blob: ab9be0fbbd406456b98acb4bbc3bfe1ef56deeb1 [file] [log] [blame]
John Kacur8b40f522009-09-24 18:02:18 +02001#ifndef __PERF_STRBUF_H
2#define __PERF_STRBUF_H
Ingo Molnar07800602009-04-20 15:00:56 +02003
4/*
5 * Strbuf's can be use in many ways: as a byte array, or to store arbitrary
6 * long, overflow safe strings.
7 *
8 * Strbufs has some invariants that are very important to keep in mind:
9 *
10 * 1. the ->buf member is always malloc-ed, hence strbuf's can be used to
11 * build complex strings/buffers whose final size isn't easily known.
12 *
13 * It is NOT legal to copy the ->buf pointer away.
14 * `strbuf_detach' is the operation that detachs a buffer from its shell
15 * while keeping the shell valid wrt its invariants.
16 *
17 * 2. the ->buf member is a byte array that has at least ->len + 1 bytes
18 * allocated. The extra byte is used to store a '\0', allowing the ->buf
19 * member to be a valid C-string. Every strbuf function ensure this
20 * invariant is preserved.
21 *
22 * Note that it is OK to "play" with the buffer directly if you work it
23 * that way:
24 *
25 * strbuf_grow(sb, SOME_SIZE);
26 * ... Here, the memory array starting at sb->buf, and of length
27 * ... strbuf_avail(sb) is all yours, and you are sure that
28 * ... strbuf_avail(sb) is at least SOME_SIZE.
29 * strbuf_setlen(sb, sb->len + SOME_OTHER_SIZE);
30 *
31 * Of course, SOME_OTHER_SIZE must be smaller or equal to strbuf_avail(sb).
32 *
33 * Doing so is safe, though if it has to be done in many places, adding the
34 * missing API to the strbuf module is the way to go.
35 *
36 * XXX: do _not_ assume that the area that is yours is of size ->alloc - 1
37 * even if it's true in the current implementation. Alloc is somehow a
38 * "private" member that should not be messed with.
39 */
40
41#include <assert.h>
Namhyung Kimc7118362015-10-25 00:49:27 +090042#include <stdarg.h>
Ingo Molnar07800602009-04-20 15:00:56 +020043
44extern char strbuf_slopbuf[];
45struct strbuf {
46 size_t alloc;
47 size_t len;
48 char *buf;
49};
50
51#define STRBUF_INIT { 0, 0, strbuf_slopbuf }
52
53/*----- strbuf life cycle -----*/
Arnaldo Carvalho de Melo3938bad2016-03-23 15:06:35 -030054void strbuf_init(struct strbuf *buf, ssize_t hint);
55void strbuf_release(struct strbuf *buf);
56char *strbuf_detach(struct strbuf *buf, size_t *);
Ingo Molnar07800602009-04-20 15:00:56 +020057
58/*----- strbuf size related -----*/
Ingo Molnarf37a2912009-07-01 12:37:06 +020059static inline ssize_t strbuf_avail(const struct strbuf *sb) {
Ingo Molnar07800602009-04-20 15:00:56 +020060 return sb->alloc ? sb->alloc - sb->len - 1 : 0;
61}
62
Arnaldo Carvalho de Melo3938bad2016-03-23 15:06:35 -030063void strbuf_grow(struct strbuf *buf, size_t);
Ingo Molnar07800602009-04-20 15:00:56 +020064
65static inline void strbuf_setlen(struct strbuf *sb, size_t len) {
66 if (!sb->alloc)
67 strbuf_grow(sb, 0);
68 assert(len < sb->alloc);
69 sb->len = len;
70 sb->buf[len] = '\0';
71}
Ingo Molnar07800602009-04-20 15:00:56 +020072
73/*----- add data in your buffer -----*/
Arnaldo Carvalho de Melo07412082016-03-23 16:56:56 -030074void strbuf_addch(struct strbuf *sb, int c);
Ingo Molnar07800602009-04-20 15:00:56 +020075
Arnaldo Carvalho de Melo3938bad2016-03-23 15:06:35 -030076void strbuf_add(struct strbuf *buf, const void *, size_t);
Ingo Molnar07800602009-04-20 15:00:56 +020077static inline void strbuf_addstr(struct strbuf *sb, const char *s) {
78 strbuf_add(sb, s, strlen(s));
79}
Ingo Molnar07800602009-04-20 15:00:56 +020080
81__attribute__((format(printf,2,3)))
Arnaldo Carvalho de Melo3938bad2016-03-23 15:06:35 -030082void strbuf_addf(struct strbuf *sb, const char *fmt, ...);
Ingo Molnar07800602009-04-20 15:00:56 +020083
Ingo Molnar07800602009-04-20 15:00:56 +020084/* XXX: if read fails, any partial read is undone */
Arnaldo Carvalho de Melo3938bad2016-03-23 15:06:35 -030085ssize_t strbuf_read(struct strbuf *, int fd, ssize_t hint);
Ingo Molnar07800602009-04-20 15:00:56 +020086
John Kacur8b40f522009-09-24 18:02:18 +020087#endif /* __PERF_STRBUF_H */