s3/torture: use stack buffer for rbtree loop
[Samba.git] / source3 / include / smb_macros.h
blob90ec794a5190a15c5ed7043ca3864885066fdfd3
1 /*
2 Unix SMB/CIFS implementation.
3 SMB parameters and setup
4 Copyright (C) Andrew Tridgell 1992-1999
5 Copyright (C) John H Terpstra 1996-1999
6 Copyright (C) Luke Kenneth Casson Leighton 1996-1999
7 Copyright (C) Paul Ashton 1998 - 1999
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
11 the Free Software Foundation; either version 3 of the License, or
12 (at your option) any later version.
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
19 You should have received a copy of the GNU General Public License
20 along with this program. If not, see <http://www.gnu.org/licenses/>.
23 #ifndef _SMB_MACROS_H
24 #define _SMB_MACROS_H
26 /* Misc bit macros */
27 #define BOOLSTR(b) ((b) ? "Yes" : "No")
28 #define BITSETW(ptr,bit) ((SVAL(ptr,0) & (1<<(bit)))!=0)
30 /* for readability... */
31 #define IS_DOS_READONLY(test_mode) (((test_mode) & FILE_ATTRIBUTE_READONLY) != 0)
32 #define IS_DOS_DIR(test_mode) (((test_mode) & FILE_ATTRIBUTE_DIRECTORY) != 0)
33 #define IS_DOS_ARCHIVE(test_mode) (((test_mode) & FILE_ATTRIBUTE_ARCHIVE) != 0)
34 #define IS_DOS_SYSTEM(test_mode) (((test_mode) & FILE_ATTRIBUTE_SYSTEM) != 0)
35 #define IS_DOS_HIDDEN(test_mode) (((test_mode) & FILE_ATTRIBUTE_HIDDEN) != 0)
37 #define SMB_WARN(condition, message) \
38 ((condition) ? (void)0 : \
39 DEBUG(0, ("WARNING: %s: %s\n", #condition, message)))
41 #define SMB_ASSERT_ARRAY(a,n) SMB_ASSERT((sizeof(a)/sizeof((a)[0])) >= (n))
43 /* these are useful macros for checking validity of handles */
44 #define IS_IPC(conn) ((conn) && (conn)->ipc)
45 #define IS_PRINT(conn) ((conn) && (conn)->printer)
47 #define CHECK_READ(fsp,req) \
48 (((fsp)->fh->fd != -1) && \
49 (((fsp)->fsp_flags.can_read) || \
50 ((req->flags2 & FLAGS2_READ_PERMIT_EXECUTE) && \
51 (fsp->access_mask & FILE_EXECUTE))))
54 * This is not documented in revision 49 of [MS-SMB2] but should be added in a
55 * later revision (and torture test smb2.read.access as well as
56 * smb2.ioctl_copy_chunk_bad_access against Server 2012R2 confirms this)
58 * If FILE_EXECUTE is granted to a handle then the SMB2 server acts as if
59 * FILE_READ_DATA has also been granted. We must still keep the original granted
60 * mask, because with ioctl requests, access checks are made on the file handle,
61 * "below" the SMB2 server, and the object store below the SMB layer is not
62 * aware of this arrangement (see smb2.ioctl.copy_chunk_bad_access torture
63 * test).
65 #define CHECK_READ_SMB2(fsp) \
66 (((fsp)->fh->fd != -1) && \
67 (((fsp)->fsp_flags.can_read) || \
68 (fsp->access_mask & FILE_EXECUTE)))
70 /* An IOCTL readability check (validating read access
71 * when the IOCTL code requires it)
72 * http://social.technet.microsoft.com/wiki/contents/articles/24653.decoding-io-control-codes-ioctl-fsctl-and-deviceiocodes-with-table-of-known-values.aspx
73 * ). On Windows servers, this is done by the IO manager, which is unaware of
74 * the "if execute is granted then also grant read" arrangement.
76 #define CHECK_READ_IOCTL(fsp) \
77 (((fsp)->fh->fd != -1) && \
78 (((fsp)->fsp_flags.can_read)))
80 #define CHECK_WRITE(fsp) \
81 ((fsp)->fsp_flags.can_write && \
82 ((fsp)->fh->fd != -1))
84 #define ERROR_WAS_LOCK_DENIED(status) (NT_STATUS_EQUAL((status), NT_STATUS_LOCK_NOT_GRANTED) || \
85 NT_STATUS_EQUAL((status), NT_STATUS_FILE_LOCK_CONFLICT) )
87 /* the service number for the [globals] defaults */
88 #define GLOBAL_SECTION_SNUM (-1)
89 /* translates a connection number into a service number */
90 #define SNUM(conn) ((conn)?(conn)->params->service:GLOBAL_SECTION_SNUM)
93 /* access various service details */
94 #define CAN_WRITE(conn) (!conn->read_only)
95 #define VALID_SNUM(snum) (lp_snum_ok(snum))
96 #define GUEST_OK(snum) (VALID_SNUM(snum) && lp_guest_ok(snum))
97 #define GUEST_ONLY(snum) (VALID_SNUM(snum) && lp_guest_only(snum))
98 #define CAN_PRINT(conn) ((conn) && lp_printable(SNUM(conn)))
99 #define MAP_HIDDEN(conn) ((conn) && lp_map_hidden(SNUM(conn)))
100 #define MAP_SYSTEM(conn) ((conn) && lp_map_system(SNUM(conn)))
101 #define MAP_ARCHIVE(conn) ((conn) && lp_map_archive(SNUM(conn)))
102 #define IS_HIDDEN_PATH(conn,path) ((conn) && is_in_path((path),(conn)->hide_list,(conn)->case_sensitive))
103 #define IS_VETO_PATH(conn,path) ((conn) && is_in_path((path),(conn)->veto_list,(conn)->case_sensitive))
104 #define IS_VETO_OPLOCK_PATH(conn,path) ((conn) && is_in_path((path),(conn)->veto_oplock_list,(conn)->case_sensitive))
107 * Used by the stat cache code to check if a returned
108 * stat structure is valid.
111 #define VALID_STAT(st) ((st).st_ex_nlink != 0)
112 #define VALID_STAT_OF_DIR(st) (VALID_STAT(st) && S_ISDIR((st).st_ex_mode))
113 #define SET_STAT_INVALID(st) ((st).st_ex_nlink = 0)
115 /* Macros to get at offsets within smb_lkrng and smb_unlkrng
116 structures. We cannot define these as actual structures
117 due to possible differences in structure packing
118 on different machines/compilers. */
120 #define SMB_LPID_OFFSET(indx) (10 * (indx))
121 #define SMB_LKOFF_OFFSET(indx) ( 2 + (10 * (indx)))
122 #define SMB_LKLEN_OFFSET(indx) ( 6 + (10 * (indx)))
123 #define SMB_LARGE_LPID_OFFSET(indx) (20 * (indx))
124 #define SMB_LARGE_LKOFF_OFFSET_HIGH(indx) (4 + (20 * (indx)))
125 #define SMB_LARGE_LKOFF_OFFSET_LOW(indx) (8 + (20 * (indx)))
126 #define SMB_LARGE_LKLEN_OFFSET_HIGH(indx) (12 + (20 * (indx)))
127 #define SMB_LARGE_LKLEN_OFFSET_LOW(indx) (16 + (20 * (indx)))
129 #define ERROR_NT(status) error_packet(outbuf,0,0,status,__LINE__,__FILE__)
130 #define ERROR_BOTH(status,class,code) error_packet(outbuf,class,code,status,__LINE__,__FILE__)
132 #define reply_nterror(req,status) reply_nt_error(req,status,__LINE__,__FILE__)
133 #define reply_force_doserror(req,eclass,ecode) reply_force_dos_error(req,eclass,ecode,__LINE__,__FILE__)
134 #define reply_botherror(req,status,eclass,ecode) reply_both_error(req,eclass,ecode,status,__LINE__,__FILE__)
136 #if 0
137 /* defined in IDL */
138 /* these are the datagram types */
139 #define DGRAM_DIRECT_UNIQUE 0x10
140 #endif
142 #define SMB_ROUNDUP(x,r) ( ((x)%(r)) ? ( (((x)+(r))/(r))*(r) ) : (x))
144 /* Extra macros added by Ying Chen at IBM - speed increase by inlining. */
145 #define smb_buf(buf) (((char *)(buf)) + smb_size + CVAL(buf,smb_wct)*2)
146 #define smb_buf_const(buf) (((const char *)(buf)) + smb_size + CVAL(buf,smb_wct)*2)
147 #define smb_buflen(buf) (SVAL(buf,smb_vwv0 + (int)CVAL(buf, smb_wct)*2))
149 /* the remaining number of bytes in smb buffer 'buf' from pointer 'p'. */
150 #define smb_bufrem(buf, p) (smb_buflen(buf)-PTR_DIFF(p, smb_buf(buf)))
151 #define smbreq_bufrem(req, p) (req->buflen - PTR_DIFF(p, req->buf))
154 /* Note that chain_size must be available as an extern int to this macro. */
155 #define smb_offset(p,buf) (PTR_DIFF(p,buf+4))
157 #define smb_len(buf) smb_len_nbt(buf)
158 #define _smb_setlen(buf, len) _smb_setlen_nbt(buf, len)
159 #define smb_setlen(buf, len) smb_setlen_nbt(buf, len)
161 #define smb_len_large(buf) smb_len_tcp(buf)
162 #define _smb_setlen_large(buf, len) _smb_setlen_tcp(buf, len)
164 #define ENCRYPTION_REQUIRED(conn) ((conn) ? ((conn)->encrypt_level == SMB_SIGNING_REQUIRED) : false)
165 #define IS_CONN_ENCRYPTED(conn) ((conn) ? (conn)->encrypted_tid : false)
167 /****************************************************************************
168 true if two IPv4 addresses are equal
169 ****************************************************************************/
171 #define ip_equal_v4(ip1,ip2) ((ip1).s_addr == (ip2).s_addr)
173 /*****************************************************************
174 splits out the last subkey of a key
175 *****************************************************************/
177 #define reg_get_subkey(full_keyname, key_name, subkey_name) \
178 split_at_last_component(full_keyname, key_name, '\\', subkey_name)
180 /****************************************************************************
181 Return True if the offset is at zero.
182 ****************************************************************************/
184 #define dptr_zero(buf) (IVAL(buf,1) == 0)
186 /*******************************************************************
187 copy an IP address from one buffer to another
188 ********************************************************************/
190 #define putip(dest,src) memcpy(dest,src,4)
192 /*******************************************************************
193 Return True if a server has CIFS UNIX capabilities.
194 ********************************************************************/
196 #define SERVER_HAS_UNIX_CIFS(c) (smb1cli_conn_capabilities(c->conn) & CAP_UNIX)
198 /****************************************************************************
199 Make a filename into unix format.
200 ****************************************************************************/
202 #define IS_DIRECTORY_SEP(c) ((c) == '\\' || (c) == '/')
203 #define unix_format(fname) string_replace(fname,'\\','/')
205 /****************************************************************************
206 Make a file into DOS format.
207 ****************************************************************************/
209 #define dos_format(fname) string_replace(fname,'/','\\')
211 /*****************************************************************************
212 Check to see if we are a DC for this domain
213 *****************************************************************************/
215 #define IS_DC (lp_server_role()==ROLE_DOMAIN_PDC || lp_server_role()==ROLE_DOMAIN_BDC || lp_server_role() == ROLE_ACTIVE_DIRECTORY_DC)
216 #define IS_AD_DC (lp_server_role() == ROLE_ACTIVE_DIRECTORY_DC)
219 * If you add any entries to KERBEROS_VERIFY defines, please modify the below expressions
220 * so they remain accurate.
222 #define USE_KERBEROS_KEYTAB (KERBEROS_VERIFY_SECRETS != lp_kerberos_method())
223 #define USE_SYSTEM_KEYTAB \
224 ((KERBEROS_VERIFY_SECRETS_AND_KEYTAB == lp_kerberos_method()) || \
225 (KERBEROS_VERIFY_SYSTEM_KEYTAB == lp_kerberos_method()))
227 /*****************************************************************************
228 Safe allocation macros.
229 *****************************************************************************/
231 #define SMB_MALLOC_ARRAY(type,count) (type *)malloc_array(sizeof(type),(count))
232 #define SMB_MEMALIGN_ARRAY(type,align,count) (type *)memalign_array(sizeof(type),align,(count))
233 #define SMB_REALLOC(p,s) Realloc((p),(s),True) /* Always frees p on error or s == 0 */
234 #define SMB_REALLOC_ARRAY(p,type,count) (type *)realloc_array((p),sizeof(type),(count),True) /* Always frees p on error or s == 0 */
235 #define SMB_CALLOC_ARRAY(type,count) (type *)calloc_array(sizeof(type),(count))
236 #define SMB_XMALLOC_P(type) (type *)smb_xmalloc_array(sizeof(type),1)
237 #define SMB_XMALLOC_ARRAY(type,count) (type *)smb_xmalloc_array(sizeof(type),(count))
239 #define TALLOC(ctx, size) talloc_named_const(ctx, size, __location__)
240 #define TALLOC_ZERO(ctx, size) _talloc_zero(ctx, size, __location__)
241 #define TALLOC_SIZE(ctx, size) talloc_named_const(ctx, size, __location__)
242 #define TALLOC_ZERO_SIZE(ctx, size) _talloc_zero(ctx, size, __location__)
244 #define TALLOC_REALLOC(ctx, ptr, count) _talloc_realloc(ctx, ptr, count, __location__)
245 #define talloc_destroy(ctx) talloc_free(ctx)
246 #ifndef TALLOC_FREE
247 #define TALLOC_FREE(ctx) do { talloc_free(ctx); ctx=NULL; } while(0)
248 #endif
250 /* only define PARANOID_MALLOC_CHECKER with --enable-developer */
252 #if defined(DEVELOPER)
253 # define PARANOID_MALLOC_CHECKER 1
254 #endif
256 #if defined(PARANOID_MALLOC_CHECKER)
258 /* Get medieval on our ass about malloc.... */
260 /* Restrictions on malloc/realloc/calloc. */
261 #ifdef malloc
262 #undef malloc
263 #endif
264 #define malloc(s) __ERROR_DONT_USE_MALLOC_DIRECTLY
266 #ifdef realloc
267 #undef realloc
268 #endif
269 #define realloc(p,s) __ERROR_DONT_USE_REALLOC_DIRECTLY
271 #ifdef calloc
272 #undef calloc
273 #endif
274 #define calloc(n,s) __ERROR_DONT_USE_CALLOC_DIRECTLY
276 #ifdef strndup
277 #undef strndup
278 #endif
279 #define strndup(s,n) __ERROR_DONT_USE_STRNDUP_DIRECTLY
281 #ifdef strdup
282 #undef strdup
283 #endif
284 #define strdup(s) __ERROR_DONT_USE_STRDUP_DIRECTLY
286 #define SMB_MALLOC(s) malloc_(s)
287 #define SMB_MALLOC_P(type) (type *)malloc_(sizeof(type))
289 #define SMB_STRDUP(s) smb_xstrdup(s)
290 #define SMB_STRNDUP(s,n) smb_xstrndup(s,n)
292 #else
294 /* Regular malloc code. */
296 #define SMB_MALLOC(s) malloc(s)
297 #define SMB_MALLOC_P(type) (type *)malloc(sizeof(type))
299 #define SMB_STRDUP(s) strdup(s)
300 #define SMB_STRNDUP(s,n) strndup(s,n)
302 #endif
304 #define ADD_TO_ARRAY(mem_ctx, type, elem, array, num) \
305 do { \
306 *(array) = ((mem_ctx) != NULL) ? \
307 talloc_realloc(mem_ctx, (*(array)), type, (*(num))+1) : \
308 SMB_REALLOC_ARRAY((*(array)), type, (*(num))+1); \
309 SMB_ASSERT((*(array)) != NULL); \
310 (*(array))[*(num)] = (elem); \
311 (*(num)) += 1; \
312 } while (0)
314 #define ADD_TO_LARGE_ARRAY(mem_ctx, type, elem, array, num, size) \
315 add_to_large_array((mem_ctx), sizeof(type), &(elem), (void *)(array), (num), (size));
317 #define trans_oob(bufsize, offset, length) \
318 smb_buffer_oob(bufsize, offset, length)
320 #endif /* _SMB_MACROS_H */