You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
1744 lines
48 KiB
1744 lines
48 KiB
/*++
|
|
|
|
Copyright (c) 1991-1992 Microsoft Corporation
|
|
|
|
Module Name:
|
|
|
|
browser.c
|
|
|
|
Abstract:
|
|
|
|
This module contains the worker routines for the NetWksta APIs
|
|
implemented in the Workstation service.
|
|
|
|
Author:
|
|
|
|
Rita Wong (ritaw) 20-Feb-1991
|
|
|
|
Revision History:
|
|
|
|
--*/
|
|
|
|
#include "precomp.h"
|
|
#pragma hdrstop
|
|
#include <lmuse.h> // NetUseDel
|
|
|
|
|
|
//-------------------------------------------------------------------//
|
|
// //
|
|
// Local structure definitions //
|
|
// //
|
|
//-------------------------------------------------------------------//
|
|
|
|
// Used to throttle our event logging in the case of unexpected network outages
|
|
#define BR_LIST_RETRIEVAL_ERROR_MAX 4
|
|
|
|
//-------------------------------------------------------------------//
|
|
// //
|
|
// Local function prototypes //
|
|
// //
|
|
//-------------------------------------------------------------------//
|
|
|
|
|
|
VOID
|
|
CompleteAsyncBrowserIoControl(
|
|
IN PVOID ApcContext,
|
|
IN PIO_STATUS_BLOCK IoStatusBlock,
|
|
IN ULONG Reserved
|
|
);
|
|
|
|
VOID
|
|
BecomeBackupCompletion (
|
|
IN PVOID Ctx
|
|
);
|
|
|
|
|
|
VOID
|
|
ChangeBrowserRole (
|
|
IN PVOID Ctx
|
|
);
|
|
|
|
NET_API_STATUS
|
|
PostWaitForNewMasterName(
|
|
PNETWORK Network,
|
|
LPWSTR MasterName OPTIONAL
|
|
);
|
|
|
|
VOID
|
|
NewMasterCompletionRoutine(
|
|
IN PVOID Ctx
|
|
);
|
|
|
|
NET_API_STATUS
|
|
BrRetrieveInterimServerList(
|
|
IN PNETWORK Network,
|
|
IN ULONG ServerType
|
|
);
|
|
|
|
//-------------------------------------------------------------------//
|
|
// //
|
|
// Global function prototypes //
|
|
// //
|
|
//-------------------------------------------------------------------//
|
|
|
|
NET_API_STATUS
|
|
BrBecomeBackup(
|
|
IN PNETWORK Network
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
This function performs all the operations needed to make a browser server
|
|
a backup browser server when starting the browser from scratch.
|
|
|
|
Arguments:
|
|
|
|
Network - Network to become backup browser for
|
|
|
|
Return Value:
|
|
|
|
Status - The status of the operation.
|
|
|
|
--*/
|
|
{
|
|
NET_API_STATUS Status;
|
|
|
|
//
|
|
// Checkpoint the service controller - this gives us 30 seconds/transport
|
|
// before the service controller gets unhappy.
|
|
//
|
|
|
|
(void) BrGiveInstallHints( SERVICE_START_PENDING );
|
|
|
|
if (!LOCK_NETWORK(Network)) {
|
|
return NERR_InternalError;
|
|
}
|
|
|
|
//
|
|
// We want to ignore any failures from becoming a backup browser.
|
|
//
|
|
// We do this because we will fail to become a backup on a disconnected
|
|
// (or connected) RAS link, and if we failed this routine, we would
|
|
// fail to start at all.
|
|
//
|
|
// We will handle failure to become a backup in a "reasonable manner"
|
|
// inside BecomeBackup.
|
|
//
|
|
|
|
BecomeBackup(Network, NULL);
|
|
|
|
UNLOCK_NETWORK(Network);
|
|
|
|
return NERR_Success;
|
|
|
|
}
|
|
|
|
NET_API_STATUS
|
|
BecomeBackup(
|
|
IN PNETWORK Network,
|
|
IN PVOID Context
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
This function performs all the operations needed to make a browser server
|
|
a backup browser server
|
|
|
|
Arguments:
|
|
|
|
None.
|
|
|
|
Return Value:
|
|
|
|
Status - The status of the operation.
|
|
|
|
|
|
NOTE:::: THIS ROUTINE IS CALLED WITH THE NETWORK STRUCTURE LOCKED!!!!!
|
|
|
|
|
|
--*/
|
|
{
|
|
NET_API_STATUS Status = NERR_Success;
|
|
PUNICODE_STRING MasterName = Context;
|
|
|
|
BrPrint(( BR_BACKUP,
|
|
"%ws: %ws: BecomeBackup called\n",
|
|
Network->DomainInfo->DomUnicodeDomainName,
|
|
Network->NetworkName.Buffer));
|
|
|
|
if (Network->TimeStoppedBackup != 0 &&
|
|
(BrCurrentSystemTime() - Network->TimeStoppedBackup) <= (BrInfo.BackupBrowserRecoveryTime / 1000)) {
|
|
|
|
//
|
|
// We stopped being a backup too recently for us to restart being
|
|
// a backup again, so just return a generic error.
|
|
//
|
|
|
|
//
|
|
// Before we return, make sure we're not a backup in the eyes of
|
|
// the browser.
|
|
//
|
|
|
|
BrPrint(( BR_BACKUP,
|
|
"%ws: %ws: can't BecomeBackup since we were backup recently.\n",
|
|
Network->DomainInfo->DomUnicodeDomainName,
|
|
Network->NetworkName.Buffer));
|
|
BrStopBackup(Network);
|
|
|
|
return ERROR_ACCESS_DENIED;
|
|
|
|
}
|
|
|
|
//
|
|
// If we know the name of the master, then we must have become a backup
|
|
// after being a potential, in which case we already have a
|
|
// becomemaster request outstanding.
|
|
//
|
|
|
|
if (MasterName == NULL) {
|
|
|
|
//
|
|
// Post a BecomeMaster request for each server. This will complete
|
|
// when the machine becomes the master browser server (ie. it wins an
|
|
// election).
|
|
//
|
|
|
|
//
|
|
// Please note that we only post it if the machine is a backup -
|
|
// if it's a potential master, then the become master will have
|
|
// already been posted.
|
|
//
|
|
|
|
Status = PostBecomeMaster(Network);
|
|
|
|
if (Status != NERR_Success) {
|
|
|
|
return(Status);
|
|
}
|
|
|
|
//
|
|
// Find out the name of the master on each network. This will force an
|
|
// election if necessary. Please note that we must post the BecomeMaster
|
|
// IoControl first to allow us to handle an election.
|
|
//
|
|
|
|
//
|
|
// We unlock the network, because this may cause us to become promoted
|
|
// to a master.
|
|
//
|
|
|
|
BrPrint(( BR_BACKUP,
|
|
"%ws: %ws: FindMaster called from BecomeBackup\n",
|
|
Network->DomainInfo->DomUnicodeDomainName,
|
|
Network->NetworkName.Buffer));
|
|
|
|
UNLOCK_NETWORK(Network);
|
|
|
|
Status = GetMasterServerNames(Network);
|
|
|
|
if (Status != NERR_Success) {
|
|
|
|
//
|
|
// Re-lock the network structure so we will return with the
|
|
// network locked.
|
|
//
|
|
|
|
if (!LOCK_NETWORK(Network)) {
|
|
return NERR_InternalError;
|
|
}
|
|
|
|
//
|
|
// We couldn't find who the master is. Stop being a backup now.
|
|
//
|
|
|
|
BrPrint(( BR_BACKUP,
|
|
"%ws: %ws: can't BecomeBackup since we can't find master.\n",
|
|
Network->DomainInfo->DomUnicodeDomainName,
|
|
Network->NetworkName.Buffer));
|
|
|
|
BrStopBackup(Network);
|
|
|
|
//
|
|
// If we're a master now, we should return success. We've not
|
|
// become a backup, but it wasn't an error.
|
|
//
|
|
// ERROR_MORE_DATA is the mapping for
|
|
// STATUS_MORE_PROCESSING_REQUIRED which is returned when this
|
|
// situation happens.
|
|
//
|
|
|
|
if ((Status == ERROR_MORE_DATA) || (Network->Role & ROLE_MASTER)) {
|
|
Status = NERR_Success;
|
|
}
|
|
|
|
return(Status);
|
|
}
|
|
|
|
if (!LOCK_NETWORK(Network)) {
|
|
return NERR_InternalError;
|
|
}
|
|
|
|
//
|
|
// We managed to become a master. We want to return right away.
|
|
//
|
|
|
|
if (Network->Role & ROLE_MASTER) {
|
|
|
|
return NERR_Success;
|
|
}
|
|
|
|
}
|
|
|
|
#ifdef notdef
|
|
//
|
|
// ?? For now, we'll always PostForRoleChange on all transports regardless
|
|
// of role.
|
|
// We not only need to do it here. But we need to do it when we become
|
|
// the master so we can find out when we loose an election.
|
|
//
|
|
|
|
|
|
//
|
|
// We're now a backup, we need to issue an API that will complete if the
|
|
// browse master doesn't like us (and thus forces us to shutdown).
|
|
//
|
|
//
|
|
|
|
PostWaitForRoleChange ( Network );
|
|
#endif // notdef
|
|
|
|
PostWaitForNewMasterName(Network, Network->UncMasterBrowserName );
|
|
|
|
//
|
|
// Unlock the network structure before calling BackupBrowserTimerRoutine.
|
|
//
|
|
|
|
UNLOCK_NETWORK(Network);
|
|
|
|
//
|
|
// Run the timer that causes the browser to download a new browse list
|
|
// from the master. This will seed our server and domain lists to
|
|
// guarantee that any clients have a reasonable list. It will also
|
|
// restart the timer to announce later on.
|
|
//
|
|
|
|
Status = BackupBrowserTimerRoutine(Network);
|
|
|
|
if (!LOCK_NETWORK(Network)) {
|
|
return NERR_InternalError;
|
|
}
|
|
|
|
if (Status == NERR_Success) {
|
|
|
|
// Might not be since we dropped the lock.
|
|
// ASSERT (Network->Role & ROLE_BACKUP);
|
|
|
|
//
|
|
// We're now a backup server, announce ourselves as such.
|
|
//
|
|
|
|
Status = BrUpdateNetworkAnnouncementBits(Network, 0);
|
|
|
|
if (Status != NERR_Success) {
|
|
|
|
BrPrint(( BR_CRITICAL,
|
|
"%ws: %ws: Unable to become backup: %ld\n",
|
|
Network->DomainInfo->DomUnicodeDomainName,
|
|
Network->NetworkName.Buffer,
|
|
Status));
|
|
|
|
if (Network->Role & ROLE_BACKUP) {
|
|
|
|
//
|
|
// We were unable to become a backup.
|
|
//
|
|
// We need to back out and become a potential browser now.
|
|
//
|
|
//
|
|
|
|
BrPrint(( BR_BACKUP,
|
|
"%ws: %ws: can't BecomeBackup since we can't update announce bits.\n",
|
|
Network->DomainInfo->DomUnicodeDomainName,
|
|
Network->NetworkName.Buffer));
|
|
BrStopBackup(Network);
|
|
|
|
//
|
|
// Make sure that we're going to become a potential browser
|
|
// (we might not if we're an advanced server).
|
|
//
|
|
|
|
PostBecomeBackup(Network);
|
|
|
|
}
|
|
}
|
|
|
|
return Status;
|
|
|
|
}
|
|
|
|
return Status;
|
|
}
|
|
|
|
|
|
NET_API_STATUS
|
|
BrBecomePotentialBrowser (
|
|
IN PVOID TimerContext
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
This routine is called when a machine has stopped being a backup browser.
|
|
|
|
It runs after a reasonable timeout period has elapsed, and marks the
|
|
machine as a potential browser.
|
|
|
|
Arguments:
|
|
|
|
None.
|
|
|
|
Return Value:
|
|
|
|
Status - The status of the operation.
|
|
|
|
|
|
--*/
|
|
|
|
{
|
|
IN PNETWORK Network = TimerContext;
|
|
NET_API_STATUS Status;
|
|
|
|
//
|
|
// Prevent the network from being deleted while we're in this timer routine.
|
|
//
|
|
if ( BrReferenceNetwork( Network ) == NULL ) {
|
|
return NERR_InternalError;
|
|
}
|
|
|
|
|
|
//
|
|
// Mark this guy as a potential browser.
|
|
//
|
|
|
|
try {
|
|
|
|
if (!LOCK_NETWORK(Network)) {
|
|
try_return(Status = NERR_InternalError );
|
|
}
|
|
|
|
BrPrint(( BR_BACKUP,
|
|
"%ws: %ws: BrBecomePotentialBrowser called\n",
|
|
Network->DomainInfo->DomUnicodeDomainName,
|
|
Network->NetworkName.Buffer));
|
|
|
|
//
|
|
// Reset that we've stopped being a backup, since it's been long
|
|
// enough.
|
|
//
|
|
|
|
Network->TimeStoppedBackup = 0;
|
|
|
|
if (BrInfo.MaintainServerList == 0) {
|
|
Network->Role |= ROLE_POTENTIAL_BACKUP;
|
|
|
|
Status = BrUpdateNetworkAnnouncementBits(Network, 0);
|
|
|
|
if (Status != NERR_Success) {
|
|
BrPrint(( BR_BACKUP,
|
|
"%ws: %ws: Unable to reset backup announcement bits: %ld\n",
|
|
Network->DomainInfo->DomUnicodeDomainName,
|
|
Network->NetworkName.Buffer,
|
|
Status));
|
|
try_return(Status);
|
|
}
|
|
} else {
|
|
|
|
//
|
|
// If we're configured to be a backup browser, then we want to
|
|
// become a backup once again.
|
|
//
|
|
|
|
BecomeBackup(Network, NULL);
|
|
}
|
|
|
|
|
|
Status = NO_ERROR;
|
|
try_exit:NOTHING;
|
|
} finally {
|
|
UNLOCK_NETWORK(Network);
|
|
BrDereferenceNetwork( Network );
|
|
}
|
|
|
|
return Status;
|
|
}
|
|
|
|
NET_API_STATUS
|
|
BrStopBackup (
|
|
IN PNETWORK Network
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
This routine is called to stop a machine from being a backup browser.
|
|
|
|
It is typically called after some form of error has occurred while
|
|
running as a browser to make sure that we aren't telling anyone that
|
|
we're a backup browser.
|
|
|
|
We are also called when we receive a "reset state" tickle packet.
|
|
|
|
Arguments:
|
|
|
|
Network - The network being shut down.
|
|
|
|
Return Value:
|
|
|
|
Status - The status of the operation.
|
|
|
|
--*/
|
|
{
|
|
NET_API_STATUS Status;
|
|
|
|
//
|
|
// This guy is shutting down - set his role to 0 and announce.
|
|
//
|
|
|
|
if (!LOCK_NETWORK(Network)) {
|
|
return NERR_InternalError;
|
|
}
|
|
|
|
try {
|
|
|
|
BrPrint(( BR_BACKUP,
|
|
"%ws: %ws: BrStopBackup called\n",
|
|
Network->DomainInfo->DomUnicodeDomainName,
|
|
Network->NetworkName.Buffer));
|
|
|
|
Network->Role &= ~(ROLE_BACKUP|ROLE_POTENTIAL_BACKUP);
|
|
|
|
Status = BrUpdateNetworkAnnouncementBits( Network, 0 );
|
|
|
|
if (Status != NERR_Success) {
|
|
BrPrint(( BR_CRITICAL,
|
|
"%ws: %ws: Unable to clear backup announcement bits: %ld\n",
|
|
Network->DomainInfo->DomUnicodeDomainName,
|
|
Network->NetworkName.Buffer,
|
|
Status));
|
|
try_return(Status);
|
|
}
|
|
|
|
|
|
Status = BrCancelTimer(&Network->BackupBrowserTimer);
|
|
|
|
if (Status != NERR_Success) {
|
|
BrPrint(( BR_CRITICAL,
|
|
"%ws: %ws: Unable to clear backup browser timer: %ld\n",
|
|
Network->DomainInfo->DomUnicodeDomainName,
|
|
Network->NetworkName.Buffer,
|
|
Status));
|
|
try_return(Status);
|
|
}
|
|
|
|
if (Network->BackupDomainList != NULL) {
|
|
|
|
NetApiBufferFree(Network->BackupDomainList);
|
|
|
|
Network->BackupDomainList = NULL;
|
|
|
|
Network->TotalBackupDomainListEntries = 0;
|
|
}
|
|
|
|
if (Network->BackupServerList != NULL) {
|
|
NetApiBufferFree(Network->BackupServerList);
|
|
|
|
Network->BackupServerList = NULL;
|
|
|
|
Network->TotalBackupServerListEntries = 0;
|
|
}
|
|
|
|
BrDestroyResponseCache(Network);
|
|
|
|
//
|
|
// After our recovery time, we can become a potential browser again.
|
|
//
|
|
|
|
Status = BrSetTimer(&Network->BackupBrowserTimer, BrInfo.BackupBrowserRecoveryTime, BrBecomePotentialBrowser, Network);
|
|
|
|
if (Status != NERR_Success) {
|
|
BrPrint(( BR_CRITICAL,
|
|
"%ws: %ws: Unable to clear backup browser timer: %ld\n",
|
|
Network->DomainInfo->DomUnicodeDomainName,
|
|
Network->NetworkName.Buffer,
|
|
Status));
|
|
try_return(Status);
|
|
}
|
|
|
|
|
|
try_exit:NOTHING;
|
|
} finally {
|
|
//
|
|
// Remember when we were asked to stop being a backup browser.
|
|
//
|
|
|
|
Network->TimeStoppedBackup = BrCurrentSystemTime();
|
|
|
|
UNLOCK_NETWORK(Network);
|
|
}
|
|
|
|
return Status;
|
|
|
|
}
|
|
|
|
|
|
NET_API_STATUS
|
|
BackupBrowserTimerRoutine (
|
|
IN PVOID TimerContext
|
|
)
|
|
{
|
|
IN PNETWORK Network = TimerContext;
|
|
NET_API_STATUS Status;
|
|
PVOID ServerList = NULL;
|
|
BOOLEAN NetworkLocked = FALSE;
|
|
|
|
#ifdef ENABLE_PSEUDO_BROWSER
|
|
if ( BrInfo.PseudoServerLevel == BROWSER_PSEUDO ) {
|
|
//
|
|
// No-op for Pseudo server
|
|
//
|
|
BrFreeNetworkTables(Network);
|
|
return NERR_Success;
|
|
}
|
|
#endif
|
|
//
|
|
// Prevent the network from being deleted while we're in this timer routine.
|
|
//
|
|
if ( BrReferenceNetwork( Network ) == NULL ) {
|
|
return NERR_InternalError;
|
|
}
|
|
|
|
try {
|
|
|
|
if (!LOCK_NETWORK(Network)) {
|
|
try_return(Status = NERR_InternalError );
|
|
}
|
|
|
|
NetworkLocked = TRUE;
|
|
|
|
ASSERT (Network->LockCount == 1);
|
|
|
|
ASSERT ( NetpIsUncComputerNameValid( Network->UncMasterBrowserName ) );
|
|
|
|
BrPrint(( BR_BACKUP,
|
|
"%ws: %ws: BackupBrowserTimerRoutine called\n",
|
|
Network->DomainInfo->DomUnicodeDomainName,
|
|
Network->NetworkName.Buffer));
|
|
|
|
//
|
|
// Make sure there's a become master oustanding.
|
|
//
|
|
|
|
PostBecomeMaster(Network);
|
|
|
|
//
|
|
// We managed to become a master by the time we locked the structure.
|
|
// We want to return right away.
|
|
//
|
|
|
|
if (Network->Role & ROLE_MASTER) {
|
|
try_return(Status = NERR_Success);
|
|
}
|
|
|
|
Status = BrRetrieveInterimServerList(Network, SV_TYPE_ALL);
|
|
|
|
//
|
|
// Bail out if we didn't get any new servers.
|
|
//
|
|
|
|
if (Status != NERR_Success && Status != ERROR_MORE_DATA) {
|
|
|
|
//
|
|
// Try again after an appropriate error delay.
|
|
//
|
|
|
|
try_return(Status);
|
|
}
|
|
|
|
//
|
|
// Now do everything that we did above for the server list for the
|
|
// list of domains.
|
|
//
|
|
|
|
Status = BrRetrieveInterimServerList(Network, SV_TYPE_DOMAIN_ENUM);
|
|
|
|
//
|
|
// We successfully updated the server and domain lists for this
|
|
// server. Now age all the cached domain entries out of the cache.
|
|
//
|
|
|
|
if (Status == NERR_Success || Status == ERROR_MORE_DATA) {
|
|
BrAgeResponseCache(Network);
|
|
}
|
|
|
|
try_return(Status);
|
|
|
|
try_exit:NOTHING;
|
|
} finally {
|
|
NET_API_STATUS NetStatus;
|
|
|
|
if (!NetworkLocked) {
|
|
if (!LOCK_NETWORK(Network)) {
|
|
Status = NERR_InternalError;
|
|
goto finally_exit;
|
|
}
|
|
|
|
NetworkLocked = TRUE;
|
|
}
|
|
|
|
//
|
|
// If the API succeeded, Mark that we're a backup and
|
|
// reset the timer.
|
|
//
|
|
|
|
if (Status == NERR_Success || Status == ERROR_MORE_DATA ) {
|
|
|
|
if ((Network->Role & ROLE_BACKUP) == 0) {
|
|
|
|
//
|
|
// If we weren't a backup, we are one now.
|
|
//
|
|
|
|
Network->Role |= ROLE_BACKUP;
|
|
|
|
Status = BrUpdateNetworkAnnouncementBits(Network, 0);
|
|
|
|
}
|
|
|
|
Network->NumberOfFailedBackupTimers = 0;
|
|
|
|
Network->TimeStoppedBackup = 0;
|
|
|
|
//
|
|
// Restart the timer for this domain.
|
|
//
|
|
|
|
NetStatus = BrSetTimer(&Network->BackupBrowserTimer, BrInfo.BackupPeriodicity*1000, BackupBrowserTimerRoutine, Network);
|
|
|
|
if (NetStatus != NERR_Success) {
|
|
BrPrint(( BR_CRITICAL,
|
|
"%ws: %ws: Unable to restart browser backup timer: %lx\n",
|
|
Network->DomainInfo->DomUnicodeDomainName,
|
|
Network->NetworkName.Buffer,
|
|
Status));
|
|
}
|
|
|
|
} else {
|
|
|
|
//
|
|
// We failed to retrieve a backup list, remember the failure and
|
|
// decide if it's been too many failures. If not, just log
|
|
// the error, if it has, stop being a backup browser.
|
|
//
|
|
|
|
Network->NumberOfFailedBackupTimers += 1;
|
|
|
|
if (Network->NumberOfFailedBackupTimers >= BACKUP_ERROR_FAILURE) {
|
|
LPWSTR SubStrings[1];
|
|
|
|
SubStrings[0] = Network->NetworkName.Buffer;
|
|
|
|
//
|
|
// This guy can't be a backup any more, bail out now.
|
|
//
|
|
|
|
BrLogEvent(EVENT_BROWSER_BACKUP_STOPPED, Status, 1, SubStrings);
|
|
|
|
BrPrint(( BR_BACKUP,
|
|
"%ws: %ws: BackupBrowserTimerRoutine retrieve backup list so stop being backup.\n",
|
|
Network->DomainInfo->DomUnicodeDomainName,
|
|
Network->NetworkName.Buffer));
|
|
BrStopBackup(Network);
|
|
} else {
|
|
//
|
|
// Restart the timer for this domain.
|
|
//
|
|
|
|
NetStatus = BrSetTimer(&Network->BackupBrowserTimer, BACKUP_ERROR_PERIODICITY*1000, BackupBrowserTimerRoutine, Network);
|
|
|
|
if (NetStatus != NERR_Success) {
|
|
BrPrint(( BR_CRITICAL,
|
|
"%ws: %ws: Unable to restart browser backup timer: %lx\n",
|
|
Network->DomainInfo->DomUnicodeDomainName,
|
|
Network->NetworkName.Buffer,
|
|
Status));
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (NetworkLocked) {
|
|
UNLOCK_NETWORK(Network);
|
|
}
|
|
|
|
BrDereferenceNetwork( Network );
|
|
finally_exit:;
|
|
}
|
|
|
|
return Status;
|
|
|
|
}
|
|
|
|
NET_API_STATUS
|
|
BrRetrieveInterimServerList(
|
|
IN PNETWORK Network,
|
|
IN ULONG ServerType
|
|
)
|
|
{
|
|
ULONG EntriesInList;
|
|
ULONG TotalEntriesInList;
|
|
ULONG RetryCount = 2;
|
|
TCHAR ServerName[UNCLEN+1];
|
|
WCHAR ShareName[UNCLEN+1+LM20_NNLEN];
|
|
LPTSTR TransportName;
|
|
BOOLEAN NetworkLocked = TRUE;
|
|
NET_API_STATUS Status;
|
|
PVOID Buffer = NULL;
|
|
ULONG ModifiedServerType = ServerType;
|
|
LPTSTR ModifiedTransportName;
|
|
|
|
ASSERT (Network->LockCount == 1);
|
|
|
|
|
|
#ifdef ENABLE_PSEUDO_BROWSER
|
|
if ( BrInfo.PseudoServerLevel == BROWSER_PSEUDO ) {
|
|
//
|
|
// No-op for Pseudo black hole server.
|
|
//
|
|
return NERR_Success;
|
|
}
|
|
#endif
|
|
|
|
wcscpy(ServerName, Network->UncMasterBrowserName );
|
|
|
|
BrPrint(( BR_BACKUP,
|
|
"%ws: %ws: BrRetrieveInterimServerList: UNC servername is %ws\n",
|
|
Network->DomainInfo->DomUnicodeDomainName,
|
|
Network->NetworkName.Buffer,
|
|
ServerName));
|
|
|
|
try {
|
|
|
|
TransportName = Network->NetworkName.Buffer;
|
|
ModifiedTransportName = TransportName;
|
|
//
|
|
// If this is direct host IPX,
|
|
// we remote the API over the Netbios IPX transport since
|
|
// the NT redir doesn't support direct host IPX.
|
|
//
|
|
|
|
if ( (Network->Flags & NETWORK_IPX) &&
|
|
Network->AlternateNetwork != NULL) {
|
|
|
|
//
|
|
// Use the alternate transport
|
|
//
|
|
|
|
ModifiedTransportName = Network->AlternateNetwork->NetworkName.Buffer;
|
|
|
|
//
|
|
// Tell the server to use it's alternate transport.
|
|
//
|
|
|
|
if ( ServerType == SV_TYPE_ALL ) {
|
|
ModifiedServerType = SV_TYPE_ALTERNATE_XPORT;
|
|
} else {
|
|
ModifiedServerType |= SV_TYPE_ALTERNATE_XPORT;
|
|
}
|
|
|
|
}
|
|
|
|
while (RetryCount--) {
|
|
|
|
//
|
|
// If we are promoted to master and fail to become the master,
|
|
// we will still be marked as being the master in our network
|
|
// structure, thus we should bail out of the loop in order
|
|
// to prevent us from looping back on ourselves.
|
|
//
|
|
|
|
if (STRICMP(&ServerName[2], Network->DomainInfo->DomUnicodeComputerName) == 0) {
|
|
|
|
if (NetworkLocked) {
|
|
UNLOCK_NETWORK(Network);
|
|
|
|
NetworkLocked = FALSE;
|
|
|
|
}
|
|
|
|
//
|
|
// We were unable to find the master. Attempt to find out who
|
|
// the master is. If there is none, this will force an
|
|
// election.
|
|
//
|
|
|
|
BrPrint(( BR_BACKUP,
|
|
"%ws: %ws: FindMaster called from BrRetrieveInterimServerList\n",
|
|
Network->DomainInfo->DomUnicodeDomainName,
|
|
Network->NetworkName.Buffer));
|
|
|
|
Status = GetMasterServerNames(Network);
|
|
|
|
if (Status != NERR_Success) {
|
|
try_return(Status);
|
|
}
|
|
|
|
ASSERT (!NetworkLocked);
|
|
|
|
if (!LOCK_NETWORK(Network)) {
|
|
try_return(Status = NERR_InternalError);
|
|
}
|
|
|
|
NetworkLocked = TRUE;
|
|
|
|
break;
|
|
}
|
|
|
|
//
|
|
// If we somehow became the master, we don't want to try to
|
|
// retrieve the list from ourselves either.
|
|
//
|
|
|
|
if (Network->Role & ROLE_MASTER) {
|
|
try_return(Status = NERR_Success);
|
|
}
|
|
|
|
ASSERT (Network->LockCount == 1);
|
|
|
|
if (NetworkLocked) {
|
|
UNLOCK_NETWORK(Network);
|
|
|
|
NetworkLocked = FALSE;
|
|
|
|
}
|
|
|
|
EntriesInList = 0;
|
|
|
|
Status = RxNetServerEnum(ServerName, // Server name
|
|
ModifiedTransportName, // Transport name
|
|
101, // Level
|
|
(LPBYTE *)&Buffer, // Buffer
|
|
0xffffffff, // Prefered Max Length
|
|
&EntriesInList, // EntriesRead
|
|
&TotalEntriesInList, // TotalEntries
|
|
ModifiedServerType, // Server type
|
|
NULL, // Domain (use default)
|
|
NULL // Resume key
|
|
);
|
|
|
|
//
|
|
// If the redir is being possesive of some other transport,
|
|
// urge it to behave.
|
|
//
|
|
|
|
if ( Status == ERROR_CONNECTION_ACTIVE ) {
|
|
|
|
BrPrint(( BR_BACKUP,
|
|
"%ws: %ws: Failed to retrieve %s list from server %ws: Connection is active (Try NetUseDel)\n",
|
|
Network->DomainInfo->DomUnicodeDomainName,
|
|
TransportName,
|
|
(ServerType == SV_TYPE_ALL ? "server" : "domain"),
|
|
ServerName ));
|
|
|
|
//
|
|
// Delete the IPC$ share.
|
|
//
|
|
|
|
Status = NetUseDel( NULL,
|
|
ShareName,
|
|
USE_FORCE );
|
|
|
|
if ( Status != NO_ERROR ) {
|
|
|
|
BrPrint(( BR_BACKUP,
|
|
"%ws: %ws: Failed to retrieve %s list from server %ws: NetUseDel failed: %ld\n",
|
|
Network->DomainInfo->DomUnicodeDomainName,
|
|
TransportName,
|
|
(ServerType == SV_TYPE_ALL ? "server" : "domain"),
|
|
ServerName,
|
|
Status));
|
|
|
|
Status = ERROR_CONNECTION_ACTIVE;
|
|
|
|
//
|
|
// That worked so try it again.
|
|
//
|
|
} else {
|
|
|
|
EntriesInList = 0;
|
|
|
|
Status = RxNetServerEnum(ServerName, // Server name
|
|
ModifiedTransportName, // Transport name
|
|
101, // Level
|
|
(LPBYTE *)&Buffer, // Buffer
|
|
0xffffffff, // Prefered Max Length
|
|
&EntriesInList, // EntriesRead
|
|
&TotalEntriesInList, // TotalEntries
|
|
ModifiedServerType, // Server type
|
|
NULL, // Domain (use default)
|
|
NULL // Resume key
|
|
);
|
|
}
|
|
|
|
|
|
}
|
|
|
|
if (Status != NERR_Success && Status != ERROR_MORE_DATA) {
|
|
|
|
// Temporary network outages are actually expected. Lets not log an event until the
|
|
// network has been unavailible 4 times in a row.
|
|
Network->NetworkAccessFailures++;
|
|
|
|
if( Network->NetworkAccessFailures > BR_LIST_RETRIEVAL_ERROR_MAX )
|
|
{
|
|
LPWSTR SubStrings[2];
|
|
|
|
SubStrings[0] = ServerName;
|
|
SubStrings[1] = TransportName;
|
|
|
|
BrLogEvent((ServerType == SV_TYPE_DOMAIN_ENUM ?
|
|
EVENT_BROWSER_DOMAIN_LIST_FAILED :
|
|
EVENT_BROWSER_SERVER_LIST_FAILED),
|
|
Status,
|
|
2,
|
|
SubStrings);
|
|
|
|
BrPrint(( BR_BACKUP,
|
|
"%ws: %ws: Failed to retrieve %s list from server %ws: %ld\n",
|
|
Network->DomainInfo->DomUnicodeDomainName,
|
|
TransportName,
|
|
(ServerType == SV_TYPE_ALL ? "server" : "domain"),
|
|
ServerName,
|
|
Status));
|
|
|
|
Network->NetworkAccessFailures = 0;
|
|
}
|
|
} else {
|
|
BrPrint(( BR_BACKUP,
|
|
"%ws: %ws: Retrieved %s list from server %ws: E:%ld, T:%ld\n",
|
|
Network->DomainInfo->DomUnicodeDomainName,
|
|
TransportName,
|
|
(ServerType == SV_TYPE_ALL ? "server" : "domain"),
|
|
ServerName,
|
|
EntriesInList,
|
|
TotalEntriesInList));
|
|
|
|
Network->NetworkAccessFailures = 0;
|
|
}
|
|
|
|
//
|
|
// If we succeeded in retrieving the list, but we only got
|
|
// a really small number of either servers or domains,
|
|
// we want to turn this into a failure.
|
|
//
|
|
|
|
if (Status == NERR_Success) {
|
|
if (((ServerType == SV_TYPE_DOMAIN_ENUM) &&
|
|
(EntriesInList < BROWSER_MINIMUM_DOMAIN_NUMBER)) ||
|
|
((ServerType == SV_TYPE_ALL) &&
|
|
(EntriesInList < BROWSER_MINIMUM_SERVER_NUMBER))) {
|
|
|
|
Status = ERROR_INSUFFICIENT_BUFFER;
|
|
}
|
|
}
|
|
|
|
if ((Status == NERR_Success) || (Status == ERROR_MORE_DATA)) {
|
|
|
|
ASSERT (!NetworkLocked);
|
|
|
|
if (!LOCK_NETWORK(Network)) {
|
|
Status = NERR_InternalError;
|
|
|
|
if ((EntriesInList != 0) && (Buffer != NULL)) {
|
|
NetApiBufferFree(Buffer);
|
|
Buffer = NULL;
|
|
}
|
|
|
|
break;
|
|
}
|
|
|
|
NetworkLocked = TRUE;
|
|
|
|
ASSERT (Network->LockCount == 1);
|
|
|
|
#if DBG
|
|
BrUpdateDebugInformation((ServerType == SV_TYPE_DOMAIN_ENUM ?
|
|
L"LastDomainListRead" :
|
|
L"LastServerListRead"),
|
|
L"BrowserServerName",
|
|
TransportName,
|
|
ServerName,
|
|
0);
|
|
#endif
|
|
|
|
//
|
|
// We've retrieved a new list from the browse master, save
|
|
// the new list away in the "appropriate" spot.
|
|
//
|
|
|
|
//
|
|
// Of course, we free up the old buffer before we do this..
|
|
//
|
|
|
|
if (ServerType == SV_TYPE_DOMAIN_ENUM) {
|
|
if (Network->BackupDomainList != NULL) {
|
|
NetApiBufferFree(Network->BackupDomainList);
|
|
}
|
|
|
|
Network->BackupDomainList = Buffer;
|
|
|
|
Network->TotalBackupDomainListEntries = EntriesInList;
|
|
} else {
|
|
if (Network->BackupServerList != NULL) {
|
|
NetApiBufferFree(Network->BackupServerList);
|
|
}
|
|
|
|
Network->BackupServerList = Buffer;
|
|
|
|
Network->TotalBackupServerListEntries = EntriesInList;
|
|
}
|
|
|
|
break;
|
|
} else {
|
|
NET_API_STATUS GetMasterNameStatus;
|
|
|
|
if ((EntriesInList != 0) && (Buffer != NULL)) {
|
|
NetApiBufferFree(Buffer);
|
|
Buffer = NULL;
|
|
}
|
|
|
|
BrPrint(( BR_BACKUP,
|
|
"%ws: %ws: Unable to contact browser server %ws: %lx\n",
|
|
Network->DomainInfo->DomUnicodeDomainName,
|
|
TransportName,
|
|
ServerName,
|
|
Status));
|
|
|
|
if (NetworkLocked) {
|
|
|
|
//
|
|
// We were unable to find the master. Attempt to find out who
|
|
// the master is. If there is none, this will force an
|
|
// election.
|
|
//
|
|
|
|
ASSERT (Network->LockCount == 1);
|
|
|
|
UNLOCK_NETWORK(Network);
|
|
|
|
NetworkLocked = FALSE;
|
|
}
|
|
|
|
BrPrint(( BR_BACKUP,
|
|
"%ws: %ws: FindMaster called from BrRetrieveInterimServerList for failure\n",
|
|
Network->DomainInfo->DomUnicodeDomainName,
|
|
Network->NetworkName.Buffer));
|
|
|
|
GetMasterNameStatus = GetMasterServerNames(Network);
|
|
|
|
//
|
|
// We were able to find out who the master is.
|
|
//
|
|
// Retry and retrieve the server/domain list.
|
|
//
|
|
|
|
if (GetMasterNameStatus == NERR_Success) {
|
|
|
|
ASSERT (!NetworkLocked);
|
|
|
|
if (!LOCK_NETWORK(Network)) {
|
|
try_return(Status = NERR_InternalError);
|
|
}
|
|
|
|
NetworkLocked = TRUE;
|
|
|
|
ASSERT (Network->LockCount == 1);
|
|
|
|
//
|
|
// We managed to become a master. We want to return right away.
|
|
//
|
|
|
|
if (Network->Role & ROLE_MASTER) {
|
|
|
|
try_return(Status = NERR_InternalError);
|
|
}
|
|
|
|
wcscpy(ServerName, Network->UncMasterBrowserName );
|
|
|
|
ASSERT ( NetpIsUncComputerNameValid( ServerName ) );
|
|
|
|
ASSERT (STRICMP(&ServerName[2], Network->DomainInfo->DomUnicodeComputerName) != 0);
|
|
|
|
BrPrint(( BR_BACKUP,
|
|
"%ws: %ws: New master name is %ws\n",
|
|
Network->DomainInfo->DomUnicodeDomainName,
|
|
Network->NetworkName.Buffer,
|
|
ServerName));
|
|
|
|
} else {
|
|
try_return(Status);
|
|
}
|
|
}
|
|
}
|
|
try_exit:NOTHING;
|
|
} finally {
|
|
if (!NetworkLocked) {
|
|
if (!LOCK_NETWORK(Network)) {
|
|
Status = NERR_InternalError;
|
|
}
|
|
|
|
ASSERT (Network->LockCount == 1);
|
|
|
|
}
|
|
}
|
|
|
|
return Status;
|
|
}
|
|
|
|
|
|
NET_API_STATUS
|
|
PostBecomeBackup(
|
|
PNETWORK Network
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
This function is the worker routine called to actually issue a BecomeBackup
|
|
FsControl to the bowser driver on all the bound transports. It will
|
|
complete when the machine becomes a backup browser server.
|
|
|
|
Please note that this might never complete.
|
|
|
|
Arguments:
|
|
|
|
None.
|
|
|
|
Return Value:
|
|
|
|
Status - The status of the operation.
|
|
|
|
--*/
|
|
{
|
|
NET_API_STATUS Status;
|
|
|
|
if (!LOCK_NETWORK(Network)) {
|
|
return NERR_InternalError;
|
|
}
|
|
|
|
Network->Role |= ROLE_POTENTIAL_BACKUP;
|
|
|
|
Status = BrIssueAsyncBrowserIoControl(Network,
|
|
IOCTL_LMDR_BECOME_BACKUP,
|
|
BecomeBackupCompletion,
|
|
NULL );
|
|
UNLOCK_NETWORK(Network);
|
|
|
|
return Status;
|
|
}
|
|
|
|
VOID
|
|
BecomeBackupCompletion (
|
|
IN PVOID Ctx
|
|
)
|
|
{
|
|
NET_API_STATUS Status;
|
|
PBROWSERASYNCCONTEXT Context = Ctx;
|
|
PNETWORK Network = Context->Network;
|
|
|
|
if (NT_SUCCESS(Context->IoStatusBlock.Status)) {
|
|
|
|
//
|
|
// Ensure the network wasn't deleted from under us.
|
|
//
|
|
if ( BrReferenceNetwork( Network ) != NULL ) {
|
|
|
|
if (LOCK_NETWORK(Network)) {
|
|
|
|
BrPrint(( BR_BACKUP,
|
|
"%ws: %ws: BecomeBackupCompletion. We are now a backup server\n",
|
|
Network->DomainInfo->DomUnicodeDomainName,
|
|
Network->NetworkName.Buffer ));
|
|
|
|
Status = BecomeBackup(Context->Network, NULL);
|
|
|
|
UNLOCK_NETWORK(Network);
|
|
}
|
|
|
|
BrDereferenceNetwork( Network );
|
|
}
|
|
|
|
}
|
|
|
|
MIDL_user_free(Context);
|
|
|
|
}
|
|
|
|
VOID
|
|
BrBrowseTableInsertRoutine(
|
|
IN PINTERIM_SERVER_LIST InterimTable,
|
|
IN PINTERIM_ELEMENT InterimElement
|
|
)
|
|
{
|
|
//
|
|
// We need to miss 3 retrievals of the browse list for us to toss the
|
|
// server.
|
|
//
|
|
|
|
InterimElement->Periodicity = BrInfo.BackupPeriodicity * 3;
|
|
|
|
if (InterimElement->TimeLastSeen != 0xffffffff) {
|
|
InterimElement->TimeLastSeen = BrCurrentSystemTime();
|
|
}
|
|
}
|
|
|
|
VOID
|
|
BrBrowseTableDeleteRoutine(
|
|
IN PINTERIM_SERVER_LIST InterimTable,
|
|
IN PINTERIM_ELEMENT InterimElement
|
|
)
|
|
{
|
|
// BrPrint(( BR_CRITICAL, "Deleting element for server %ws\n", InterimElement->Name));
|
|
}
|
|
|
|
VOID
|
|
BrBrowseTableUpdateRoutine(
|
|
IN PINTERIM_SERVER_LIST InterimTable,
|
|
IN PINTERIM_ELEMENT InterimElement
|
|
)
|
|
{
|
|
if (InterimElement->TimeLastSeen != 0xffffffff) {
|
|
InterimElement->TimeLastSeen = BrCurrentSystemTime();
|
|
}
|
|
}
|
|
|
|
BOOLEAN
|
|
BrBrowseTableAgeRoutine(
|
|
IN PINTERIM_SERVER_LIST InterimTable,
|
|
IN PINTERIM_ELEMENT InterimElement
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
This routine is called when we are scanning an interim server list trying
|
|
to age the elements in the list. It returns TRUE if the entry is too
|
|
old.
|
|
|
|
Arguments:
|
|
|
|
PINTERIM_SERVER_LIST InterimTable - A pointer to the interim server list.
|
|
PINTERIM_ELEMENT InterimElement - A pointer to the element to check.
|
|
|
|
Return Value:
|
|
|
|
TRUE if the element should be deleted.
|
|
|
|
--*/
|
|
|
|
{
|
|
if (InterimElement->TimeLastSeen == 0xffffffff) {
|
|
return FALSE;
|
|
}
|
|
|
|
if ((InterimElement->TimeLastSeen + InterimElement->Periodicity) < BrCurrentSystemTime()) {
|
|
// BrPrint(( BR_CRITICAL, "Aging out element for server %ws\n", InterimElement->Name));
|
|
|
|
return TRUE;
|
|
} else {
|
|
return FALSE;
|
|
}
|
|
}
|
|
|
|
VOID
|
|
BrDomainTableInsertRoutine(
|
|
IN PINTERIM_SERVER_LIST InterimTable,
|
|
IN PINTERIM_ELEMENT InterimElement
|
|
)
|
|
{
|
|
InterimElement->Periodicity = BrInfo.BackupPeriodicity * 3;
|
|
InterimElement->TimeLastSeen = BrCurrentSystemTime();
|
|
|
|
}
|
|
|
|
VOID
|
|
BrDomainTableDeleteRoutine(
|
|
IN PINTERIM_SERVER_LIST InterimTable,
|
|
IN PINTERIM_ELEMENT InterimElement
|
|
)
|
|
{
|
|
// BrPrint(( BR_CRITICAL, "Deleting element for domain %ws\n", InterimElement->Name));
|
|
}
|
|
|
|
VOID
|
|
BrDomainTableUpdateRoutine(
|
|
IN PINTERIM_SERVER_LIST InterimTable,
|
|
IN PINTERIM_ELEMENT InterimElement
|
|
)
|
|
{
|
|
InterimElement->TimeLastSeen = BrCurrentSystemTime();
|
|
}
|
|
|
|
BOOLEAN
|
|
BrDomainTableAgeRoutine(
|
|
IN PINTERIM_SERVER_LIST InterimTable,
|
|
IN PINTERIM_ELEMENT InterimElement
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
This routine is called when we are scanning an interim server list trying
|
|
to age the elements in the list. It returns TRUE if the entry is too
|
|
old.
|
|
|
|
Arguments:
|
|
|
|
PINTERIM_SERVER_LIST InterimTable - A pointer to the interim server list.
|
|
PINTERIM_ELEMENT InterimElement - A pointer to the element to check.
|
|
|
|
Return Value:
|
|
|
|
TRUE if the element should be deleted.
|
|
|
|
--*/
|
|
|
|
{
|
|
if ((InterimElement->TimeLastSeen + InterimElement->Periodicity) < BrCurrentSystemTime()) {
|
|
// BrPrint(( BR_CRITICAL, "Aging out element for domain %ws\n", InterimElement->Name));
|
|
return TRUE;
|
|
} else {
|
|
return FALSE;
|
|
}
|
|
}
|
|
|
|
|
|
NET_API_STATUS
|
|
PostWaitForRoleChange (
|
|
PNETWORK Network
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
This function is the worker routine called to actually issue a WaitForRoleChange
|
|
FsControl to the bowser driver on all the bound transports. It will
|
|
complete when the machine becomes a backup browser server.
|
|
|
|
Please note that this might never complete.
|
|
|
|
Arguments:
|
|
|
|
None.
|
|
|
|
Return Value:
|
|
|
|
Status - The status of the operation.
|
|
|
|
--*/
|
|
{
|
|
NET_API_STATUS Status;
|
|
|
|
if (!LOCK_NETWORK(Network)) {
|
|
return NERR_InternalError;
|
|
}
|
|
|
|
Status = BrIssueAsyncBrowserIoControl(Network,
|
|
IOCTL_LMDR_CHANGE_ROLE,
|
|
ChangeBrowserRole,
|
|
NULL );
|
|
UNLOCK_NETWORK(Network);
|
|
|
|
return Status;
|
|
}
|
|
|
|
VOID
|
|
ChangeBrowserRole (
|
|
IN PVOID Ctx
|
|
)
|
|
{
|
|
PBROWSERASYNCCONTEXT Context = Ctx;
|
|
PNETWORK Network = Context->Network;
|
|
|
|
if (NT_SUCCESS(Context->IoStatusBlock.Status)) {
|
|
PWSTR MasterName = NULL;
|
|
PLMDR_REQUEST_PACKET Packet = Context->RequestPacket;
|
|
|
|
//
|
|
// Ensure the network wasn't deleted from under us.
|
|
//
|
|
if ( BrReferenceNetwork( Network ) != NULL ) {
|
|
|
|
if (LOCK_NETWORK(Network)) {
|
|
|
|
PostWaitForRoleChange(Network);
|
|
|
|
if (Packet->Parameters.ChangeRole.RoleModification & RESET_STATE_CLEAR_ALL) {
|
|
BrPrint(( BR_MASTER,
|
|
"%ws: %ws: Reset state request to clear all\n",
|
|
Network->DomainInfo->DomUnicodeDomainName,
|
|
Network->NetworkName.Buffer ));
|
|
|
|
if (Network->Role & ROLE_MASTER) {
|
|
BrStopMaster(Network);
|
|
}
|
|
|
|
//
|
|
// Stop being a backup as well.
|
|
//
|
|
|
|
BrStopBackup(Network);
|
|
|
|
}
|
|
|
|
if ((Network->Role & ROLE_MASTER) &&
|
|
(Packet->Parameters.ChangeRole.RoleModification & RESET_STATE_STOP_MASTER)) {
|
|
|
|
BrPrint(( BR_MASTER,
|
|
"%ws: %ws: Reset state request to stop master\n",
|
|
Network->DomainInfo->DomUnicodeDomainName,
|
|
Network->NetworkName.Buffer ));
|
|
|
|
BrStopMaster(Network);
|
|
|
|
//
|
|
// If we are configured to be a backup, then become a backup
|
|
// again.
|
|
//
|
|
|
|
if (BrInfo.MaintainServerList == 1) {
|
|
BecomeBackup(Network, NULL);
|
|
}
|
|
}
|
|
|
|
//
|
|
// Make sure there's a become master oustanding.
|
|
//
|
|
|
|
PostBecomeMaster(Network);
|
|
|
|
UNLOCK_NETWORK(Network);
|
|
|
|
}
|
|
|
|
BrDereferenceNetwork( Network );
|
|
}
|
|
}
|
|
|
|
MIDL_user_free(Context);
|
|
|
|
}
|
|
|
|
|
|
NET_API_STATUS
|
|
PostWaitForNewMasterName(
|
|
PNETWORK Network,
|
|
LPWSTR MasterName OPTIONAL
|
|
)
|
|
{
|
|
//
|
|
// Can't wait for new master on direct host IPC
|
|
//
|
|
if (Network->Flags & NETWORK_IPX) {
|
|
return STATUS_SUCCESS;
|
|
}
|
|
|
|
return BrIssueAsyncBrowserIoControl(
|
|
Network,
|
|
IOCTL_LMDR_NEW_MASTER_NAME,
|
|
NewMasterCompletionRoutine,
|
|
MasterName );
|
|
|
|
|
|
}
|
|
|
|
VOID
|
|
NewMasterCompletionRoutine(
|
|
IN PVOID Ctx
|
|
)
|
|
{
|
|
PBROWSERASYNCCONTEXT Context = Ctx;
|
|
PNETWORK Network = Context->Network;
|
|
BOOLEAN NetLocked = FALSE;
|
|
BOOLEAN NetReferenced = FALSE;
|
|
|
|
|
|
try {
|
|
UNICODE_STRING NewMasterName;
|
|
|
|
//
|
|
// Ensure the network wasn't deleted from under us.
|
|
//
|
|
if ( BrReferenceNetwork( Network ) == NULL ) {
|
|
try_return(NOTHING);
|
|
}
|
|
NetReferenced = TRUE;
|
|
|
|
BrPrint(( BR_MASTER,
|
|
"%ws: %ws: NewMasterCompletionRoutine: Got master changed\n",
|
|
Network->DomainInfo->DomUnicodeDomainName,
|
|
Network->NetworkName.Buffer ));
|
|
|
|
if (!LOCK_NETWORK(Network)){
|
|
try_return(NOTHING);
|
|
}
|
|
NetLocked = TRUE;
|
|
|
|
//
|
|
// The request failed for some other reason - just return immediately.
|
|
//
|
|
|
|
if (!NT_SUCCESS(Context->IoStatusBlock.Status)) {
|
|
|
|
try_return(NOTHING);
|
|
|
|
}
|
|
|
|
// Remove new master name & put in transport
|
|
|
|
if ( Network->Role & ROLE_MASTER ) {
|
|
|
|
try_return(NOTHING);
|
|
|
|
}
|
|
|
|
BrPrint(( BR_BACKUP,
|
|
"%ws: %ws: NewMasterCompletionRoutin: New:%ws Old %ws\n",
|
|
Network->DomainInfo->DomUnicodeDomainName,
|
|
Network->NetworkName.Buffer,
|
|
Context->RequestPacket->Parameters.GetMasterName.Name,
|
|
Network->UncMasterBrowserName ));
|
|
|
|
//
|
|
// Copy the master browser name into the network structure
|
|
//
|
|
|
|
wcsncpy( Network->UncMasterBrowserName,
|
|
Context->RequestPacket->Parameters.GetMasterName.Name,
|
|
UNCLEN+1 );
|
|
|
|
Network->UncMasterBrowserName[UNCLEN] = L'\0';
|
|
|
|
ASSERT ( NetpIsUncComputerNameValid ( Network->UncMasterBrowserName ) );
|
|
|
|
PostWaitForNewMasterName( Network, Network->UncMasterBrowserName );
|
|
|
|
try_exit:NOTHING;
|
|
} finally {
|
|
|
|
if (NetLocked) {
|
|
UNLOCK_NETWORK(Network);
|
|
}
|
|
|
|
if ( NetReferenced ) {
|
|
BrDereferenceNetwork( Network );
|
|
}
|
|
|
|
MIDL_user_free(Context);
|
|
|
|
}
|
|
|
|
return;
|
|
}
|
|
|
|
|
|
|
|
|
|
#ifdef ENABLE_PSEUDO_BROWSER
|
|
//
|
|
// Pseudo Server
|
|
// Phase out black hole Helper routines
|
|
//
|
|
|
|
|
|
|
|
|
|
|
|
VOID
|
|
BrFreeNetworkTables(
|
|
IN PNETWORK Network
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
Free network tables
|
|
|
|
Arguments:
|
|
|
|
Network to operate upon
|
|
|
|
Return Value:
|
|
None.
|
|
|
|
Remarks:
|
|
Acquire & release network locks
|
|
--*/
|
|
{
|
|
|
|
BOOL NetLocked = FALSE;
|
|
|
|
//
|
|
// Prevent the network from being deleted while we're in this timer routine.
|
|
//
|
|
if ( BrReferenceNetwork( Network ) == NULL ) {
|
|
return;
|
|
}
|
|
|
|
try{
|
|
|
|
// lock network
|
|
if (!LOCK_NETWORK(Network)) {
|
|
try_return(NOTHING);
|
|
}
|
|
NetLocked = TRUE;
|
|
|
|
//
|
|
// Delete tables
|
|
//
|
|
|
|
UninitializeInterimServerList(&Network->BrowseTable);
|
|
|
|
UninitializeInterimServerList(&Network->DomainList);
|
|
|
|
if (Network->BackupServerList != NULL) {
|
|
MIDL_user_free(Network->BackupServerList);
|
|
Network->BackupServerList = NULL;
|
|
Network->TotalBackupServerListEntries = 0;
|
|
}
|
|
|
|
if (Network->BackupDomainList != NULL) {
|
|
MIDL_user_free(Network->BackupDomainList);
|
|
Network->BackupDomainList = NULL;
|
|
Network->TotalBackupDomainListEntries = 0;
|
|
}
|
|
|
|
BrDestroyResponseCache(Network);
|
|
|
|
try_exit:NOTHING;
|
|
} finally {
|
|
|
|
//
|
|
// Release network
|
|
//
|
|
|
|
if (NetLocked) {
|
|
UNLOCK_NETWORK(Network);
|
|
}
|
|
|
|
BrDereferenceNetwork( Network );
|
|
}
|
|
}
|
|
#endif
|