160ec4130SDag-Erling Smørgrav /*- 260ec4130SDag-Erling Smørgrav * Copyright (c) 2000 Poul-Henning Kamp and Dag-Erling Co�dan Sm�rgrav 360ec4130SDag-Erling Smørgrav * All rights reserved. 460ec4130SDag-Erling Smørgrav * 560ec4130SDag-Erling Smørgrav * Redistribution and use in source and binary forms, with or without 660ec4130SDag-Erling Smørgrav * modification, are permitted provided that the following conditions 760ec4130SDag-Erling Smørgrav * are met: 860ec4130SDag-Erling Smørgrav * 1. Redistributions of source code must retain the above copyright 960ec4130SDag-Erling Smørgrav * notice, this list of conditions and the following disclaimer 1060ec4130SDag-Erling Smørgrav * in this position and unchanged. 1160ec4130SDag-Erling Smørgrav * 2. Redistributions in binary form must reproduce the above copyright 1260ec4130SDag-Erling Smørgrav * notice, this list of conditions and the following disclaimer in the 1360ec4130SDag-Erling Smørgrav * documentation and/or other materials provided with the distribution. 1460ec4130SDag-Erling Smørgrav * 3. The name of the author may not be used to endorse or promote products 1560ec4130SDag-Erling Smørgrav * derived from this software without specific prior written permission. 1660ec4130SDag-Erling Smørgrav * 1760ec4130SDag-Erling Smørgrav * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR 1860ec4130SDag-Erling Smørgrav * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES 1960ec4130SDag-Erling Smørgrav * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. 2060ec4130SDag-Erling Smørgrav * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, 2160ec4130SDag-Erling Smørgrav * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT 2260ec4130SDag-Erling Smørgrav * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, 2360ec4130SDag-Erling Smørgrav * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY 2460ec4130SDag-Erling Smørgrav * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT 2560ec4130SDag-Erling Smørgrav * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 2660ec4130SDag-Erling Smørgrav * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 2760ec4130SDag-Erling Smørgrav * 2860ec4130SDag-Erling Smørgrav * $FreeBSD$ 2960ec4130SDag-Erling Smørgrav */ 3060ec4130SDag-Erling Smørgrav 3160ec4130SDag-Erling Smørgrav #include <sys/param.h> 323393f8daSKenneth D. Merry #include <sys/sbuf.h> 333393f8daSKenneth D. Merry 343393f8daSKenneth D. Merry #ifdef _KERNEL 3560ec4130SDag-Erling Smørgrav #include <sys/kernel.h> 3660ec4130SDag-Erling Smørgrav #include <sys/malloc.h> 3760ec4130SDag-Erling Smørgrav #include <sys/systm.h> 3860ec4130SDag-Erling Smørgrav #include <machine/stdarg.h> 393393f8daSKenneth D. Merry #else /* _KERNEL */ 403393f8daSKenneth D. Merry #include <stdarg.h> 413393f8daSKenneth D. Merry #endif /* _KERNEL */ 4260ec4130SDag-Erling Smørgrav 433393f8daSKenneth D. Merry #ifdef _KERNEL 4460ec4130SDag-Erling Smørgrav MALLOC_DEFINE(M_SBUF, "sbuf", "string buffers"); 453393f8daSKenneth D. Merry #define SBMALLOC(size) malloc(size, M_SBUF, M_WAITOK) 463393f8daSKenneth D. Merry #define SBFREE(buf) free(buf, M_SBUF) 473393f8daSKenneth D. Merry #else /* _KERNEL */ 483393f8daSKenneth D. Merry #define KASSERT(e, m) 493393f8daSKenneth D. Merry #define SBMALLOC(size) malloc(size) 503393f8daSKenneth D. Merry #define SBFREE(buf) free(buf) 513393f8daSKenneth D. Merry #define min(x,y) MIN(x,y) 523393f8daSKenneth D. Merry #endif /* _KERNEL */ 5360ec4130SDag-Erling Smørgrav 544dc14139SDag-Erling Smørgrav /* 554dc14139SDag-Erling Smørgrav * Predicates 564dc14139SDag-Erling Smørgrav */ 574dc14139SDag-Erling Smørgrav #define SBUF_ISDYNAMIC(s) ((s)->s_flags & SBUF_DYNAMIC) 58d6479358SDag-Erling Smørgrav #define SBUF_ISDYNSTRUCT(s) ((s)->s_flags & SBUF_DYNSTRUCT) 594dc14139SDag-Erling Smørgrav #define SBUF_ISFINISHED(s) ((s)->s_flags & SBUF_FINISHED) 604dc14139SDag-Erling Smørgrav #define SBUF_HASOVERFLOWED(s) ((s)->s_flags & SBUF_OVERFLOWED) 614dc14139SDag-Erling Smørgrav #define SBUF_HASROOM(s) ((s)->s_len < (s)->s_size - 1) 624dc14139SDag-Erling Smørgrav 634dc14139SDag-Erling Smørgrav /* 644dc14139SDag-Erling Smørgrav * Set / clear flags 654dc14139SDag-Erling Smørgrav */ 664dc14139SDag-Erling Smørgrav #define SBUF_SETFLAG(s, f) do { (s)->s_flags |= (f); } while (0) 674dc14139SDag-Erling Smørgrav #define SBUF_CLEARFLAG(s, f) do { (s)->s_flags &= ~(f); } while (0) 684dc14139SDag-Erling Smørgrav 694dc14139SDag-Erling Smørgrav /* 704dc14139SDag-Erling Smørgrav * Debugging support 714dc14139SDag-Erling Smørgrav */ 723393f8daSKenneth D. Merry #if defined(_KERNEL) && defined(INVARIANTS) 7360ec4130SDag-Erling Smørgrav static void 74cab5b963SDag-Erling Smørgrav _assert_sbuf_integrity(char *fun, struct sbuf *s) 7560ec4130SDag-Erling Smørgrav { 7660ec4130SDag-Erling Smørgrav KASSERT(s != NULL, 77cab5b963SDag-Erling Smørgrav ("%s called with a NULL sbuf pointer", fun)); 7860ec4130SDag-Erling Smørgrav KASSERT(s->s_buf != NULL, 79cab5b963SDag-Erling Smørgrav ("%s called with unitialized or corrupt sbuf", fun)); 8060ec4130SDag-Erling Smørgrav KASSERT(s->s_len < s->s_size, 8160ec4130SDag-Erling Smørgrav ("wrote past end of sbuf (%d >= %d)", s->s_len, s->s_size)); 8260ec4130SDag-Erling Smørgrav } 8360ec4130SDag-Erling Smørgrav 8460ec4130SDag-Erling Smørgrav static void 85cab5b963SDag-Erling Smørgrav _assert_sbuf_state(char *fun, struct sbuf *s, int state) 8660ec4130SDag-Erling Smørgrav { 8760ec4130SDag-Erling Smørgrav KASSERT((s->s_flags & SBUF_FINISHED) == state, 88cab5b963SDag-Erling Smørgrav ("%s called with %sfinished or corrupt sbuf", fun, 8960ec4130SDag-Erling Smørgrav (state ? "un" : ""))); 9060ec4130SDag-Erling Smørgrav } 91cab5b963SDag-Erling Smørgrav #define assert_sbuf_integrity(s) _assert_sbuf_integrity(__FUNCTION__, (s)) 92cab5b963SDag-Erling Smørgrav #define assert_sbuf_state(s, i) _assert_sbuf_state(__FUNCTION__, (s), (i)) 933393f8daSKenneth D. Merry #else /* _KERNEL && INVARIANTS */ 9460ec4130SDag-Erling Smørgrav #define assert_sbuf_integrity(s) do { } while (0) 9560ec4130SDag-Erling Smørgrav #define assert_sbuf_state(s, i) do { } while (0) 963393f8daSKenneth D. Merry #endif /* _KERNEL && INVARIANTS */ 9760ec4130SDag-Erling Smørgrav 9860ec4130SDag-Erling Smørgrav /* 9960ec4130SDag-Erling Smørgrav * Initialize an sbuf. 10060ec4130SDag-Erling Smørgrav * If buf is non-NULL, it points to a static or already-allocated string 10160ec4130SDag-Erling Smørgrav * big enough to hold at least length characters. 10260ec4130SDag-Erling Smørgrav */ 103d6479358SDag-Erling Smørgrav struct sbuf * 1044dc14139SDag-Erling Smørgrav sbuf_new(struct sbuf *s, char *buf, int length, int flags) 10560ec4130SDag-Erling Smørgrav { 1064dc14139SDag-Erling Smørgrav KASSERT(length >= 0, 1074dc14139SDag-Erling Smørgrav ("attempt to create an sbuf of negative length (%d)", length)); 10860ec4130SDag-Erling Smørgrav KASSERT(flags == 0, 10960ec4130SDag-Erling Smørgrav (__FUNCTION__ " called with non-zero flags")); 11060ec4130SDag-Erling Smørgrav 111d6479358SDag-Erling Smørgrav if (s == NULL) { 112d6479358SDag-Erling Smørgrav s = (struct sbuf *)SBMALLOC(sizeof *s); 113d6479358SDag-Erling Smørgrav if (s == NULL) 114d6479358SDag-Erling Smørgrav return (NULL); 11560ec4130SDag-Erling Smørgrav bzero(s, sizeof *s); 116d6479358SDag-Erling Smørgrav SBUF_SETFLAG(s, SBUF_DYNSTRUCT); 117d6479358SDag-Erling Smørgrav } else { 118d6479358SDag-Erling Smørgrav bzero(s, sizeof *s); 119d6479358SDag-Erling Smørgrav } 12060ec4130SDag-Erling Smørgrav s->s_size = length; 12160ec4130SDag-Erling Smørgrav if (buf) { 12260ec4130SDag-Erling Smørgrav s->s_buf = buf; 123d6479358SDag-Erling Smørgrav return (s); 12460ec4130SDag-Erling Smørgrav } 1253393f8daSKenneth D. Merry s->s_buf = (char *)SBMALLOC(s->s_size); 126d6479358SDag-Erling Smørgrav if (s->s_buf == NULL) { 127d6479358SDag-Erling Smørgrav if (SBUF_ISDYNSTRUCT(s)) 128d6479358SDag-Erling Smørgrav SBFREE(s); 129d6479358SDag-Erling Smørgrav return (NULL); 130d6479358SDag-Erling Smørgrav } 13160ec4130SDag-Erling Smørgrav SBUF_SETFLAG(s, SBUF_DYNAMIC); 132d6479358SDag-Erling Smørgrav return (s); 13360ec4130SDag-Erling Smørgrav } 13460ec4130SDag-Erling Smørgrav 13560ec4130SDag-Erling Smørgrav /* 1364dc14139SDag-Erling Smørgrav * Clear an sbuf and reset its position 1374dc14139SDag-Erling Smørgrav */ 1384dc14139SDag-Erling Smørgrav void 1394dc14139SDag-Erling Smørgrav sbuf_clear(struct sbuf *s) 1404dc14139SDag-Erling Smørgrav { 1414dc14139SDag-Erling Smørgrav assert_sbuf_integrity(s); 1429fa2ef3dSDag-Erling Smørgrav /* don't care if it's finished or not */ 1434dc14139SDag-Erling Smørgrav 1444dc14139SDag-Erling Smørgrav SBUF_CLEARFLAG(s, SBUF_FINISHED); 1454dc14139SDag-Erling Smørgrav SBUF_CLEARFLAG(s, SBUF_OVERFLOWED); 1464dc14139SDag-Erling Smørgrav s->s_len = 0; 1474dc14139SDag-Erling Smørgrav } 1484dc14139SDag-Erling Smørgrav 1494dc14139SDag-Erling Smørgrav /* 15060ec4130SDag-Erling Smørgrav * Set the sbuf's position to an arbitrary value 15160ec4130SDag-Erling Smørgrav */ 15260ec4130SDag-Erling Smørgrav int 1534dc14139SDag-Erling Smørgrav sbuf_setpos(struct sbuf *s, int pos) 15460ec4130SDag-Erling Smørgrav { 15560ec4130SDag-Erling Smørgrav assert_sbuf_integrity(s); 15660ec4130SDag-Erling Smørgrav assert_sbuf_state(s, 0); 15760ec4130SDag-Erling Smørgrav 15860ec4130SDag-Erling Smørgrav KASSERT(pos >= 0, 15960ec4130SDag-Erling Smørgrav ("attempt to seek to a negative position (%d)", pos)); 16060ec4130SDag-Erling Smørgrav KASSERT(pos < s->s_size, 16160ec4130SDag-Erling Smørgrav ("attempt to seek past end of sbuf (%d >= %d)", pos, s->s_size)); 16260ec4130SDag-Erling Smørgrav 16360ec4130SDag-Erling Smørgrav if (pos < 0 || pos > s->s_len) 16460ec4130SDag-Erling Smørgrav return (-1); 16560ec4130SDag-Erling Smørgrav s->s_len = pos; 16660ec4130SDag-Erling Smørgrav return (0); 16760ec4130SDag-Erling Smørgrav } 16860ec4130SDag-Erling Smørgrav 16960ec4130SDag-Erling Smørgrav /* 17060ec4130SDag-Erling Smørgrav * Append a string to an sbuf. 17160ec4130SDag-Erling Smørgrav */ 17260ec4130SDag-Erling Smørgrav int 1733393f8daSKenneth D. Merry sbuf_cat(struct sbuf *s, const char *str) 17460ec4130SDag-Erling Smørgrav { 17560ec4130SDag-Erling Smørgrav assert_sbuf_integrity(s); 17660ec4130SDag-Erling Smørgrav assert_sbuf_state(s, 0); 17760ec4130SDag-Erling Smørgrav 17860ec4130SDag-Erling Smørgrav if (SBUF_HASOVERFLOWED(s)) 17960ec4130SDag-Erling Smørgrav return (-1); 18060ec4130SDag-Erling Smørgrav 18160ec4130SDag-Erling Smørgrav while (*str && SBUF_HASROOM(s)) 18260ec4130SDag-Erling Smørgrav s->s_buf[s->s_len++] = *str++; 18360ec4130SDag-Erling Smørgrav if (*str) { 18460ec4130SDag-Erling Smørgrav SBUF_SETFLAG(s, SBUF_OVERFLOWED); 18560ec4130SDag-Erling Smørgrav return (-1); 18660ec4130SDag-Erling Smørgrav } 18760ec4130SDag-Erling Smørgrav return (0); 18860ec4130SDag-Erling Smørgrav } 18960ec4130SDag-Erling Smørgrav 19060ec4130SDag-Erling Smørgrav /* 19160ec4130SDag-Erling Smørgrav * Copy a string into an sbuf. 19260ec4130SDag-Erling Smørgrav */ 19360ec4130SDag-Erling Smørgrav int 1943393f8daSKenneth D. Merry sbuf_cpy(struct sbuf *s, const char *str) 19560ec4130SDag-Erling Smørgrav { 19660ec4130SDag-Erling Smørgrav assert_sbuf_integrity(s); 19760ec4130SDag-Erling Smørgrav assert_sbuf_state(s, 0); 19860ec4130SDag-Erling Smørgrav 1994dc14139SDag-Erling Smørgrav sbuf_clear(s); 20060ec4130SDag-Erling Smørgrav return (sbuf_cat(s, str)); 20160ec4130SDag-Erling Smørgrav } 20260ec4130SDag-Erling Smørgrav 20360ec4130SDag-Erling Smørgrav /* 20460ec4130SDag-Erling Smørgrav * Format the given arguments and append the resulting string to an sbuf. 20560ec4130SDag-Erling Smørgrav */ 20660ec4130SDag-Erling Smørgrav int 20760ec4130SDag-Erling Smørgrav sbuf_printf(struct sbuf *s, char *fmt, ...) 20860ec4130SDag-Erling Smørgrav { 20960ec4130SDag-Erling Smørgrav va_list ap; 2104dc14139SDag-Erling Smørgrav int len; 21160ec4130SDag-Erling Smørgrav 21260ec4130SDag-Erling Smørgrav assert_sbuf_integrity(s); 21360ec4130SDag-Erling Smørgrav assert_sbuf_state(s, 0); 21460ec4130SDag-Erling Smørgrav 21560ec4130SDag-Erling Smørgrav KASSERT(fmt != NULL, 21660ec4130SDag-Erling Smørgrav (__FUNCTION__ " called with a NULL format string")); 21760ec4130SDag-Erling Smørgrav 21860ec4130SDag-Erling Smørgrav if (SBUF_HASOVERFLOWED(s)) 21960ec4130SDag-Erling Smørgrav return (-1); 22060ec4130SDag-Erling Smørgrav 22160ec4130SDag-Erling Smørgrav va_start(ap, fmt); 2223393f8daSKenneth D. Merry len = vsnprintf(&s->s_buf[s->s_len], s->s_size - s->s_len, fmt, ap); 22360ec4130SDag-Erling Smørgrav va_end(ap); 22460ec4130SDag-Erling Smørgrav 2253393f8daSKenneth D. Merry /* 2263393f8daSKenneth D. Merry * s->s_len is the length of the string, without the terminating nul. 2273393f8daSKenneth D. Merry * When updating s->s_len, we must subtract 1 from the length that 2283393f8daSKenneth D. Merry * we passed into vsnprintf() because that length includes the 2293393f8daSKenneth D. Merry * terminating nul. 2303393f8daSKenneth D. Merry * 2313393f8daSKenneth D. Merry * vsnprintf() returns the amount that would have been copied, 2323393f8daSKenneth D. Merry * given sufficient space, hence the min() calculation below. 2333393f8daSKenneth D. Merry */ 2343393f8daSKenneth D. Merry s->s_len += min(len, s->s_size - s->s_len - 1); 2353393f8daSKenneth D. Merry if (!SBUF_HASROOM(s)) 2363393f8daSKenneth D. Merry SBUF_SETFLAG(s, SBUF_OVERFLOWED); 2373393f8daSKenneth D. Merry 23860ec4130SDag-Erling Smørgrav KASSERT(s->s_len < s->s_size, 23960ec4130SDag-Erling Smørgrav ("wrote past end of sbuf (%d >= %d)", s->s_len, s->s_size)); 24060ec4130SDag-Erling Smørgrav 24160ec4130SDag-Erling Smørgrav if (SBUF_HASOVERFLOWED(s)) 24260ec4130SDag-Erling Smørgrav return (-1); 24360ec4130SDag-Erling Smørgrav return (0); 24460ec4130SDag-Erling Smørgrav } 24560ec4130SDag-Erling Smørgrav 24660ec4130SDag-Erling Smørgrav /* 24760ec4130SDag-Erling Smørgrav * Append a character to an sbuf. 24860ec4130SDag-Erling Smørgrav */ 24960ec4130SDag-Erling Smørgrav int 25060ec4130SDag-Erling Smørgrav sbuf_putc(struct sbuf *s, int c) 25160ec4130SDag-Erling Smørgrav { 25260ec4130SDag-Erling Smørgrav assert_sbuf_integrity(s); 25360ec4130SDag-Erling Smørgrav assert_sbuf_state(s, 0); 25460ec4130SDag-Erling Smørgrav 25560ec4130SDag-Erling Smørgrav if (SBUF_HASOVERFLOWED(s)) 25660ec4130SDag-Erling Smørgrav return (-1); 25760ec4130SDag-Erling Smørgrav 25860ec4130SDag-Erling Smørgrav if (!SBUF_HASROOM(s)) { 25960ec4130SDag-Erling Smørgrav SBUF_SETFLAG(s, SBUF_OVERFLOWED); 26060ec4130SDag-Erling Smørgrav return (-1); 26160ec4130SDag-Erling Smørgrav } 262cab5b963SDag-Erling Smørgrav if (c != '\0') 26360ec4130SDag-Erling Smørgrav s->s_buf[s->s_len++] = c; 26460ec4130SDag-Erling Smørgrav return (0); 26560ec4130SDag-Erling Smørgrav } 26660ec4130SDag-Erling Smørgrav 26760ec4130SDag-Erling Smørgrav /* 2684dc14139SDag-Erling Smørgrav * Check if an sbuf overflowed 26960ec4130SDag-Erling Smørgrav */ 27060ec4130SDag-Erling Smørgrav int 2714dc14139SDag-Erling Smørgrav sbuf_overflowed(struct sbuf *s) 2724dc14139SDag-Erling Smørgrav { 2734dc14139SDag-Erling Smørgrav return SBUF_HASOVERFLOWED(s); 2744dc14139SDag-Erling Smørgrav } 2754dc14139SDag-Erling Smørgrav 2764dc14139SDag-Erling Smørgrav /* 2774dc14139SDag-Erling Smørgrav * Finish off an sbuf. 2784dc14139SDag-Erling Smørgrav */ 2794dc14139SDag-Erling Smørgrav void 28060ec4130SDag-Erling Smørgrav sbuf_finish(struct sbuf *s) 28160ec4130SDag-Erling Smørgrav { 28260ec4130SDag-Erling Smørgrav assert_sbuf_integrity(s); 28360ec4130SDag-Erling Smørgrav assert_sbuf_state(s, 0); 28460ec4130SDag-Erling Smørgrav 285cab5b963SDag-Erling Smørgrav s->s_buf[s->s_len] = '\0'; 2864dc14139SDag-Erling Smørgrav SBUF_CLEARFLAG(s, SBUF_OVERFLOWED); 28760ec4130SDag-Erling Smørgrav SBUF_SETFLAG(s, SBUF_FINISHED); 28860ec4130SDag-Erling Smørgrav } 28960ec4130SDag-Erling Smørgrav 29060ec4130SDag-Erling Smørgrav /* 29160ec4130SDag-Erling Smørgrav * Return a pointer to the sbuf data. 29260ec4130SDag-Erling Smørgrav */ 29360ec4130SDag-Erling Smørgrav char * 29460ec4130SDag-Erling Smørgrav sbuf_data(struct sbuf *s) 29560ec4130SDag-Erling Smørgrav { 29660ec4130SDag-Erling Smørgrav assert_sbuf_integrity(s); 29760ec4130SDag-Erling Smørgrav assert_sbuf_state(s, SBUF_FINISHED); 29860ec4130SDag-Erling Smørgrav 29960ec4130SDag-Erling Smørgrav return s->s_buf; 30060ec4130SDag-Erling Smørgrav } 30160ec4130SDag-Erling Smørgrav 30260ec4130SDag-Erling Smørgrav /* 30360ec4130SDag-Erling Smørgrav * Return the length of the sbuf data. 30460ec4130SDag-Erling Smørgrav */ 3054dc14139SDag-Erling Smørgrav int 30660ec4130SDag-Erling Smørgrav sbuf_len(struct sbuf *s) 30760ec4130SDag-Erling Smørgrav { 30860ec4130SDag-Erling Smørgrav assert_sbuf_integrity(s); 3099fa2ef3dSDag-Erling Smørgrav /* don't care if it's finished or not */ 31060ec4130SDag-Erling Smørgrav 31160ec4130SDag-Erling Smørgrav if (SBUF_HASOVERFLOWED(s)) 3124dc14139SDag-Erling Smørgrav return (-1); 31360ec4130SDag-Erling Smørgrav return s->s_len; 31460ec4130SDag-Erling Smørgrav } 31560ec4130SDag-Erling Smørgrav 31660ec4130SDag-Erling Smørgrav /* 31760ec4130SDag-Erling Smørgrav * Clear an sbuf, free its buffer if necessary. 31860ec4130SDag-Erling Smørgrav */ 31960ec4130SDag-Erling Smørgrav void 32060ec4130SDag-Erling Smørgrav sbuf_delete(struct sbuf *s) 32160ec4130SDag-Erling Smørgrav { 32260ec4130SDag-Erling Smørgrav assert_sbuf_integrity(s); 32360ec4130SDag-Erling Smørgrav /* don't care if it's finished or not */ 32460ec4130SDag-Erling Smørgrav 32560ec4130SDag-Erling Smørgrav if (SBUF_ISDYNAMIC(s)) 3263393f8daSKenneth D. Merry SBFREE(s->s_buf); 32760ec4130SDag-Erling Smørgrav bzero(s, sizeof *s); 328d6479358SDag-Erling Smørgrav if (SBUF_ISDYNSTRUCT(s)) 329d6479358SDag-Erling Smørgrav SBFREE(s); 33060ec4130SDag-Erling Smørgrav } 331