&LastMessage
|
|
);
|
|
|
|
InstallStatusMIF(
|
|
"setupinf",
|
|
"Microsoft",
|
|
"Windows NT",
|
|
"5.1",
|
|
"",
|
|
"",
|
|
Buffer,
|
|
FALSE
|
|
);
|
|
|
|
LocalFree (Buffer);
|
|
}
|
|
|
|
if(SMSHandle) {
|
|
FreeLibrary( SMSHandle );
|
|
}
|
|
|
|
//
|
|
// Now clean up our debug log if we're only checking
|
|
// the upgrade scenario.
|
|
//
|
|
if( CheckUpgradeOnly ) {
|
|
GatherOtherLogFiles();
|
|
}
|
|
|
|
//
|
|
// Close the debug log.
|
|
//
|
|
CloseDebugLog();
|
|
TerminateBillBoard();
|
|
|
|
if (BackgroundWnd2)
|
|
{
|
|
DestroyWindow (BackgroundWnd2);
|
|
BackgroundWnd2 = NULL;
|
|
}
|
|
if (hinstBB)
|
|
{
|
|
FreeLibrary(hinstBB);
|
|
hinstBB = NULL;
|
|
}
|
|
|
|
if (RestartCmdLine) {
|
|
#ifdef UNICODE
|
|
if (g_DynUpdtStatus->RestartCmdLine) {
|
|
INT i = 0;
|
|
INT size = (lstrlenW (g_DynUpdtStatus->RestartCmdLine) + 1) * sizeof (g_DynUpdtStatus->RestartCmdLine[0]);
|
|
PSTR ansi = HeapAlloc (GetProcessHeap (), 0, size);
|
|
if (ansi) {
|
|
i = WideCharToMultiByte(
|
|
CP_ACP,
|
|
0,
|
|
g_DynUpdtStatus->RestartCmdLine,
|
|
size / sizeof (g_DynUpdtStatus->RestartCmdLine[0]),
|
|
ansi,
|
|
size,
|
|
NULL,
|
|
NULL
|
|
);
|
|
}
|
|
HeapFree (GetProcessHeap (), 0, g_DynUpdtStatus->RestartCmdLine);
|
|
|
|
if (i == 0 && ansi) {
|
|
HeapFree (GetProcessHeap (), 0, ansi);
|
|
ansi = NULL;
|
|
}
|
|
*RestartCmdLine = ansi;
|
|
} else {
|
|
*RestartCmdLine = NULL;
|
|
}
|
|
#else
|
|
*RestartCmdLine = g_DynUpdtStatus->RestartCmdLine;
|
|
#endif
|
|
g_DynUpdtStatus->RestartCmdLine = NULL;
|
|
} else {
|
|
if (g_DynUpdtStatus->RestartCmdLine) {
|
|
HeapFree (GetProcessHeap (), 0, g_DynUpdtStatus->RestartCmdLine);
|
|
}
|
|
}
|
|
|
|
//
|
|
// unload the upgrade dll, if it was loaded
|
|
//
|
|
if (UpgradeSupport.DllModuleHandle) {
|
|
FreeLibrary(UpgradeSupport.DllModuleHandle);
|
|
}
|
|
|
|
if (g_DynUpdtStatus) {
|
|
FREE (g_DynUpdtStatus);
|
|
g_DynUpdtStatus = NULL;
|
|
}
|
|
|
|
EXITNOW:
|
|
SetUnhandledExceptionFilter( pLastExceptionFilter);
|
|
return rc;
|
|
}
|
|
|
|
|
|
BOOLEAN
|
|
AdjustPrivilege(
|
|
PCTSTR Privilege
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
This routine tries to adjust the priviliege of the current process.
|
|
|
|
|
|
Arguments:
|
|
|
|
Privilege - String with the name of the privilege to be adjusted.
|
|
|
|
Return Value:
|
|
|
|
Returns TRUE if the privilege could be adjusted.
|
|
Returns FALSE, otherwise.
|
|
|
|
|
|
--*/
|
|
{
|
|
HANDLE TokenHandle;
|
|
LUID_AND_ATTRIBUTES LuidAndAttributes;
|
|
|
|
TOKEN_PRIVILEGES TokenPrivileges;
|
|
BOOLEAN b = FALSE;
|
|
|
|
|
|
if( !OpenProcessToken( GetCurrentProcess(),
|
|
TOKEN_ADJUST_PRIVILEGES | TOKEN_QUERY,
|
|
&TokenHandle ) ) {
|
|
return( FALSE );
|
|
}
|
|
|
|
if(LookupPrivilegeValue( NULL,
|
|
Privilege, // (LPWSTR)SE_SECURITY_NAME,
|
|
&( LuidAndAttributes.Luid ) ) ) {
|
|
|
|
LuidAndAttributes.Attributes = SE_PRIVILEGE_ENABLED;
|
|
TokenPrivileges.PrivilegeCount = 1;
|
|
TokenPrivileges.Privileges[0] = LuidAndAttributes;
|
|
|
|
if( AdjustTokenPrivileges( TokenHandle,
|
|
FALSE,
|
|
&TokenPrivileges,
|
|
0,
|
|
NULL,
|
|
NULL ) &&
|
|
GetLastError() == NO_ERROR ) {
|
|
|
|
b = TRUE;
|
|
}
|
|
}
|
|
|
|
CloseHandle (TokenHandle);
|
|
|
|
return b;
|
|
}
|
|
|
|
#if defined(_AMD64_) || defined(_X86_)
|
|
|
|
BOOL
|
|
IsNEC98(
|
|
VOID
|
|
)
|
|
{
|
|
|
|
#if defined(_X86_)
|
|
static BOOL Checked = FALSE;
|
|
static BOOL Is98;
|
|
|
|
if(!Checked) {
|
|
|
|
Is98 = ((GetKeyboardType(0) == 7) && ((GetKeyboardType(1) & 0xff00) == 0x0d00));
|
|
|
|
Checked = TRUE;
|
|
}
|
|
|
|
return(Is98);
|
|
|
|
#else
|
|
|
|
return FALSE;
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
#ifdef _X86_
|
|
//
|
|
// winnt32.exe Floppyless setup for PC-9800
|
|
// setting automatic bootselector main function
|
|
//
|
|
VOID
|
|
SetAutomaticBootselector(
|
|
VOID
|
|
)
|
|
{
|
|
//
|
|
// This function check System.
|
|
// If System is NT, call SetAutomaticBootselectorNT(),
|
|
// If System is 95, call SetAutomaticBootselector95(),
|
|
//
|
|
|
|
if (ISNT()){
|
|
SetAutomaticBootselectorNT();
|
|
} else {
|
|
// Now I run on Win95 or Memphis.
|
|
SetAutomaticBootselector95();
|
|
}
|
|
}
|
|
|
|
VOID
|
|
SetAutomaticBootselectorNT(
|
|
VOID
|
|
)
|
|
{
|
|
// must use WIN32 function.
|
|
ULONG i;
|
|
ULONG bps = 512;
|
|
PUCHAR pBuffer,pUBuffer;
|
|
WCHAR DevicePath[128];
|
|
HANDLE hDisk;
|
|
NTSTATUS Sts;
|
|
DISK_GEOMETRY MediaInfo;
|
|
DWORD DataSize;
|
|
struct _NEC98_partition_table {
|
|
BYTE BootableFlag;
|
|
BYTE SystemType;
|
|
BYTE Reserve[2];
|
|
BYTE IPLStartSector;
|
|
BYTE IPLStartHead;
|
|
WORD IPLStartCylinder;
|
|
BYTE StartSector;
|
|
BYTE StartHead;
|
|
WORD StartCylinder;
|
|
BYTE EndSector;
|
|
BYTE EndHead;
|
|
WORD EndCylinder;
|
|
CHAR SystemName[16];
|
|
} *PartitionTable;
|
|
LONG StartSector;
|
|
LONG HiddenSector;
|
|
BOOL b;
|
|
|
|
//
|
|
// Determine the number of hard disks attached to the system
|
|
// and allocate space for an array of Disk Descriptors.
|
|
// BUGBUG - the number of a maximum of 40 drives below
|
|
// seems to be arbitrary
|
|
//
|
|
for(i=0; i<40; i++){
|
|
swprintf(DevicePath,L"\\\\.\\PHYSICALDRIVE%u",i);
|
|
hDisk = CreateFileW( DevicePath,
|
|
0,
|
|
FILE_SHARE_READ, NULL,
|
|
OPEN_EXISTING, 0, NULL);
|
|
if(hDisk == INVALID_HANDLE_VALUE) {
|
|
continue;
|
|
}
|
|
b = DeviceIoControl(
|
|
hDisk,
|
|
IOCTL_DISK_GET_DRIVE_GEOMETRY,
|
|
NULL,
|
|
0,
|
|
&MediaInfo,
|
|
sizeof(DISK_GEOMETRY),
|
|
&DataSize,
|
|
NULL
|
|
);
|
|
CloseHandle(hDisk);
|
|
//
|
|
// It's really a hard disk.
|
|
//
|
|
if(b == 0){
|
|
continue;
|
|
}
|
|
if(MediaInfo.MediaType == RemovableMedia) {
|
|
continue;
|
|
}
|
|
|
|
hDisk = CreateFileW( DevicePath,
|
|
GENERIC_READ|GENERIC_WRITE,
|
|
FILE_SHARE_READ, NULL,
|
|
OPEN_EXISTING, 0, NULL);
|
|
if(hDisk == INVALID_HANDLE_VALUE) {
|
|
continue;
|
|
}
|
|
|
|
if (CheckATACardonNT4(hDisk)){
|
|
CloseHandle(hDisk);
|
|
continue;
|
|
}
|
|
|
|
bps = GetHDBps(hDisk);
|
|
if (!bps || bps < 8){
|
|
CloseHandle(hDisk);
|
|
continue;
|
|
}
|
|
pUBuffer = MALLOC(bps * 3);
|
|
pBuffer = ALIGN(pUBuffer, bps);
|
|
RtlZeroMemory(pBuffer, bps * 2);
|
|
Sts = SpReadWriteDiskSectors(hDisk,0,1,bps,pBuffer, NEC_READSEC);
|
|
if(!NT_SUCCESS(Sts)) {
|
|
FREE(pUBuffer);
|
|
CloseHandle(hDisk);
|
|
continue;
|
|
}
|
|
|
|
//
|
|
// If PC-AT HD, No action.
|
|
//
|
|
|
|
if (!(pBuffer[4] == 'I'
|
|
&& pBuffer[5] == 'P'
|
|
&& pBuffer[6] == 'L'
|
|
&& pBuffer[7] == '1')){
|
|
FREE(pUBuffer);
|
|
CloseHandle(hDisk);
|
|
continue;
|
|
}
|
|
if ((pBuffer[bps - 5] == 0) && pBuffer[bps - 6] == 0){
|
|
FREE(pUBuffer);
|
|
CloseHandle(hDisk);
|
|
continue;
|
|
}
|
|
|
|
//
|
|
// Clear BootRecord
|
|
//
|
|
pBuffer[bps - 5] = 0x00;
|
|
pBuffer[bps - 6] = 0x00;
|
|
|
|
SpReadWriteDiskSectors(hDisk,0,1,bps,pBuffer, NEC_WRITESEC);
|
|
FREE(pUBuffer);
|
|
CloseHandle(hDisk);
|
|
}
|
|
MYASSERT (SystemPartitionDriveLetter);
|
|
HiddenSector = CalcHiddenSector((TCHAR)SystemPartitionDriveLetter, (SHORT)bps);
|
|
if(GetSystemPosition(&hDisk, &MediaInfo ) != 0xff) {
|
|
b = DeviceIoControl(
|
|
hDisk,
|
|
IOCTL_DISK_GET_DRIVE_GEOMETRY,
|
|
NULL,
|
|
0,
|
|
&MediaInfo,
|
|
sizeof(DISK_GEOMETRY),
|
|
&DataSize,
|
|
NULL
|
|
);
|
|
pUBuffer = MALLOC(bps * 3);
|
|
pBuffer = ALIGN(pUBuffer, bps);
|
|
RtlZeroMemory(pBuffer, bps * 2);
|
|
bps = MediaInfo.BytesPerSector;
|
|
Sts = SpReadWriteDiskSectors(hDisk,0,2,bps,pBuffer, NEC_READSEC);
|
|
PartitionTable = (struct _NEC98_partition_table *)(pBuffer + 512);
|
|
|
|
if(NT_SUCCESS(Sts)) {
|
|
|
|
//
|
|
// Update BootRecord
|
|
//
|
|
|
|
for (i = 0; i <16; i++, PartitionTable++){
|
|
if (((PartitionTable->SystemType) & 0x7f) == 0)
|
|
break;
|
|
StartSector =
|
|
(((PartitionTable->StartCylinder * MediaInfo.TracksPerCylinder)
|
|
+ PartitionTable->StartHead) * MediaInfo.SectorsPerTrack)
|
|
+ PartitionTable->StartSector;
|
|
if (StartSector == HiddenSector){
|
|
pBuffer[bps - 5] = (UCHAR)i;
|
|
pBuffer[bps - 6] = 0x80;
|
|
PartitionTable->BootableFlag |= 0x80;
|
|
Sts = SpReadWriteDiskSectors(hDisk,0,2,bps,pBuffer, NEC_WRITESEC);
|
|
}
|
|
}
|
|
}
|
|
FREE(pUBuffer);
|
|
CloseHandle(hDisk);
|
|
}
|
|
}
|
|
// I970721
|
|
VOID
|
|
SetAutomaticBootselector95(
|
|
VOID
|
|
)
|
|
{
|
|
|
|
int bBootDrvLtr;
|
|
|
|
|
|
if(!W95SetAutoBootFlag) {
|
|
|
|
//
|
|
// Entry points couldn't be found. The upgrade dll is corrupt.
|
|
//
|
|
MessageBoxFromMessage(
|
|
NULL,
|
|
MSG_UPGRADE_DLL_CORRUPT,
|
|
FALSE,
|
|
AppTitleStringId,
|
|
MB_OK | MB_ICONERROR | MB_TASKMODAL,
|
|
UpgradeSupport.DllPath
|
|
);
|
|
} else {
|
|
MYASSERT (SystemPartitionDriveLetter);
|
|
bBootDrvLtr = (int)SystemPartitionDriveLetter;
|
|
if (Upgrade)
|
|
W95SetAutoBootFlag(bBootDrvLtr);
|
|
else {
|
|
W95SetABFwFresh(bBootDrvLtr);
|
|
}
|
|
}
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
#if defined(_AMD64_) || defined(_X86_)
|
|
|
|
//
|
|
// disksectors read and write function
|
|
// I970721
|
|
//
|
|
NTSTATUS
|
|
SpReadWriteDiskSectors(
|
|
IN HANDLE Handle,
|
|
IN ULONG SectorNumber,
|
|
IN ULONG SectorCount,
|
|
IN ULONG BytesPerSector,
|
|
IN OUT PVOID AlignedBuffer,
|
|
IN BOOL ReadWriteSec
|
|
)
|
|
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
Reads or writes one or more disk sectors.
|
|
|
|
Arguments:
|
|
|
|
Handle - supplies handle to open partition object from which
|
|
sectors are to be read or written. The handle must be
|
|
opened for synchronous I/O.
|
|
|
|
Return Value:
|
|
|
|
NTSTATUS value indicating outcome of I/O operation.
|
|
|
|
--*/
|
|
|
|
{
|
|
DWORD IoSize, IoSize2;
|
|
OVERLAPPED Offset;
|
|
IO_STATUS_BLOCK IoStatusBlock;
|
|
NTSTATUS Status;
|
|
|
|
//
|
|
// Calculate the large integer byte offset of the first sector
|
|
// and the size of the I/O.
|
|
//
|
|
|
|
Offset.Offset = SectorNumber * BytesPerSector;
|
|
Offset.OffsetHigh = 0;
|
|
Offset.hEvent = NULL;
|
|
IoSize = SectorCount * BytesPerSector;
|
|
|
|
//
|
|
// Perform the I/O.
|
|
//
|
|
if ( ReadWriteSec == NEC_READSEC){
|
|
(NTSTATUS)Status = ReadFile(
|
|
Handle,
|
|
AlignedBuffer,
|
|
IoSize,
|
|
&IoSize2,
|
|
&Offset
|
|
);
|
|
} else {
|
|
(NTSTATUS)Status = WriteFile(
|
|
Handle,
|
|
AlignedBuffer,
|
|
IoSize,
|
|
&IoSize2,
|
|
&Offset
|
|
);
|
|
}
|
|
|
|
return(Status);
|
|
}
|
|
|
|
//
|
|
// Get WindowsNT System Position
|
|
// I970721
|
|
//
|
|
UCHAR
|
|
GetSystemPosition(
|
|
PHANDLE phDisk,
|
|
PDISK_GEOMETRY pSystemMediaInfo
|
|
)
|
|
{
|
|
|
|
HANDLE Handle;
|
|
DWORD DataSize;
|
|
TCHAR HardDiskName[] = TEXT("\\\\.\\?:");
|
|
WCHAR Buffer[128];
|
|
WCHAR DevicePath[128];
|
|
WCHAR DriveName[3];
|
|
WCHAR DiskNo;
|
|
UCHAR Position = 0xff, i, errorpt=0;
|
|
PWCHAR p, stop;
|
|
STORAGE_DEVICE_NUMBER number;
|
|
DWORD ExtentSize, err_no;
|
|
BOOL b;
|
|
PVOLUME_DISK_EXTENTS Extent;
|
|
|
|
|
|
MYASSERT (SystemPartitionDriveLetter);
|
|
HardDiskName[4] = SystemPartitionDriveLetter;
|
|
DriveName[0] = SystemPartitionDriveLetter;
|
|
DriveName[1] = ':';
|
|
DriveName[2] = 0;
|
|
if(QueryDosDeviceW(DriveName,Buffer,ARRAYSIZE(Buffer))) {
|
|
|
|
//
|
|
// Get SystemPartition Harddisk Geometry
|
|
//
|
|
Handle = CreateFile(
|
|
HardDiskName,
|
|
GENERIC_READ, FILE_SHARE_READ | FILE_SHARE_WRITE,
|
|
NULL,
|
|
OPEN_EXISTING, FILE_ATTRIBUTE_NORMAL, NULL
|
|
);
|
|
|
|
if(Handle != INVALID_HANDLE_VALUE) {
|
|
DeviceIoControl(
|
|
Handle,
|
|
IOCTL_DISK_GET_DRIVE_GEOMETRY,
|
|
NULL,
|
|
0,
|
|
pSystemMediaInfo,
|
|
sizeof(DISK_GEOMETRY),
|
|
&DataSize,
|
|
NULL
|
|
);
|
|
//
|
|
// Get SystemPartition Potition
|
|
//
|
|
if (BuildNumber <= NT40){ //check NT Version
|
|
p = wcsstr(Buffer,L"\\Partition");
|
|
Position = (UCHAR)wcstol((p + LENGTHOF("\\Partition")) ,&stop ,10);
|
|
//
|
|
// QueryDosDevice in NT3.51 is buggy.
|
|
// This API return "\\Harddisk\...." or
|
|
// "\\harddisk\...."
|
|
// We need work around.
|
|
//
|
|
p = wcsstr(Buffer,L"arddisk");
|
|
DiskNo = (*(p + LENGTHOF("arddisk")) - L'0');
|
|
} else {
|
|
b = DeviceIoControl(Handle, IOCTL_STORAGE_GET_DEVICE_NUMBER, NULL, 0,
|
|
&number, sizeof(number), &DataSize, NULL);
|
|
if (b) {
|
|
Position = (UCHAR) number.PartitionNumber;
|
|
DiskNo = (UCHAR) number.DeviceNumber;
|
|
} else {
|
|
Extent = malloc(1024);
|
|
ExtentSize = 1024;
|
|
if(!Extent) {
|
|
CloseHandle( Handle );
|
|
return(Position);
|
|
}
|
|
b = DeviceIoControl(Handle, IOCTL_VOLUME_GET_VOLUME_DISK_EXTENTS,
|
|
NULL, 0,
|
|
(PVOID)Extent, ExtentSize, &DataSize, NULL);
|
|
if (!b) {
|
|
free(Extent);
|
|
CloseHandle( Handle );
|
|
return(Position);
|
|
}
|
|
if (Extent->NumberOfDiskExtents != 1){
|
|
free(Extent);
|
|
CloseHandle( Handle );
|
|
return(Position);
|
|
}
|
|
DiskNo = (TCHAR)Extent->Extents->DiskNumber;
|
|
Position = 0;
|
|
free(Extent);
|
|
}
|
|
}
|
|
CloseHandle(Handle);
|
|
swprintf(DevicePath,L"\\\\.\\PHYSICALDRIVE%u",DiskNo);
|
|
*phDisk = CreateFileW( DevicePath, GENERIC_READ | GENERIC_WRITE,
|
|
FILE_SHARE_READ, NULL, OPEN_EXISTING, 0, NULL
|
|
);
|
|
}
|
|
}
|
|
return(Position);
|
|
}
|
|
|
|
VOID
|
|
LocateFirstFloppyDrive(
|
|
VOID
|
|
)
|
|
{
|
|
UINT rc;
|
|
TCHAR i;
|
|
|
|
if(!IsNEC98()) {
|
|
FirstFloppyDriveLetter = TEXT('A');
|
|
return;
|
|
}
|
|
|
|
//
|
|
// MyGetDriveType returns DRIVE_REMOVABLE, if drive is floppy.
|
|
//
|
|
for(i = TEXT('A'); i <= TEXT('Y'); i++) {
|
|
|
|
if((rc = MyGetDriveType(i)) == DRIVE_REMOVABLE) {
|
|
FirstFloppyDriveLetter = i;
|
|
return;
|
|
}
|
|
}
|
|
|
|
//
|
|
// None found yet, set it to Z
|
|
//
|
|
FirstFloppyDriveLetter = TEXT('Z');
|
|
}
|
|
|
|
#endif
|
|
|
|
#if defined(_X86_)
|
|
|
|
VOID
|
|
DeleteNEC98DriveAssignFlag(
|
|
VOID
|
|
)
|
|
{
|
|
TCHAR HiveName[MAX_PATH];
|
|
TCHAR tmp[256];
|
|
LONG res;
|
|
HKEY hhive;
|
|
|
|
if (FAILED (StringCchCopy (HiveName,ARRAYSIZE(HiveName),LocalBootDirectory)) ||
|
|
!ConcatenatePaths(HiveName,TEXT("setupreg.hiv"),ARRAYSIZE(HiveName))) {
|
|
|
|
MYASSERT(FALSE);
|
|
HiveName[0] = 0;
|
|
}
|
|
|
|
if(!AdjustPrivilege(SE_RESTORE_NAME)){
|
|
MYASSERT(FALSE);
|
|
//LOG((LOG_WARNING, "DeleteNEC98DriveAssignFlag: AdjustPrivilege(SE_RESTORE_NAME) failed"));
|
|
//return;
|
|
}
|
|
res = RegLoadKey(HKEY_LOCAL_MACHINE, TEXT("$WINNT32"), HiveName);
|
|
if (res != ERROR_SUCCESS){
|
|
return;
|
|
}
|
|
res = RegOpenKeyEx(HKEY_LOCAL_MACHINE, TEXT("$WINNT32\\setup"), 0, KEY_ALL_ACCESS, &hhive);
|
|
if (res != ERROR_SUCCESS){
|
|
RegUnLoadKey(HKEY_LOCAL_MACHINE, TEXT("$WINNT32"));
|
|
return;
|
|
}
|
|
res = RegDeleteValue(hhive, TEXT("DriveLetter"));
|
|
res = RegCloseKey(hhive);
|
|
res = RegUnLoadKey(HKEY_LOCAL_MACHINE, TEXT("$WINNT32"));
|
|
|
|
}
|
|
|
|
VOID
|
|
W95SetABFwFresh(
|
|
int bBootDrvLtr
|
|
)
|
|
{
|
|
//
|
|
// These items are used to call 98ptn32.dll.
|
|
//
|
|
//
|
|
// Almost below codes are copied from win95upg\w95upg\init9x\init9x.c
|
|
//
|
|
|
|
|
|
typedef BOOL (CALLBACK WIN95_PLUGIN_98PTN32_SETBOOTFLAG_PROTOTYPE)(int, WORD);
|
|
typedef WIN95_PLUGIN_98PTN32_SETBOOTFLAG_PROTOTYPE * PWIN95_PLUGIN_98PTN32_SETBOOTFLAG;
|
|
|
|
#define WIN95_98PTN32_SETBOOTFLAG_W L"SetBootable95ptn32"
|
|
#define WIN95_98PTN32_SETBOOTFLAG_A "SetBootable95ptn32"
|
|
#define NEC98_DLL_NAME_W L"98PTN32.DLL"
|
|
#define NEC98_DLL_NAME_A "98PTN32.DLL"
|
|
#ifdef UNICODE
|
|
#define WIN95_98PTN32_SETBOOTFLAG WIN95_98PTN32_SETBOOTFLAG_W
|
|
#define NEC98_DLL_NAME NEC98_DLL_NAME_W
|
|
#else
|
|
#define WIN95_98PTN32_SETBOOTFLAG WIN95_98PTN32_SETBOOTFLAG_A
|
|
#define NEC98_DLL_NAME NEC98_DLL_NAME_A
|
|
#endif
|
|
#define SB_BOOTABLE 0x0001
|
|
#define SB_UNBOOTABLE 0x0002
|
|
#define MSK_BOOTABLE 0x000f
|
|
#define SB_AUTO 0x0010
|
|
#define MSK_AUTO 0x00f0
|
|
|
|
TCHAR MyPath[MAX_PATH], *p;
|
|
HINSTANCE g_Pc98ModuleHandle = NULL;
|
|
PWIN95_PLUGIN_98PTN32_SETBOOTFLAG SetBootFlag16;
|
|
|
|
|
|
//
|
|
// Obtain PC-98 helper routine addresses
|
|
// Generate directory of WINNT32
|
|
//
|
|
if( !MyGetModuleFileName (NULL, MyPath, ARRAYSIZE(MyPath)) || (!(p =_tcsrchr(MyPath, TEXT('\\')))))
|
|
return;
|
|
*p= 0;
|
|
if (!ConcatenatePaths (MyPath, NEC98_DLL_NAME, ARRAYSIZE(MyPath))) {
|
|
return;
|
|
}
|
|
|
|
//
|
|
// Load library
|
|
//
|
|
g_Pc98ModuleHandle = LoadLibraryEx(
|
|
MyPath,
|
|
NULL,
|
|
LOAD_WITH_ALTERED_SEARCH_PATH
|
|
);
|
|
|
|
if(!g_Pc98ModuleHandle){
|
|
return;
|
|
}
|
|
|
|
//
|
|
// Get entry points
|
|
//
|
|
|
|
(FARPROC)SetBootFlag16 = GetProcAddress (g_Pc98ModuleHandle, (const char *)WIN95_98PTN32_SETBOOTFLAG);
|
|
if(!SetBootFlag16){
|
|
FreeLibrary(g_Pc98ModuleHandle);
|
|
return;
|
|
}
|
|
|
|
//
|
|
// Set auto boot flag on System drive use 16 bit DLL.
|
|
//
|
|
|
|
SetBootFlag16(bBootDrvLtr, SB_BOOTABLE | SB_AUTO);
|
|
FreeLibrary(g_Pc98ModuleHandle);
|
|
}
|
|
|
|
//
|
|
// Some NEC98 Windows NT4 system is installed DMITOOL
|
|
// This AP block the CreateFile API
|
|
// Setup need to check this AP
|
|
//
|
|
// Return
|
|
// TRUE ... DMITOOL is installed
|
|
// False .. DMITOOL is not installed
|
|
|
|
BOOL
|
|
NEC98CheckDMI()
|
|
{
|
|
HKEY hKey;
|
|
LONG Error;
|
|
TCHAR buf[100];
|
|
DWORD bufsize = sizeof(buf);
|
|
|
|
if (RegOpenKeyEx( HKEY_LOCAL_MACHINE,
|
|
TEXT("SOFTWARE\\NEC\\PcAssistant\\Common"),
|
|
0, KEY_READ, &hKey) != ERROR_SUCCESS ) {
|
|
return(FALSE);
|
|
}
|
|
if (RegQueryValueEx(hKey, TEXT("Ver"), NULL,
|
|
NULL, (unsigned char *)buf,
|
|
&bufsize ) != ERROR_SUCCESS ) {
|
|
RegCloseKey( hKey );
|
|
return(FALSE);
|
|
}
|
|
RegCloseKey( hKey );
|
|
//
|
|
// We need check major Version is '2.
|
|
//
|
|
if (bufsize >= sizeof (buf[0]) && (TCHAR)*buf != (TCHAR)'2')
|
|
return(FALSE);
|
|
return(TRUE);
|
|
|
|
}
|
|
#endif
|
|
|
|
|
|
typedef BOOL (WINAPI* INITBILLBOARD)(HWND , LPCTSTR, DWORD);
|
|
typedef BOOL (WINAPI* TERMBILLBOARD)();
|
|
|
|
void PrepareBillBoard(HWND hwnd)
|
|
{
|
|
TCHAR szPath[MAX_PATH];
|
|
INITBILLBOARD pinitbb;
|
|
BOOL bMagnifierRunning = FALSE;
|
|
|
|
// Check if Magnifier is running.
|
|
HANDLE hEvent = CreateEvent(NULL, TRUE, TRUE, TEXT("MSMagnifierAlreadyExistsEvent"));
|
|
bMagnifierRunning = (!hEvent || GetLastError() == ERROR_ALREADY_EXISTS);
|
|
if (hEvent)
|
|
{
|
|
CloseHandle(hEvent);
|
|
}
|
|
// If the Magnifier is not set yet, set it.
|
|
if (!AccessibleMagnifier)
|
|
{
|
|
AccessibleMagnifier = bMagnifierRunning;
|
|
}
|
|
|
|
if (!bMagnifierRunning && FindPathToWinnt32File (
|
|
#ifndef UNICODE
|
|
TEXT("winntbba.dll"),
|
|
#else
|
|
TEXT("winntbbu.dll"),
|
|
#endif
|
|
szPath,
|
|
ARRAYSIZE(szPath)
|
|
)) {
|
|
hinstBB = LoadLibrary (szPath);
|
|
if (hinstBB)
|
|
{
|
|
|
|
pinitbb = (INITBILLBOARD)GetProcAddress(hinstBB, "InitBillBoard");
|
|
if (pinitbb)
|
|
{
|
|
// Set no billboard text, just the background
|
|
if (!(*pinitbb)(hwnd, TEXT(""), ProductFlavor))
|
|
{
|
|
FreeLibrary(hinstBB);
|
|
hinstBB = NULL;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
|
|
void TerminateBillBoard()
|
|
{
|
|
TERMBILLBOARD pTermBillBoard;
|
|
if (hinstBB)
|
|
{
|
|
if (pTermBillBoard = (TERMBILLBOARD)GetProcAddress(hinstBB, "TermBillBoard"))
|
|
pTermBillBoard ();
|
|
}
|
|
}
|
|
|
|
//
|
|
// This function is here so that when the wizard is hidden and the users
|
|
// task switches between other apps and setup, that we can handle the
|
|
// ESC key and forward it to the wizard dialog proc.
|
|
LRESULT
|
|
CALLBACK
|
|
MainBackgroundWndProc (
|
|
HWND hwnd,
|
|
UINT uMsg,
|
|
WPARAM wParam,
|
|
LPARAM lParam
|
|
)
|
|
{
|
|
switch (uMsg)
|
|
{
|
|
|
|
case WM_CHAR:
|
|
if (wParam == VK_ESCAPE)
|
|
{
|
|
// Forward this to the wizard dlg proc.
|
|
SendMessage(WizardHandle, uMsg, wParam, lParam);
|
|
return 0;
|
|
}
|
|
break;
|
|
}
|
|
return DefWindowProc (hwnd, uMsg, wParam, lParam);
|
|
}
|
|
|
|
void CreateMainWindow()
|
|
{
|
|
RECT rect;
|
|
WNDCLASSEX wcx;
|
|
TCHAR Caption[512];
|
|
|
|
GetWindowRect (GetDesktopWindow(), &rect);
|
|
|
|
ZeroMemory (&wcx, sizeof (wcx));
|
|
wcx.cbSize = sizeof (wcx);
|
|
wcx.style = CS_HREDRAW | CS_VREDRAW| CS_NOCLOSE;
|
|
wcx.lpfnWndProc = MainBackgroundWndProc;
|
|
wcx.hInstance = hInst;
|
|
wcx.lpszClassName = TEXT("Winnt32Background");
|
|
|
|
RegisterClassEx (&wcx);
|
|
|
|
if (!LoadString (
|
|
hInst,
|
|
AppTitleStringId,
|
|
Caption,
|
|
ARRAYSIZE(Caption)
|
|
)) {
|
|
Caption[0] = 0;
|
|
}
|
|
|
|
BackgroundWnd2 = CreateWindowEx (
|
|
WS_EX_APPWINDOW,
|
|
TEXT("Winnt32Background"),
|
|
Caption,
|
|
WS_CLIPCHILDREN|WS_POPUP|WS_VISIBLE,
|
|
rect.left,
|
|
rect.top,
|
|
rect.right,
|
|
rect.bottom,
|
|
NULL,
|
|
NULL,
|
|
hInst,
|
|
0
|
|
);
|
|
|
|
}
|
|
|
|
|
|
VOID
|
|
DisableSystemRestore( void )
|
|
/*
|
|
Description:
|
|
Procedure to disable system restore on upgrades. This way we save a lot of space
|
|
as disabling system restore will clear out the old files under
|
|
System Volume Information\_restore.{guid}".
|
|
|
|
*/
|
|
{
|
|
|
|
HMODULE SRClient = NULL;
|
|
|
|
|
|
if( Upgrade ){
|
|
|
|
SRClient = LoadLibrary(TEXT("SRCLIENT.DLL"));
|
|
|
|
if( !SRClient )
|
|
return;
|
|
else{
|
|
|
|
if( ((FARPROC)SRClientDisableSR = GetProcAddress( SRClient, "DisableSR")) != NULL){
|
|
|
|
//Call the routine
|
|
|
|
SRClientDisableSR( NULL );
|
|
|
|
DebugLog(Winnt32LogInformation, TEXT("System Restore was disabled"), 0);
|
|
|
|
|
|
}
|
|
}
|
|
|
|
FreeLibrary( SRClient );
|
|
}
|
|
return;
|
|
}
|
|
|
|
#ifdef RUN_SYSPARSE
|
|
VOID
|
|
pCenterWindowOnDesktop (
|
|
HWND WndToCenter
|
|
)
|
|
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
Centers a dialog relative to the 'work area' of the desktop.
|
|
|
|
Arguments:
|
|
|
|
WndToCenter - window handle of dialog to center
|
|
|
|
Return Value:
|
|
|
|
None.
|
|
|
|
--*/
|
|
|
|
{
|
|
RECT rcFrame, rcWindow;
|
|
LONG x, y, w, h;
|
|
POINT point;
|
|
HWND Desktop = GetDesktopWindow ();
|
|
|
|
point.x = point.y = 0;
|
|
ClientToScreen(Desktop, &point);
|
|
GetWindowRect(WndToCenter, &rcWindow);
|
|
GetClientRect(Desktop, &rcFrame);
|
|
|
|
w = rcWindow.right - rcWindow.left + 1;
|
|
h = rcWindow.bottom - rcWindow.top + 1;
|
|
x = point.x + ((rcFrame.right - rcFrame.left + 1 - w) / 2);
|
|
y = point.y + ((rcFrame.bottom - rcFrame.top + 1 - h) / 2);
|
|
|
|
//
|
|
// Get the work area for the current desktop (i.e., the area that
|
|
// the tray doesn't occupy).
|
|
//
|
|
if(!SystemParametersInfo (SPI_GETWORKAREA, 0, (PVOID)&rcFrame, 0)) {
|
|
//
|
|
// For some reason SPI failed, so use the full screen.
|
|
//
|
|
rcFrame.top = rcFrame.left = 0;
|
|
rcFrame.right = GetSystemMetrics(SM_CXSCREEN);
|
|
rcFrame.bottom = GetSystemMetrics(SM_CYSCREEN);
|
|
}
|
|
|
|
if(x + w > rcFrame.right) {
|
|
x = rcFrame.right - w;
|
|
} else if(x < rcFrame.left) {
|
|
x = rcFrame.left;
|
|
}
|
|
if(y + h > rcFrame.bottom) {
|
|
y = rcFrame.bottom - h;
|
|
} else if(y < rcFrame.top) {
|
|
y = rcFrame.top;
|
|
}
|
|
|
|
MoveWindow(WndToCenter, x, y, w, h, FALSE);
|
|
}
|
|
|
|
|
|
LRESULT
|
|
SysParseDlgProc(
|
|
IN HWND hdlg,
|
|
IN UINT msg,
|
|
IN WPARAM wParam,
|
|
IN LPARAM lParam
|
|
)
|
|
{
|
|
static DWORD ElapsedTime = 0;
|
|
static UINT_PTR timer = 0;
|
|
DWORD ret;
|
|
|
|
switch(msg) {
|
|
case WM_INITDIALOG:
|
|
pCenterWindowOnDesktop( hdlg);
|
|
timer = SetTimer( hdlg, WMX_SYSPARSE_DONE, 1000, NULL);
|
|
if ( !timer) {
|
|
EndDialog(hdlg,TRUE);
|
|
}
|
|
return( TRUE );
|
|
case WM_TIMER:
|
|
ElapsedTime++;
|
|
ret = WaitForSingleObject( piSysparse.hProcess, 0);
|
|
if ( ret == WAIT_OBJECT_0) {
|
|
KillTimer (hdlg, timer);
|
|
EndDialog(hdlg,TRUE);
|
|
} else if ( ElapsedTime >= 90) {
|
|
KillTimer (hdlg, timer);
|
|
TerminateProcess( piSysparse.hProcess, ERROR_TIMEOUT);
|
|
EndDialog(hdlg,TRUE);
|
|
}
|
|
return( TRUE );
|
|
default:
|
|
break;
|
|
}
|
|
|
|
return( FALSE );
|
|
}
|
|
#endif
|
|
|
|
|