xref: /freebsd/sys/kern/subr_sbuf.c (revision a3cf0ef5a295c885c895fabfd56470c0d1db322d)
1 /*-
2  * Copyright (c) 2000-2008 Poul-Henning Kamp
3  * Copyright (c) 2000-2008 Dag-Erling Coïdan Smørgrav
4  * All rights reserved.
5  *
6  * Redistribution and use in source and binary forms, with or without
7  * modification, are permitted provided that the following conditions
8  * are met:
9  * 1. Redistributions of source code must retain the above copyright
10  *    notice, this list of conditions and the following disclaimer
11  *    in this position and unchanged.
12  * 2. Redistributions in binary form must reproduce the above copyright
13  *    notice, this list of conditions and the following disclaimer in the
14  *    documentation and/or other materials provided with the distribution.
15  *
16  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
17  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
18  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
19  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
20  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
21  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
22  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
23  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
24  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
25  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
26  * SUCH DAMAGE.
27  */
28 
29 #include <sys/cdefs.h>
30 __FBSDID("$FreeBSD$");
31 
32 #include <sys/param.h>
33 
34 #ifdef _KERNEL
35 #include <sys/ctype.h>
36 #include <sys/errno.h>
37 #include <sys/kernel.h>
38 #include <sys/malloc.h>
39 #include <sys/systm.h>
40 #include <sys/uio.h>
41 #include <machine/stdarg.h>
42 #else /* _KERNEL */
43 #include <ctype.h>
44 #include <errno.h>
45 #include <stdarg.h>
46 #include <stdio.h>
47 #include <stdlib.h>
48 #include <string.h>
49 #endif /* _KERNEL */
50 
51 #include <sys/sbuf.h>
52 
53 #ifdef _KERNEL
54 static MALLOC_DEFINE(M_SBUF, "sbuf", "string buffers");
55 #define	SBMALLOC(size)		malloc(size, M_SBUF, M_WAITOK)
56 #define	SBFREE(buf)		free(buf, M_SBUF)
57 #else /* _KERNEL */
58 #define	KASSERT(e, m)
59 #define	SBMALLOC(size)		malloc(size)
60 #define	SBFREE(buf)		free(buf)
61 #endif /* _KERNEL */
62 
63 /*
64  * Predicates
65  */
66 #define	SBUF_ISDYNAMIC(s)	((s)->s_flags & SBUF_DYNAMIC)
67 #define	SBUF_ISDYNSTRUCT(s)	((s)->s_flags & SBUF_DYNSTRUCT)
68 #define	SBUF_ISFINISHED(s)	((s)->s_flags & SBUF_FINISHED)
69 #define	SBUF_HASROOM(s)		((s)->s_len < (s)->s_size - 1)
70 #define	SBUF_FREESPACE(s)	((s)->s_size - (s)->s_len - 1)
71 #define	SBUF_CANEXTEND(s)	((s)->s_flags & SBUF_AUTOEXTEND)
72 
73 /*
74  * Set / clear flags
75  */
76 #define	SBUF_SETFLAG(s, f)	do { (s)->s_flags |= (f); } while (0)
77 #define	SBUF_CLEARFLAG(s, f)	do { (s)->s_flags &= ~(f); } while (0)
78 
79 #define	SBUF_MINEXTENDSIZE	16		/* Should be power of 2. */
80 #define	SBUF_MAXEXTENDSIZE	PAGE_SIZE
81 #define	SBUF_MAXEXTENDINCR	PAGE_SIZE
82 
83 /*
84  * Debugging support
85  */
86 #if defined(_KERNEL) && defined(INVARIANTS)
87 
88 static void
89 _assert_sbuf_integrity(const char *fun, struct sbuf *s)
90 {
91 
92 	KASSERT(s != NULL,
93 	    ("%s called with a NULL sbuf pointer", fun));
94 	KASSERT(s->s_buf != NULL,
95 	    ("%s called with uninitialized or corrupt sbuf", fun));
96 	KASSERT(s->s_len < s->s_size,
97 	    ("wrote past end of sbuf (%d >= %d)", s->s_len, s->s_size));
98 }
99 
100 static void
101 _assert_sbuf_state(const char *fun, struct sbuf *s, int state)
102 {
103 
104 	KASSERT((s->s_flags & SBUF_FINISHED) == state,
105 	    ("%s called with %sfinished or corrupt sbuf", fun,
106 	    (state ? "un" : "")));
107 }
108 
109 #define	assert_sbuf_integrity(s) _assert_sbuf_integrity(__func__, (s))
110 #define	assert_sbuf_state(s, i)	 _assert_sbuf_state(__func__, (s), (i))
111 
112 #else /* _KERNEL && INVARIANTS */
113 
114 #define	assert_sbuf_integrity(s) do { } while (0)
115 #define	assert_sbuf_state(s, i)	 do { } while (0)
116 
117 #endif /* _KERNEL && INVARIANTS */
118 
119 #ifdef CTASSERT
120 CTASSERT(powerof2(SBUF_MAXEXTENDSIZE));
121 CTASSERT(powerof2(SBUF_MAXEXTENDINCR));
122 #endif
123 
124 static int
125 sbuf_extendsize(int size)
126 {
127 	int newsize;
128 
129 	if (size < (int)SBUF_MAXEXTENDSIZE) {
130 		newsize = SBUF_MINEXTENDSIZE;
131 		while (newsize < size)
132 			newsize *= 2;
133 	} else {
134 		newsize = roundup2(size, SBUF_MAXEXTENDINCR);
135 	}
136 	KASSERT(newsize >= size, ("%s: %d < %d\n", __func__, newsize, size));
137 	return (newsize);
138 }
139 
140 
141 /*
142  * Extend an sbuf.
143  */
144 static int
145 sbuf_extend(struct sbuf *s, int addlen)
146 {
147 	char *newbuf;
148 	int newsize;
149 
150 	if (!SBUF_CANEXTEND(s))
151 		return (-1);
152 	newsize = sbuf_extendsize(s->s_size + addlen);
153 	newbuf = SBMALLOC(newsize);
154 	if (newbuf == NULL)
155 		return (-1);
156 	bcopy(s->s_buf, newbuf, s->s_size);
157 	if (SBUF_ISDYNAMIC(s))
158 		SBFREE(s->s_buf);
159 	else
160 		SBUF_SETFLAG(s, SBUF_DYNAMIC);
161 	s->s_buf = newbuf;
162 	s->s_size = newsize;
163 	return (0);
164 }
165 
166 /*
167  * Initialize an sbuf.
168  * If buf is non-NULL, it points to a static or already-allocated string
169  * big enough to hold at least length characters.
170  */
171 struct sbuf *
172 sbuf_new(struct sbuf *s, char *buf, int length, int flags)
173 {
174 
175 	KASSERT(length >= 0,
176 	    ("attempt to create an sbuf of negative length (%d)", length));
177 	KASSERT((flags & ~SBUF_USRFLAGMSK) == 0,
178 	    ("%s called with invalid flags", __func__));
179 
180 	flags &= SBUF_USRFLAGMSK;
181 	if (s == NULL) {
182 		s = SBMALLOC(sizeof(*s));
183 		if (s == NULL)
184 			return (NULL);
185 		bzero(s, sizeof(*s));
186 		s->s_flags = flags;
187 		SBUF_SETFLAG(s, SBUF_DYNSTRUCT);
188 	} else {
189 		bzero(s, sizeof(*s));
190 		s->s_flags = flags;
191 	}
192 	s->s_size = length;
193 	if (buf != NULL) {
194 		s->s_buf = buf;
195 		return (s);
196 	}
197 	if ((flags & SBUF_AUTOEXTEND) != 0)
198 		s->s_size = sbuf_extendsize(s->s_size);
199 	s->s_buf = SBMALLOC(s->s_size);
200 	if (s->s_buf == NULL) {
201 		if (SBUF_ISDYNSTRUCT(s))
202 			SBFREE(s);
203 		return (NULL);
204 	}
205 	SBUF_SETFLAG(s, SBUF_DYNAMIC);
206 	return (s);
207 }
208 
209 #ifdef _KERNEL
210 /*
211  * Create an sbuf with uio data
212  */
213 struct sbuf *
214 sbuf_uionew(struct sbuf *s, struct uio *uio, int *error)
215 {
216 
217 	KASSERT(uio != NULL,
218 	    ("%s called with NULL uio pointer", __func__));
219 	KASSERT(error != NULL,
220 	    ("%s called with NULL error pointer", __func__));
221 
222 	s = sbuf_new(s, NULL, uio->uio_resid + 1, 0);
223 	if (s == NULL) {
224 		*error = ENOMEM;
225 		return (NULL);
226 	}
227 	*error = uiomove(s->s_buf, uio->uio_resid, uio);
228 	if (*error != 0) {
229 		sbuf_delete(s);
230 		return (NULL);
231 	}
232 	s->s_len = s->s_size - 1;
233 	*error = 0;
234 	return (s);
235 }
236 #endif
237 
238 /*
239  * Clear an sbuf and reset its position.
240  */
241 void
242 sbuf_clear(struct sbuf *s)
243 {
244 
245 	assert_sbuf_integrity(s);
246 	/* don't care if it's finished or not */
247 
248 	SBUF_CLEARFLAG(s, SBUF_FINISHED);
249 	s->s_error = 0;
250 	s->s_len = 0;
251 }
252 
253 /*
254  * Set the sbuf's end position to an arbitrary value.
255  * Effectively truncates the sbuf at the new position.
256  */
257 int
258 sbuf_setpos(struct sbuf *s, int pos)
259 {
260 
261 	assert_sbuf_integrity(s);
262 	assert_sbuf_state(s, 0);
263 
264 	KASSERT(pos >= 0,
265 	    ("attempt to seek to a negative position (%d)", pos));
266 	KASSERT(pos < s->s_size,
267 	    ("attempt to seek past end of sbuf (%d >= %d)", pos, s->s_size));
268 
269 	if (pos < 0 || pos > s->s_len)
270 		return (-1);
271 	s->s_len = pos;
272 	return (0);
273 }
274 
275 /*
276  * Set up a drain function and argument on an sbuf to flush data to
277  * when the sbuf buffer overflows.
278  */
279 void
280 sbuf_set_drain(struct sbuf *s, sbuf_drain_func *func, void *ctx)
281 {
282 
283 	assert_sbuf_state(s, 0);
284 	assert_sbuf_integrity(s);
285 	KASSERT(func == s->s_drain_func || s->s_len == 0,
286 	    ("Cannot change drain to %p on non-empty sbuf %p", func, s));
287 	s->s_drain_func = func;
288 	s->s_drain_arg = ctx;
289 }
290 
291 /*
292  * Call the drain and process the return.
293  */
294 static int
295 sbuf_drain(struct sbuf *s)
296 {
297 	int len;
298 
299 	KASSERT(s->s_len > 0, ("Shouldn't drain empty sbuf %p", s));
300 	KASSERT(s->s_error == 0, ("Called %s with error on %p", __func__, s));
301 	len = s->s_drain_func(s->s_drain_arg, s->s_buf, s->s_len);
302 	if (len < 0) {
303 		s->s_error = -len;
304 		return (s->s_error);
305 	}
306 	KASSERT(len > 0 && len <= s->s_len,
307 	    ("Bad drain amount %d for sbuf %p", len, s));
308 	s->s_len -= len;
309 	/*
310 	 * Fast path for the expected case where all the data was
311 	 * drained.
312 	 */
313 	if (s->s_len == 0)
314 		return (0);
315 	/*
316 	 * Move the remaining characters to the beginning of the
317 	 * string.
318 	 */
319 	memmove(s->s_buf, s->s_buf + len, s->s_len);
320 	return (0);
321 }
322 
323 /*
324  * Append a byte to an sbuf.  This is the core function for appending
325  * to an sbuf and is the main place that deals with extending the
326  * buffer and marking overflow.
327  */
328 static void
329 sbuf_put_byte(int c, struct sbuf *s)
330 {
331 
332 	assert_sbuf_integrity(s);
333 	assert_sbuf_state(s, 0);
334 
335 	if (s->s_error != 0)
336 		return;
337 	if (SBUF_FREESPACE(s) <= 0) {
338 		/*
339 		 * If there is a drain, use it, otherwise extend the
340 		 * buffer.
341 		 */
342 		if (s->s_drain_func != NULL)
343 			(void)sbuf_drain(s);
344 		else if (sbuf_extend(s, 1) < 0)
345 			s->s_error = ENOMEM;
346 		if (s->s_error != 0)
347 			return;
348 	}
349 	s->s_buf[s->s_len++] = c;
350 }
351 
352 /*
353  * Append a non-NUL character to an sbuf.  This prototype signature is
354  * suitable for use with kvprintf(9).
355  */
356 static void
357 sbuf_putc_func(int c, void *arg)
358 {
359 
360 	if (c != '\0')
361 		sbuf_put_byte(c, arg);
362 }
363 
364 /*
365  * Append a byte string to an sbuf.
366  */
367 int
368 sbuf_bcat(struct sbuf *s, const void *buf, size_t len)
369 {
370 	const char *str = buf;
371 	const char *end = str + len;
372 
373 	assert_sbuf_integrity(s);
374 	assert_sbuf_state(s, 0);
375 
376 	if (s->s_error != 0)
377 		return (-1);
378 	for (; str < end; str++) {
379 		sbuf_put_byte(*str, s);
380 		if (s->s_error != 0)
381 			return (-1);
382  	}
383 	return (0);
384 }
385 
386 #ifdef _KERNEL
387 /*
388  * Copy a byte string from userland into an sbuf.
389  */
390 int
391 sbuf_bcopyin(struct sbuf *s, const void *uaddr, size_t len)
392 {
393 
394 	assert_sbuf_integrity(s);
395 	assert_sbuf_state(s, 0);
396 	KASSERT(s->s_drain_func == NULL,
397 	    ("Nonsensical copyin to sbuf %p with a drain", s));
398 
399 	if (s->s_error != 0)
400 		return (-1);
401 	if (len == 0)
402 		return (0);
403 	if (len > SBUF_FREESPACE(s)) {
404 		sbuf_extend(s, len - SBUF_FREESPACE(s));
405 		if (SBUF_FREESPACE(s) < len)
406 			len = SBUF_FREESPACE(s);
407 	}
408 	if (copyin(uaddr, s->s_buf + s->s_len, len) != 0)
409 		return (-1);
410 	s->s_len += len;
411 
412 	return (0);
413 }
414 #endif
415 
416 /*
417  * Copy a byte string into an sbuf.
418  */
419 int
420 sbuf_bcpy(struct sbuf *s, const void *buf, size_t len)
421 {
422 
423 	assert_sbuf_integrity(s);
424 	assert_sbuf_state(s, 0);
425 
426 	sbuf_clear(s);
427 	return (sbuf_bcat(s, buf, len));
428 }
429 
430 /*
431  * Append a string to an sbuf.
432  */
433 int
434 sbuf_cat(struct sbuf *s, const char *str)
435 {
436 
437 	assert_sbuf_integrity(s);
438 	assert_sbuf_state(s, 0);
439 
440 	if (s->s_error != 0)
441 		return (-1);
442 
443 	while (*str != '\0') {
444 		sbuf_put_byte(*str++, s);
445 		if (s->s_error != 0)
446 			return (-1);
447 	}
448 	return (0);
449 }
450 
451 #ifdef _KERNEL
452 /*
453  * Append a string from userland to an sbuf.
454  */
455 int
456 sbuf_copyin(struct sbuf *s, const void *uaddr, size_t len)
457 {
458 	size_t done;
459 
460 	assert_sbuf_integrity(s);
461 	assert_sbuf_state(s, 0);
462 	KASSERT(s->s_drain_func == NULL,
463 	    ("Nonsensical copyin to sbuf %p with a drain", s));
464 
465 	if (s->s_error != 0)
466 		return (-1);
467 
468 	if (len == 0)
469 		len = SBUF_FREESPACE(s);	/* XXX return 0? */
470 	if (len > SBUF_FREESPACE(s)) {
471 		sbuf_extend(s, len);
472 		if (SBUF_FREESPACE(s) < len)
473 			len = SBUF_FREESPACE(s);
474 	}
475 	switch (copyinstr(uaddr, s->s_buf + s->s_len, len + 1, &done)) {
476 	case ENAMETOOLONG:
477 		s->s_error = ENOMEM;
478 		/* fall through */
479 	case 0:
480 		s->s_len += done - 1;
481 		break;
482 	default:
483 		return (-1);	/* XXX */
484 	}
485 
486 	return (done);
487 }
488 #endif
489 
490 /*
491  * Copy a string into an sbuf.
492  */
493 int
494 sbuf_cpy(struct sbuf *s, const char *str)
495 {
496 
497 	assert_sbuf_integrity(s);
498 	assert_sbuf_state(s, 0);
499 
500 	sbuf_clear(s);
501 	return (sbuf_cat(s, str));
502 }
503 
504 /*
505  * Format the given argument list and append the resulting string to an sbuf.
506  */
507 #ifdef _KERNEL
508 int
509 sbuf_vprintf(struct sbuf *s, const char *fmt, va_list ap)
510 {
511 
512 	assert_sbuf_integrity(s);
513 	assert_sbuf_state(s, 0);
514 
515 	KASSERT(fmt != NULL,
516 	    ("%s called with a NULL format string", __func__));
517 
518 	(void)kvprintf(fmt, sbuf_putc_func, s, 10, ap);
519 	if (s->s_error != 0)
520 		return (-1);
521 	return (0);
522 }
523 #else /* !_KERNEL */
524 int
525 sbuf_vprintf(struct sbuf *s, const char *fmt, va_list ap)
526 {
527 	va_list ap_copy;
528 	int error, len;
529 
530 	assert_sbuf_integrity(s);
531 	assert_sbuf_state(s, 0);
532 
533 	KASSERT(fmt != NULL,
534 	    ("%s called with a NULL format string", __func__));
535 
536 	if (s->s_error != 0)
537 		return (-1);
538 
539 	/*
540 	 * For the moment, there is no way to get vsnprintf(3) to hand
541 	 * back a character at a time, to push everything into
542 	 * sbuf_putc_func() as was done for the kernel.
543 	 *
544 	 * In userspace, while drains are useful, there's generally
545 	 * not a problem attempting to malloc(3) on out of space.  So
546 	 * expand a userland sbuf if there is not enough room for the
547 	 * data produced by sbuf_[v]printf(3).
548 	 */
549 
550 	error = 0;
551 	do {
552 		va_copy(ap_copy, ap);
553 		len = vsnprintf(&s->s_buf[s->s_len], SBUF_FREESPACE(s) + 1,
554 		    fmt, ap_copy);
555 		va_end(ap_copy);
556 
557 		if (SBUF_FREESPACE(s) >= len)
558 			break;
559 		/* Cannot print with the current available space. */
560 		if (s->s_drain_func != NULL && s->s_len > 0)
561 			error = sbuf_drain(s);
562 		else
563 			error = sbuf_extend(s, len - SBUF_FREESPACE(s));
564 	} while (error == 0);
565 
566 	/*
567 	 * s->s_len is the length of the string, without the terminating nul.
568 	 * When updating s->s_len, we must subtract 1 from the length that
569 	 * we passed into vsnprintf() because that length includes the
570 	 * terminating nul.
571 	 *
572 	 * vsnprintf() returns the amount that would have been copied,
573 	 * given sufficient space, so don't over-increment s_len.
574 	 */
575 	if (SBUF_FREESPACE(s) < len)
576 		len = SBUF_FREESPACE(s);
577 	s->s_len += len;
578 	if (!SBUF_HASROOM(s) && !SBUF_CANEXTEND(s))
579 		s->s_error = ENOMEM;
580 
581 	KASSERT(s->s_len < s->s_size,
582 	    ("wrote past end of sbuf (%d >= %d)", s->s_len, s->s_size));
583 
584 	if (s->s_error != 0)
585 		return (-1);
586 	return (0);
587 }
588 #endif /* _KERNEL */
589 
590 /*
591  * Format the given arguments and append the resulting string to an sbuf.
592  */
593 int
594 sbuf_printf(struct sbuf *s, const char *fmt, ...)
595 {
596 	va_list ap;
597 	int result;
598 
599 	va_start(ap, fmt);
600 	result = sbuf_vprintf(s, fmt, ap);
601 	va_end(ap);
602 	return (result);
603 }
604 
605 /*
606  * Append a character to an sbuf.
607  */
608 int
609 sbuf_putc(struct sbuf *s, int c)
610 {
611 
612 	sbuf_putc_func(c, s);
613 	if (s->s_error != 0)
614 		return (-1);
615 	return (0);
616 }
617 
618 /*
619  * Trim whitespace characters from end of an sbuf.
620  */
621 int
622 sbuf_trim(struct sbuf *s)
623 {
624 
625 	assert_sbuf_integrity(s);
626 	assert_sbuf_state(s, 0);
627 	KASSERT(s->s_drain_func == NULL,
628 	    ("%s makes no sense on sbuf %p with drain", __func__, s));
629 
630 	if (s->s_error != 0)
631 		return (-1);
632 
633 	while (s->s_len > 0 && isspace(s->s_buf[s->s_len-1]))
634 		--s->s_len;
635 
636 	return (0);
637 }
638 
639 /*
640  * Check if an sbuf has an error.
641  */
642 int
643 sbuf_error(struct sbuf *s)
644 {
645 
646 	return (s->s_error);
647 }
648 
649 /*
650  * Finish off an sbuf.
651  */
652 int
653 sbuf_finish(struct sbuf *s)
654 {
655 	int error;
656 
657 	assert_sbuf_integrity(s);
658 	assert_sbuf_state(s, 0);
659 
660 	error = s->s_error;
661 	if (s->s_drain_func != NULL) {
662 		while (s->s_len > 0 && error == 0)
663 			error = sbuf_drain(s);
664 	}
665 	s->s_buf[s->s_len] = '\0';
666 	s->s_error = 0;
667 	SBUF_SETFLAG(s, SBUF_FINISHED);
668 #ifdef _KERNEL
669 	return (error);
670 #else
671 	errno = error;
672 	return (-1);
673 #endif
674 }
675 
676 /*
677  * Return a pointer to the sbuf data.
678  */
679 char *
680 sbuf_data(struct sbuf *s)
681 {
682 
683 	assert_sbuf_integrity(s);
684 	assert_sbuf_state(s, SBUF_FINISHED);
685 	KASSERT(s->s_drain_func == NULL,
686 	    ("%s makes no sense on sbuf %p with drain", __func__, s));
687 
688 	return (s->s_buf);
689 }
690 
691 /*
692  * Return the length of the sbuf data.
693  */
694 int
695 sbuf_len(struct sbuf *s)
696 {
697 
698 	assert_sbuf_integrity(s);
699 	/* don't care if it's finished or not */
700 	KASSERT(s->s_drain_func == NULL,
701 	    ("%s makes no sense on sbuf %p with drain", __func__, s));
702 
703 	if (s->s_error != 0)
704 		return (-1);
705 	return (s->s_len);
706 }
707 
708 /*
709  * Clear an sbuf, free its buffer if necessary.
710  */
711 void
712 sbuf_delete(struct sbuf *s)
713 {
714 	int isdyn;
715 
716 	assert_sbuf_integrity(s);
717 	/* don't care if it's finished or not */
718 
719 	if (SBUF_ISDYNAMIC(s))
720 		SBFREE(s->s_buf);
721 	isdyn = SBUF_ISDYNSTRUCT(s);
722 	bzero(s, sizeof(*s));
723 	if (isdyn)
724 		SBFREE(s);
725 }
726 
727 /*
728  * Check if an sbuf has been finished.
729  */
730 int
731 sbuf_done(struct sbuf *s)
732 {
733 
734 	return (SBUF_ISFINISHED(s));
735 }
736