Leaked source code of windows server 2003
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

90 lines
2.7 KiB

//
// REGFKEY.C
//
// Copyright (C) Microsoft Corporation, 1995
//
// Implementation of RegFlushKey and supporting functions.
//
#include "pch.h"
// Magic HKEY used by Setup to disable disk I/O for the duration of this
// Windows session (you must restart to re-enable disk I/O). This is done
// just before the new SYSTEM.DAT and USER.DAT are copied to their final
// destination.
#define HKEY_DISABLE_REG (HKEY) 0x484A574D
// Magic HKEY used by CONFIGMG to force a flush of the registry before we've
// received our normal post-critical init call.
#define HKEY_CRITICAL_FLUSH (HKEY) 0x5350574D
// Magic HKEY used by ScanregW to clear the failed boot bit FHF_BOOTFAILED in the file header
// of HKEY_LOCAL_MACHINE. Indicating that we successfully booted and verified the integrity
// of the registry files, and that scanreg.exe does not need to be ran by win.com on next boot.
#define HKEY_BOOT_SUCCESS (HKEY) 0x5342574D
//
// VMMRegFlushKey
//
LONG
REGAPI
VMMRegFlushKey(
HKEY hKey
)
{
int ErrorCode;
BOOL fBootSuccess = FALSE;
if (!RgLockRegistry())
return ERROR_LOCK_FAILED;
#ifdef VXD
// Set the g_RgFileAccessDisabled flag so that all create or open file
// calls will be failed. The backing stores for our files are about to
// be changed, so there's no file for us to go to.
if (hKey == HKEY_DISABLE_REG) {
g_RgFileAccessDisabled = TRUE;
ErrorCode = ERROR_SUCCESS;
goto ReturnErrorCode;
}
// Set the g_RgPostCriticalInit flag so that all I/O calls will go to disk
// instead of the XMS cache. The XMS cache will be freed when/if the
// normal post critical init routine is called, but we should only be
// getting this call when we're about to die, so it doesn't really matter.
if (hKey == HKEY_CRITICAL_FLUSH) {
g_RgPostCriticalInit = TRUE;
hKey = HKEY_LOCAL_MACHINE;
}
// Clears the failed boot bit FHF_BOOTFAILED in the file header of HKEY_LOCAL_MACHINE.
// Indicating that we successfully booted and verified the integrity of the registry files.
if (hKey == HKEY_BOOT_SUCCESS)
{
fBootSuccess = TRUE;
hKey = HKEY_LOCAL_MACHINE;
}
#endif
if ((ErrorCode = RgValidateAndConvertKeyHandle(&hKey)) == ERROR_SUCCESS)
{
#ifdef VXD
if (fBootSuccess)
{
hKey-> lpFileInfo-> FileHeader.Flags |= FHF_DIRTY;
hKey-> lpFileInfo-> FileHeader.Flags &= ~FHF_BOOTFAILED;
}
#endif
ErrorCode = RgFlushFileInfo(hKey-> lpFileInfo);
}
#ifdef VXD
ReturnErrorCode:
#endif
RgUnlockRegistry();
return ErrorCode;
}