/*++ Copyright (c) 1989 - 1999 Microsoft Corporation Module Name: locks.c Abstract: This module implements the mini redirector call down routines pertaining to locks of file system objects. --*/ #include "precomp.h" #pragma hdrstop #pragma warning(error:4101) // Unreferenced local variable #ifdef ALLOC_PRAGMA #pragma alloc_text(PAGE, MRxSmbLocks) #pragma alloc_text(PAGE, MRxSmbBuildLocksAndX) #pragma alloc_text(PAGE, MRxSmbBuildLockAssert) #pragma alloc_text(PAGE, SmbPseExchangeStart_Locks) #pragma alloc_text(PAGE, MRxSmbFinishLocks) #pragma alloc_text(PAGE, MRxSmbUnlockRoutine) #pragma alloc_text(PAGE, MRxSmbCompleteBufferingStateChangeRequest) #pragma alloc_text(PAGE, MRxSmbBuildFlush) #pragma alloc_text(PAGE, MRxSmbFlush) #pragma alloc_text(PAGE, MRxSmbIsLockRealizable) #pragma alloc_text(PAGE, MRxSmbFinishFlush) #endif // // The local debug trace level // #define Dbg (DEBUG_TRACE_LOCKCTRL) NTSTATUS SmbPseExchangeStart_Locks( SMBPSE_ORDINARY_EXCHANGE_ARGUMENT_SIGNATURE ); ULONG MRxSmbSrvLockBufSize = 0xffff; ULONG MRxSmbLockSendOptions = 0; //use the default options NTSTATUS MRxSmbBuildFlush ( PSMBSTUFFER_BUFFER_STATE StufferState ); NTSTATUS MRxSmbLocks( IN PRX_CONTEXT RxContext) /*++ Routine Description: This routine handles network requests for filelocks Arguments: RxContext - the RDBSS context Return Value: RXSTATUS - The return status for the operation --*/ { NTSTATUS Status = STATUS_SUCCESS; RxCaptureFcb; RxCaptureFobx; PMRX_SRV_OPEN SrvOpen = capFobx->pSrvOpen; PSMB_PSE_ORDINARY_EXCHANGE OrdinaryExchange; PAGED_CODE(); RxDbgTrace(+1, Dbg, ("MRxSmbLocks\n", 0 )); ASSERT( NodeType(capFobx->pSrvOpen) == RDBSS_NTC_SRVOPEN ); Status = SmbPseCreateOrdinaryExchange(RxContext, SrvOpen->pVNetRoot, SMBPSE_OE_FROM_LOCKS, SmbPseExchangeStart_Locks, &OrdinaryExchange ); if (Status != STATUS_SUCCESS) { RxDbgTrace(-1, Dbg, ("Couldn't get the smb buf!\n")); return(Status); } Status = SmbPseInitiateOrdinaryExchange(OrdinaryExchange); if (Status!=STATUS_PENDING) { BOOLEAN FinalizationComplete = SmbPseFinalizeOrdinaryExchange(OrdinaryExchange); ASSERT(FinalizationComplete); } RxDbgTrace(-1, Dbg, ("MRxSmbLocks exit with status=%08lx\n", Status )); return(Status); } NTSTATUS MRxSmbBuildLocksAndX ( PSMBSTUFFER_BUFFER_STATE StufferState ) /*++ Routine Description: This builds a LockingAndX SMB for a single unlock or a single lock. Arguments: StufferState - the state of the smbbuffer from the stuffer's point of view Return Value: RXSTATUS SUCCESS NOT_IMPLEMENTED something has appeared in the arguments that i can't handle Notes: --*/ { NTSTATUS Status; PRX_CONTEXT RxContext = StufferState->RxContext; PLOWIO_CONTEXT LowIoContext = &RxContext->LowIoContext; RxCaptureFcb;RxCaptureFobx; PSMB_PSE_ORDINARY_EXCHANGE OrdinaryExchange = (PSMB_PSE_ORDINARY_EXCHANGE)StufferState->Exchange; PSMBCE_SERVER pServer = SmbCeGetExchangeServer(StufferState->Exchange); PMRX_SRV_OPEN SrvOpen = capFobx->pSrvOpen; PMRX_SMB_SRV_OPEN smbSrvOpen = MRxSmbGetSrvOpenExtension(SrvOpen); PLARGE_INTEGER ByteOffsetAsLI,LengthAsLI; USHORT NumberOfLocks,NumberOfUnlocks; BOOLEAN UseLockList = FALSE; //ULONG OffsetLow,OffsetHigh; PAGED_CODE(); RxDbgTrace(+1, Dbg, ("MRxSmbBuildLocksAndX\n")); ASSERT( NodeType(SrvOpen) == RDBSS_NTC_SRVOPEN ); switch (LowIoContext->Operation) { case LOWIO_OP_SHAREDLOCK: case LOWIO_OP_EXCLUSIVELOCK: NumberOfLocks = 1; NumberOfUnlocks = 0; break; case LOWIO_OP_UNLOCK: NumberOfLocks = 0; NumberOfUnlocks = 1; break; case LOWIO_OP_UNLOCK_MULTIPLE: NumberOfLocks = 0; NumberOfUnlocks = 1; UseLockList = TRUE; break; } if (!UseLockList) { ByteOffsetAsLI = (PLARGE_INTEGER)&LowIoContext->ParamsFor.Locks.ByteOffset; LengthAsLI = (PLARGE_INTEGER)&LowIoContext->ParamsFor.Locks.Length; } else { //it's okay that this code is big.....see the C.I. above PSMB_PSE_OE_READWRITE rw = &OrdinaryExchange->ReadWrite; PLOWIO_LOCK_LIST LockList = rw->LockList; ByteOffsetAsLI = (PLARGE_INTEGER)&LockList->ByteOffset; LengthAsLI = (PLARGE_INTEGER)&LockList->Length; RxDbgTrace(0, Dbg, ("MRxSmbBuildLocksAndX using locklist, byteoffptr,lengthptr=%08lx,%08lx\n", ByteOffsetAsLI, LengthAsLI )); //DbgBreakPoint(); } if (FlagOn(pServer->DialectFlags,DF_LANMAN20)) { ULONG SharedLock = (LowIoContext->Operation==LOWIO_OP_SHAREDLOCK); ULONG Timeout = (LowIoContext->ParamsFor.Locks.Flags&LOWIO_LOCKSFLAG_FAIL_IMMEDIATELY)?0:0xffffffff; ULONG UseLargeOffsets = LOCKING_ANDX_LARGE_FILES; if (!FlagOn(pServer->DialectFlags,DF_NT_SMBS)) { UseLargeOffsets = 0; } COVERED_CALL(MRxSmbStartSMBCommand (StufferState, SetInitialSMB_Never, SMB_COM_LOCKING_ANDX, SMB_REQUEST_SIZE(LOCKING_ANDX), NO_EXTRA_DATA,NO_SPECIAL_ALIGNMENT,RESPONSE_HEADER_SIZE_NOT_SPECIFIED, 0,0,0,0 STUFFERTRACE(Dbg,'FC')) ); MRxSmbDumpStufferState (1000,"SMB w/ NTLOCKS&X before stuffing",StufferState); MRxSmbStuffSMB (StufferState, "XwwDwwB?", // X UCHAR WordCount; // Count of parameter words = 8 // UCHAR AndXCommand; // Secondary (X) command; 0xFF = none // UCHAR AndXReserved; // Reserved (must be 0) // _USHORT( AndXOffset ); // Offset to next command WordCount smbSrvOpen->Fid, // w _USHORT( Fid ); // File handle // // // // // When NT protocol is not negotiated the OplockLevel field is // // omitted, and LockType field is a full word. Since the upper // // bits of LockType are never used, this definition works for // // all protocols. // // // SharedLock // w UCHAR( LockType ); // Locking mode: +UseLargeOffsets, // // bit 0: 0 = lock out all access // // 1 = read OK while locked // // bit 1: 1 = 1 user total file unlock // UCHAR( OplockLevel ); // The new oplock level SMB_OFFSET_CHECK(LOCKING_ANDX,Timeout) Timeout, // D _ULONG( Timeout ); NumberOfUnlocks, // w _USHORT( NumberOfUnlocks ); // Num. unlock range structs following NumberOfLocks, // w _USHORT( NumberOfLocks ); // Num. lock range structs following SMB_WCT_CHECK(8) 0 // B? _USHORT( ByteCount ); // Count of data bytes // UCHAR Buffer[1]; // Buffer containing: // //LOCKING_ANDX_RANGE Unlocks[]; // Unlock ranges // //LOCKING_ANDX_RANGE Locks[]; // Lock ranges ); if (UseLargeOffsets) { //NTversion MRxSmbStuffSMB (StufferState, "wwdddd!", // typedef struct _NT_LOCKING_ANDX_RANGE { MRXSMB_PROCESS_ID , // w _USHORT( Pid ); // PID of process "owning" lock 0, // w _USHORT( Pad ); // Pad to DWORD align (mbz) ByteOffsetAsLI->HighPart,// d _ULONG( OffsetHigh ); // Ofset to bytes to [un]lock (high) ByteOffsetAsLI->LowPart, // d _ULONG( OffsetLow ); // Ofset to bytes to [un]lock (low) LengthAsLI->HighPart, // d _ULONG( LengthHigh ); // Number of bytes to [un]lock (high) LengthAsLI->LowPart // d _ULONG( LengthLow ); // Number of bytes to [un]lock (low) // } NTLOCKING_ANDX_RANGE; ); } else { MRxSmbStuffSMB (StufferState, "wdd!", MRXSMB_PROCESS_ID , // typedef struct _LOCKING_ANDX_RANGE { // w _USHORT( Pid ); // PID of process "owning" lock // d _ULONG( Offset ); // Ofset to bytes to [un]lock ByteOffsetAsLI->LowPart, // d _ULONG( Length ); // Number of bytes to [un]lock LengthAsLI->LowPart // } LOCKING_ANDX_RANGE; ); } MRxSmbDumpStufferState (700,"SMB w/ NTLOCKS&X after stuffing",StufferState); } else { //lockbyterange and unlockbyterange have the same format...... COVERED_CALL(MRxSmbStartSMBCommand ( StufferState, SetInitialSMB_Never, (UCHAR)((NumberOfLocks==0)?SMB_COM_UNLOCK_BYTE_RANGE :SMB_COM_LOCK_BYTE_RANGE), SMB_REQUEST_SIZE(LOCK_BYTE_RANGE), NO_EXTRA_DATA,NO_SPECIAL_ALIGNMENT,RESPONSE_HEADER_SIZE_NOT_SPECIFIED, 0,0,0,0 STUFFERTRACE(Dbg,'FC')) ); MRxSmbDumpStufferState (1000,"SMB w/ corelocking before stuffing",StufferState); ASSERT(ByteOffsetAsLI->HighPart==0); ASSERT(LengthAsLI->HighPart==0); MRxSmbStuffSMB (StufferState, "0wddB!", // 0 UCHAR WordCount; // Count of parameter words = 5 smbSrvOpen->Fid, // w _USHORT( Fid ); // File handle LengthAsLI->LowPart, // d _ULONG( Count ); // Count of bytes to lock ByteOffsetAsLI->LowPart, // d _ULONG( Offset ); // Offset from start of file // B! _USHORT( ByteCount ); // Count of data bytes = 0 SMB_WCT_CHECK(5) 0 // UCHAR Buffer[1]; // empty ); MRxSmbDumpStufferState (700,"SMB w/ corelocking after stuffing",StufferState); } FINALLY: RxDbgTraceUnIndent(-1, Dbg); return(Status); } NTSTATUS MRxSmbBuildLockAssert ( PSMBSTUFFER_BUFFER_STATE StufferState ) /*++ Routine Description: This builds a LockingAndX SMB for multiple locks by calling the lock enumerator. Arguments: StufferState - the state of the smbbuffer from the stuffer's point of view Return Value: RXSTATUS SUCCESS NOT_IMPLEMENTED something has appeared in the arguments that i can't handle --*/ { NTSTATUS Status; PRX_CONTEXT RxContext = StufferState->RxContext; PLOWIO_CONTEXT LowIoContext = &RxContext->LowIoContext; RxCaptureFcb;RxCaptureFobx; PSMB_PSE_ORDINARY_EXCHANGE OrdinaryExchange = (PSMB_PSE_ORDINARY_EXCHANGE)StufferState->Exchange; PSMBCE_SERVER pServer = SmbCeGetExchangeServer(StufferState->Exchange); PMRX_SRV_OPEN SrvOpen = capFobx->pSrvOpen; PMRX_SMB_SRV_OPEN smbSrvOpen = MRxSmbGetSrvOpenExtension(SrvOpen); PRX_LOCK_ENUMERATOR LockEnumerator = OrdinaryExchange->AssertLocks.LockEnumerator; ULONG UseLargeOffsets; BOOLEAN LocksExclusiveForThisPacket = TRUE; PBYTE PtrToLockCount; PAGED_CODE(); RxDbgTrace(+1, Dbg, ("MRxSmbBuildLockAssert enum=%08lx\n",LockEnumerator)); ASSERT( NodeType(SrvOpen) == RDBSS_NTC_SRVOPEN ); if (smbSrvOpen->Fid == 0xffff) { return STATUS_FILE_CLOSED; } RxDbgTrace(0,Dbg,("Oplock response for FID(%lx)\n",smbSrvOpen->Fid)); UseLargeOffsets = FlagOn(pServer->DialectFlags,DF_NT_SMBS)?LOCKING_ANDX_LARGE_FILES:0; //UseLargeOffsets = FALSE; OrdinaryExchange->AssertLocks.NumberOfLocksPlaced = 0; for (;;) { ASSERT_ORDINARY_EXCHANGE ( OrdinaryExchange ); RxDbgTrace(0, Dbg, ("top of loop %08lx %08lx %08lx\n", OrdinaryExchange->AssertLocks.NumberOfLocksPlaced, OrdinaryExchange->AssertLocks.LockAreaNonEmpty, OrdinaryExchange->AssertLocks.EndOfListReached )); if (!OrdinaryExchange->AssertLocks.EndOfListReached && !OrdinaryExchange->AssertLocks.LockAreaNonEmpty) { //get a new lock //DbgBreakPoint(); if (LockEnumerator( OrdinaryExchange->AssertLocks.SrvOpen, &OrdinaryExchange->AssertLocks.ContinuationHandle, &OrdinaryExchange->AssertLocks.NextLockOffset, &OrdinaryExchange->AssertLocks.NextLockRange, &OrdinaryExchange->AssertLocks.NextLockIsExclusive )){ OrdinaryExchange->AssertLocks.LockAreaNonEmpty = TRUE; } else { OrdinaryExchange->AssertLocks.LockAreaNonEmpty = FALSE; OrdinaryExchange->AssertLocks.EndOfListReached = TRUE; OrdinaryExchange->AssertLocks.NextLockIsExclusive = TRUE; } } RxDbgTrace(0, Dbg, ("got a lockorempty %08lx %08lx %08lx\n", OrdinaryExchange->AssertLocks.NumberOfLocksPlaced, OrdinaryExchange->AssertLocks.LockAreaNonEmpty, OrdinaryExchange->AssertLocks.EndOfListReached )); //DbgBreakPoint(); if (OrdinaryExchange->AssertLocks.NumberOfLocksPlaced == 0){ ULONG Timeout = 0xffffffff; ULONG SharedLock = !OrdinaryExchange->AssertLocks.NextLockIsExclusive; LocksExclusiveForThisPacket = OrdinaryExchange->AssertLocks.NextLockIsExclusive; COVERED_CALL(MRxSmbStartSMBCommand (StufferState, SetInitialSMB_Never, SMB_COM_LOCKING_ANDX, SMB_REQUEST_SIZE(LOCKING_ANDX), NO_EXTRA_DATA,NO_SPECIAL_ALIGNMENT,RESPONSE_HEADER_SIZE_NOT_SPECIFIED, 0,0,0,0 STUFFERTRACE(Dbg,'FC')) ); MRxSmbDumpStufferState (1000,"SMB w/ NTLOCKS&X(assertbuf) before stuffing",StufferState); MRxSmbStuffSMB (StufferState, "XwrwDwrwB?", // X UCHAR WordCount; // Count of parameter words = 8 // UCHAR AndXCommand; // Secondary (X) command; 0xFF = none // UCHAR AndXReserved; // Reserved (must be 0) // _USHORT( AndXOffset ); // Offset to next command WordCount smbSrvOpen->Fid, // w _USHORT( Fid ); // File handle // // // // // When NT protocol is not negotiated the OplockLevel field is // // omitted, and LockType field is a full word. Since the upper // // bits of LockType are never used, this definition works for // // all protocols. // // // // rw UCHAR( LockType ); // Locking mode: &OrdinaryExchange->AssertLocks.PtrToLockType,0, SharedLock+UseLargeOffsets, // // bit 0: 0 = lock out all access // // 1 = read OK while locked // // bit 1: 1 = 1 user total file unlock // UCHAR( OplockLevel ); // The new oplock level SMB_OFFSET_CHECK(LOCKING_ANDX,Timeout) Timeout, // D _ULONG( Timeout ); 0, // w _USHORT( NumberOfUnlocks ); // Num. unlock range structs following // rw _USHORT( NumberOfLocks ); // Num. lock range structs following &PtrToLockCount,0, 0, SMB_WCT_CHECK(8) 0 // B? _USHORT( ByteCount ); // Count of data bytes // UCHAR Buffer[1]; // Buffer containing: // //LOCKING_ANDX_RANGE Unlocks[]; // Unlock ranges // //LOCKING_ANDX_RANGE Locks[]; // Lock ranges ); ASSERT_ORDINARY_EXCHANGE ( OrdinaryExchange ); RxDbgTrace(0, Dbg, ("PTRS %08lx %08lx\n", OrdinaryExchange->AssertLocks.PtrToLockType, PtrToLockCount )); } if (OrdinaryExchange->AssertLocks.EndOfListReached || (LocksExclusiveForThisPacket != OrdinaryExchange->AssertLocks.NextLockIsExclusive) || (OrdinaryExchange->AssertLocks.NumberOfLocksPlaced >= 20) // the lock limit will have to take cognizance of the remaining space in the buffer. this will be // different depending on whether a full buffer is used or a vestigial buffer. SO, this cannot just // be turned into another constant ){ break; } ASSERT_ORDINARY_EXCHANGE ( OrdinaryExchange ); if (UseLargeOffsets) { MRxSmbStuffSMB (StufferState, "wwdddd?", // typedef struct _NT_LOCKING_ANDX_RANGE { MRXSMB_PROCESS_ID , // w _USHORT( Pid ); // PID of process "owning" lock 0, // w _USHORT( Pad ); // Pad to DWORD align (mbz) // d _ULONG( OffsetHigh ); // Ofset to bytes to [un]lock (high) OrdinaryExchange->AssertLocks.NextLockOffset.HighPart, // d _ULONG( OffsetLow ); // Ofset to bytes to [un]lock (low) OrdinaryExchange->AssertLocks.NextLockOffset.LowPart, // d _ULONG( LengthHigh ); // Number of bytes to [un]lock (high) OrdinaryExchange->AssertLocks.NextLockRange.HighPart, // d _ULONG( LengthLow ); // Number of bytes to [un]lock (low) OrdinaryExchange->AssertLocks.NextLockRange.LowPart, // } NTLOCKING_ANDX_RANGE; 0 ); } else { MRxSmbStuffSMB (StufferState, "wdd?", MRXSMB_PROCESS_ID , // typedef struct _LOCKING_ANDX_RANGE { // w _USHORT( Pid ); // PID of process "owning" lock // d _ULONG( Offset ); // Ofset to bytes to [un]lock OrdinaryExchange->AssertLocks.NextLockOffset.LowPart, // d _ULONG( Length ); // Number of bytes to [un]lock OrdinaryExchange->AssertLocks.NextLockRange.LowPart, // } LOCKING_ANDX_RANGE; 0 ); } ASSERT_ORDINARY_EXCHANGE ( OrdinaryExchange ); OrdinaryExchange->AssertLocks.NumberOfLocksPlaced += 1; SmbPutUshort(PtrToLockCount, (USHORT)(OrdinaryExchange->AssertLocks.NumberOfLocksPlaced)); OrdinaryExchange->AssertLocks.LockAreaNonEmpty = FALSE; ASSERT_ORDINARY_EXCHANGE ( OrdinaryExchange ); } MRxSmbStuffSMB (StufferState, "!", 0); //fill in the bytecount MRxSmbDumpStufferState (700,"SMB w/ NTLOCKS&X(assertingbuffered) after stuffing",StufferState); FINALLY: RxDbgTraceUnIndent(-1, Dbg); return(Status); } NTSTATUS SmbPseExchangeStart_Locks( SMBPSE_ORDINARY_EXCHANGE_ARGUMENT_SIGNATURE ) /*++ Routine Description: This is the start routine for locks AND for flush. Arguments: pExchange - the exchange instance Return Value: RXSTATUS - The return status for the operation --*/ { NTSTATUS Status; PSMBSTUFFER_BUFFER_STATE StufferState = &OrdinaryExchange->AssociatedStufferState; PLOWIO_CONTEXT LowIoContext = &RxContext->LowIoContext; ULONG StartEntryCount; SMB_PSE_ORDINARY_EXCHANGE_TYPE OEType; PSMB_PSE_OE_READWRITE rw = &OrdinaryExchange->ReadWrite; PSMBCE_SERVER pServer = SmbCeGetExchangeServer(OrdinaryExchange); RxCaptureFcb; RxCaptureFobx; PMRX_SRV_OPEN SrvOpen = capFobx->pSrvOpen; BOOLEAN SynchronousIo = !BooleanFlagOn(RxContext->Flags,RX_CONTEXT_FLAG_ASYNC_OPERATION); PAGED_CODE(); RxDbgTrace(+1, Dbg, ("SmbPseExchangeStart_Locks\n", 0 )); ASSERT(OrdinaryExchange->Type == ORDINARY_EXCHANGE); ASSERT( (OrdinaryExchange->SmbCeFlags&SMBCE_EXCHANGE_ATTEMPT_RECONNECTS) == 0 ); OrdinaryExchange->StartEntryCount++; StartEntryCount = OrdinaryExchange->StartEntryCount; // Ensure that the Fid is validated SetFlag(OrdinaryExchange->Flags,SMBPSE_OE_FLAG_VALIDATE_FID); for (;;) { switch (OrdinaryExchange->OpSpecificState) { case SmbPseOEInnerIoStates_Initial: OrdinaryExchange->OpSpecificState = SmbPseOEInnerIoStates_ReadyToSend; if (!SynchronousIo) { OrdinaryExchange->AsyncResumptionRoutine = SmbPseExchangeStart_Locks; } MRxSmbSetInitialSMB(StufferState STUFFERTRACE(Dbg,'FC')); rw->LockList = LowIoContext->ParamsFor.Locks.LockList; //lack of break is intentional case SmbPseOEInnerIoStates_ReadyToSend: OrdinaryExchange->OpSpecificState = SmbPseOEInnerIoStates_OperationOutstanding; OrdinaryExchange->SendOptions = MRxSmbLockSendOptions; switch (OrdinaryExchange->EntryPoint) { case SMBPSE_OE_FROM_FLUSH: OEType = SMBPSE_OETYPE_FLUSH; COVERED_CALL(MRxSmbBuildFlush(StufferState)); break; case SMBPSE_OE_FROM_ASSERTBUFFEREDLOCKS: OEType = SMBPSE_OETYPE_ASSERTBUFFEREDLOCKS; COVERED_CALL(MRxSmbBuildLockAssert(StufferState)); if ((OrdinaryExchange->AssertLocks.EndOfListReached) && (OrdinaryExchange->AssertLocks.NumberOfLocksPlaced == 0) ) { OrdinaryExchange->SendOptions = RXCE_SEND_SYNCHRONOUS; OrdinaryExchange->SmbCeFlags |= SMBCE_EXCHANGE_MID_VALID; OrdinaryExchange->Mid = SMBCE_OPLOCK_RESPONSE_MID; OrdinaryExchange->Flags |= SMBPSE_OE_FLAG_NO_RESPONSE_EXPECTED; *(OrdinaryExchange->AssertLocks.PtrToLockType) |= 2; } break; case SMBPSE_OE_FROM_LOCKS: OEType = SMBPSE_OETYPE_LOCKS; switch (LowIoContext->Operation) { case LOWIO_OP_SHAREDLOCK: case LOWIO_OP_EXCLUSIVELOCK: ASSERT (MRxSmbIsLockRealizable( capFcb, (PLARGE_INTEGER)&LowIoContext->ParamsFor.Locks.ByteOffset, (PLARGE_INTEGER)&LowIoContext->ParamsFor.Locks.Length, LowIoContext->ParamsFor.Locks.Flags ) == STATUS_SUCCESS); //lack of break is intentional........... case LOWIO_OP_UNLOCK: rw->LockList = NULL; COVERED_CALL(MRxSmbBuildLocksAndX(StufferState)); break; case LOWIO_OP_UNLOCK_MULTIPLE: { RxDbgTrace(0, Dbg, ("--->in locks_start, remaining locklist=%08lx\n", rw->LockList)); ASSERT( rw->LockList != NULL ); COVERED_CALL(MRxSmbBuildLocksAndX(StufferState)); break; } default: ASSERT(!"Bad lowio op for locks\n"); Status = STATUS_NOT_IMPLEMENTED; goto FINALLY; } break; default: ASSERT(!"Bad entrypoint for locks_start\n"); Status = STATUS_NOT_IMPLEMENTED; goto FINALLY; } Status = SmbPseOrdinaryExchange(SMBPSE_ORDINARY_EXCHANGE_ARGUMENTS, OEType ); if (Status==STATUS_PENDING) { ASSERT(!SynchronousIo); goto FINALLY; } //lack of break is intentional case SmbPseOEInnerIoStates_OperationOutstanding: OrdinaryExchange->OpSpecificState = SmbPseOEInnerIoStates_ReadyToSend; Status = OrdinaryExchange->SmbStatus; switch (OrdinaryExchange->EntryPoint) { case SMBPSE_OE_FROM_FLUSH: goto FINALLY; //break; case SMBPSE_OE_FROM_ASSERTBUFFEREDLOCKS: if ((OrdinaryExchange->AssertLocks.EndOfListReached) && (OrdinaryExchange->AssertLocks.NumberOfLocksPlaced == 0) ) { goto FINALLY; } MRxSmbSetInitialSMB(StufferState STUFFERTRACE(Dbg,0)); break; case SMBPSE_OE_FROM_LOCKS: // if the locklist is empty. we can get out. this can happen either because we're not using // the locklist OR because we advance to the end of the list. that's why there are two checks if (rw->LockList == NULL) goto FINALLY; rw->LockList = rw->LockList->Next; if (rw->LockList == 0) goto FINALLY; if (Status != STATUS_SUCCESS) { goto FINALLY; } MRxSmbSetInitialSMB(StufferState STUFFERTRACE(Dbg,0)); break; //default: // ASSERT(!"Bad entrypoint for locks_start\n"); // Status = RxStatus(NOT_IMPLEMENTED); // goto FINALLY; } break; } } FINALLY: if ( Status != STATUS_PENDING ) { SmbPseAsyncCompletionIfNecessary(OrdinaryExchange,RxContext); } RxDbgTrace(-1, Dbg, ("SmbPseExchangeStart_Locks exit w %08lx\n", Status )); return Status; } NTSTATUS MRxSmbFinishLocks ( PSMB_PSE_ORDINARY_EXCHANGE OrdinaryExchange, PRESP_LOCKING_ANDX Response ) /*++ Routine Description: This routine actually gets the stuff out of the Close response and finishes the locks. Arguments: OrdinaryExchange - the exchange instance Response - the response Return Value: RXSTATUS - The return status for the operation --*/ { NTSTATUS Status = STATUS_SUCCESS; PAGED_CODE(); RxDbgTrace(+1, Dbg, ("MRxSmbFinishLocks\n")); SmbPseOEAssertConsistentLinkageFromOE("MRxSmbFinishLocks:"); if (Response->WordCount != 2) { Status = STATUS_INVALID_NETWORK_RESPONSE; OrdinaryExchange->Status = STATUS_INVALID_NETWORK_RESPONSE; } RxDbgTrace(-1, Dbg, ("MRxSmbFinishLocks returning %08lx\n", Status )); return Status; } NTSTATUS MRxSmbCompleteBufferingStateChangeRequest( IN OUT PRX_CONTEXT RxContext, IN OUT PMRX_SRV_OPEN SrvOpen, IN PVOID pContext ) /*++ Routine Description: This routine is called to assert the locks that the wrapper has buffered. currently, it is synchronous! Arguments: RxContext - the open instance SrvOpen - tells which fcb is to be used. LockEnumerator - the routine to call to get the locks Return Value: RXSTATUS - The return status for the operation --*/ { NTSTATUS Status = STATUS_SUCCESS; PSMBSTUFFER_BUFFER_STATE StufferState = NULL; PMRX_FCB Fcb = SrvOpen->pFcb; PMRX_SMB_FCB smbFcb = MRxSmbGetFcbExtension(Fcb); USHORT NewOplockLevel = (USHORT)(pContext); PMRX_SMB_SRV_OPEN smbSrvOpen = MRxSmbGetSrvOpenExtension(SrvOpen); PSMB_PSE_ORDINARY_EXCHANGE OrdinaryExchange; PAGED_CODE(); RxDbgTrace(+1, Dbg, ("MRxSmbCompleteBufferingStateChangeRequest\n", 0 )); ASSERT( NodeType(SrvOpen) == RDBSS_NTC_SRVOPEN ); RxDbgTrace(0,Dbg,("@@@@@@ Old Level (%lx) to New Level %lx @@@@\n",smbSrvOpen->OplockLevel,NewOplockLevel)); smbFcb->LastOplockLevel = NewOplockLevel; if ((smbSrvOpen->OplockLevel == SMB_OPLOCK_LEVEL_II) && (NewOplockLevel == SMB_OPLOCK_LEVEL_NONE)) { return STATUS_SUCCESS; } smbSrvOpen->OplockLevel = (UCHAR)NewOplockLevel; Status = SmbPseCreateOrdinaryExchange(RxContext, SrvOpen->pVNetRoot, SMBPSE_OE_FROM_ASSERTBUFFEREDLOCKS, SmbPseExchangeStart_Locks, &OrdinaryExchange ); if (Status != STATUS_SUCCESS) { RxDbgTrace(-1, Dbg, ("Couldn't get the smb buf!\n")); return(Status); } // The SERVER has a time window of 45 seconds associated with OPLOCK responses. // During this period oplock responses ( the last packet ) do not elicit any // response. If the response at the server is received after this window has // elapsed the OPLOCK response will elicit a normal LOCKING_ANDX response from // the server. In order to simplify the MID reuse logic at the clients without // violating the OPLOCK semantics, all the final responses are sent on a special // MID(0xffff). Any response received with this MID is accepted by default and this // MID is not used further. OrdinaryExchange->SmbCeFlags &= ~SMBCE_EXCHANGE_REUSE_MID; OrdinaryExchange->AssertLocks.LockEnumerator = RxLockEnumerator; OrdinaryExchange->AssertLocks.SrvOpen = SrvOpen; Status = SmbPseInitiateOrdinaryExchange(OrdinaryExchange); ASSERT (Status!=STATUS_PENDING); if (Status!=STATUS_PENDING) { BOOLEAN FinalizationComplete = SmbPseFinalizeOrdinaryExchange(OrdinaryExchange); ASSERT(FinalizationComplete); } RxDbgTrace(-1, Dbg, ("MRxSmbAssertBufferedFileLocks exit with status=%08lx\n", Status )); return(Status); } #undef Dbg #define Dbg (DEBUG_TRACE_FLUSH) NTSTATUS MRxSmbBuildFlush ( PSMBSTUFFER_BUFFER_STATE StufferState ) /*++ Routine Description: This builds a Flush SMB. we don't have to worry about login id and such since that is done by the connection engine....pretty neat huh? all we have to do is to format up the bits. Arguments: StufferState - the state of the smbbuffer from the stuffer's point of view Return Value: RXSTATUS SUCCESS NOT_IMPLEMENTED something has appeared in the arguments that i can't handle Notes: --*/ { NTSTATUS Status; PRX_CONTEXT RxContext = StufferState->RxContext; RxCaptureFcb;RxCaptureFobx; PMRX_SRV_OPEN SrvOpen = capFobx->pSrvOpen; PMRX_SMB_SRV_OPEN smbSrvOpen = MRxSmbGetSrvOpenExtension(SrvOpen); PAGED_CODE(); RxDbgTrace(+1, Dbg, ("MRxSmbBuildFlush\n", 0 )); ASSERT( NodeType(SrvOpen) == RDBSS_NTC_SRVOPEN ); COVERED_CALL(MRxSmbStartSMBCommand (StufferState,SetInitialSMB_Never, SMB_COM_FLUSH, SMB_REQUEST_SIZE(FLUSH), NO_EXTRA_DATA,SMB_BEST_ALIGNMENT(1,0),RESPONSE_HEADER_SIZE_NOT_SPECIFIED, 0,0,0,0 STUFFERTRACE(Dbg,'FC')) ); MRxSmbDumpStufferState (1100,"SMB w/ FLUSH before stuffing",StufferState); MRxSmbStuffSMB (StufferState, "0wB!", // 0 UCHAR WordCount; // Count of parameter words = 1 smbSrvOpen->Fid, // w _USHORT( Fid ); // File handle SMB_WCT_CHECK(1) 0 // B _USHORT( ByteCount ); // Count of data bytes = 0 // UCHAR Buffer[1]; // empty ); MRxSmbDumpStufferState (700,"SMB w/ FLUSH after stuffing",StufferState); FINALLY: RxDbgTraceUnIndent(-1,Dbg); return(Status); } NTSTATUS MRxSmbFlush( IN PRX_CONTEXT RxContext) /*++ Routine Description: This routine handles network requests for file flush Arguments: RxContext - the RDBSS context Return Value: RXSTATUS - The return status for the operation --*/ { NTSTATUS Status = STATUS_SUCCESS; RxCaptureFcb; RxCaptureFobx; PMRX_SRV_OPEN SrvOpen = capFobx->pSrvOpen; NODE_TYPE_CODE TypeOfOpen = NodeType(capFcb); PSMB_PSE_ORDINARY_EXCHANGE OrdinaryExchange; PAGED_CODE(); RxDbgTrace(+1, Dbg, ("MRxSmbFlush\n")); if (TypeOfOpen == RDBSS_NTC_SPOOLFILE) { //we don't buffer spoolfiles....just get out.... RxDbgTrace(-1, Dbg, ("MRxSmbFlush exit on spoolfile\n")); return(STATUS_SUCCESS); } ASSERT( NodeType(capFobx->pSrvOpen) == RDBSS_NTC_SRVOPEN ); Status = SmbPseCreateOrdinaryExchange(RxContext, SrvOpen->pVNetRoot, SMBPSE_OE_FROM_FLUSH, SmbPseExchangeStart_Locks, &OrdinaryExchange ); if (Status != STATUS_SUCCESS) { RxDbgTrace(-1, Dbg, ("Couldn't get the smb buf!\n")); return(Status); } Status = SmbPseInitiateOrdinaryExchange(OrdinaryExchange); ASSERT (Status!=STATUS_PENDING); if (Status!=STATUS_PENDING) { BOOLEAN FinalizationComplete = SmbPseFinalizeOrdinaryExchange(OrdinaryExchange); ASSERT(FinalizationComplete); } RxDbgTrace(-1, Dbg, ("MRxSmbFlush exit with status=%08lx\n", Status )); return(Status); } NTSTATUS MRxSmbIsLockRealizable ( IN OUT PMRX_FCB pFcb, IN PLARGE_INTEGER ByteOffset, IN PLARGE_INTEGER Length, IN ULONG LowIoLockFlags ) { PSMBCEDB_SERVER_ENTRY pServerEntry; ULONG DialectFlags; PAGED_CODE(); pServerEntry = SmbCeGetAssociatedServerEntry(pFcb->pNetRoot->pSrvCall); DialectFlags = pServerEntry->Server.DialectFlags; //nt servers implement all types of locks if (FlagOn(DialectFlags,DF_NT_SMBS)) { return(STATUS_SUCCESS); } //nonnt servers do not handle 64bit locks or 0-length locks if ( (ByteOffset->HighPart!=0) || (Length->HighPart!=0) || (Length->QuadPart==0) ) { return(STATUS_NOT_SUPPORTED); } // Lanman 2.0 pinball servers don't support shared locks (even // though Lanman 2.0 FAT servers support them). As a result, // we cannot support shared locks to Lanman servers. // if (!FlagOn(DialectFlags,DF_LANMAN21) && !FlagOn(LowIoLockFlags,LOWIO_LOCKSFLAG_EXCLUSIVELOCK)) { return(STATUS_NOT_SUPPORTED); } // if a server cannot do lockingAndX, then we can't do // !FailImmediately because there's no timeout if (!FlagOn(DialectFlags,DF_LANMAN20) && !FlagOn(LowIoLockFlags,LOWIO_LOCKSFLAG_FAIL_IMMEDIATELY)) { return(STATUS_NOT_SUPPORTED); } return(STATUS_SUCCESS); }