squashfs-tools-ng VS SDS

Compare squashfs-tools-ng vs SDS and see what are their differences.

SDS

Simple Dynamic Strings library for C (by antirez)
InfluxDB - Power Real-Time Data Analytics at Scale
Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
www.influxdata.com
featured
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com
featured
squashfs-tools-ng SDS
7 48
187 4,787
- -
8.0 0.0
about 1 month ago 7 months ago
C C
GNU General Public License v3.0 or later BSD 2-clause "Simplified" License
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

squashfs-tools-ng

Posts with mentions or reviews of squashfs-tools-ng. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-04-06.
  • C Strings and my slow descent to madness
    3 projects | news.ycombinator.com | 6 Apr 2023
    ... except that that is also subtly broken.

    It works if you write multiple UTF-8 code-units in one go, but breaks if you send them in several writes, or if you use the ANSI API (with the A suffix). Guess what the Windows implementation of stdio (printf and friends) does.

    I already had some fun with this: https://github.com/AgentD/squashfs-tools-ng/issues/96#issuec...

    And we didn't even discuss command line argument passing yet :-)

    I tried to test it with the only other two languages I know besides English: German and Mandarin. Specifically also, because the later requires multi-byte characters to work. Getting this to work at all in a Windows terminal on an existing, German Windows 7 installation was an adventure on it's own.

    Turns out, trying to write language agnostic command line applications on Windows is a PITA.

  • Getting the maximum of your C compiler, for security
    3 projects | news.ycombinator.com | 31 Aug 2021
    IIRC fanalyzer is a fairly recent addition to gcc. Has it become reasonable usable yet?

    I recall getting a bit excited when I first read about it, but the results I got where rather bizarre (e.g. every single function that allocated memory and returned a pointer to it was labeled as leaking memory).

    It did the fun exercise myself once to riffle through the gcc manpage, cobble together warning flags and massage them into autoconf[1][2].

    There is a very handy m4 script in the util-linux source for testing supported warning flags[3].

    [1] https://git.infradead.org/mtd-utils.git/blob/HEAD:/configure...

    [2] https://github.com/AgentD/squashfs-tools-ng/blob/master/conf...

    [3] https://github.com/karelzak/util-linux/blob/master/m4/compil...

  • Squashfs turning 20, Squashfs tools 4.5 released
    3 projects | news.ycombinator.com | 24 Jul 2021
    > Honestly I think you could be a little more respectful of the project that inspired yours.

    I do. I had a lot of great "Huh? That's clever!" moments while reverse engineering the format and formed a mental image of a clearly brilliant programmer who managed to squeeze the last bits out of some data structures using really clever tricks that I myself probably wouldn't have come up with. During that time I gained a lot of respect for the project and the author.

    Also, please don't forget: the whole project is the filesystem, the tools are just a part of that. I care about this project, which is why I decided to start this effort in the first place. Which I explicitly did not advertise as a replacement, but an augmentation (see [2]).

    > I'd be angry too ... Definitely understandable.

    Yes, I agree! And I can understand why in the heat of the moment you might write something angry and threatening. But certainly not if you've had a few weeks time to calm down and think things over.

    > And you plagiarized part of his readme.

    https://github.com/plougher/squashfs-tools/blob/master/RELEA...

    https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/lin...

    https://github.com/AgentD/squashfs-tools-ng/blob/master/READ...

    Oh yes? Which part?

    > ... calling it spaghetti code (which isn't immediately verifiable)

    Here you go, have fun: https://github.com/plougher/squashfs-tools/blob/master/squas...

    However, I cannot blame anyone here, I totally get how those things happen and have witnessed it myself in action:

    You write a simple tool supporting a larger project. It's written by the seat of your pants without much planning, since it's not big and does one simple job. Then it gets used in production, eventually requirements change, other people pile on patches, but try to keep the diff small, so it's reviewable and it receives maybe a little less care than the actual project it supports. Nobody bothers to overhaul it or write documentation because, hey, it works, and any large changes might risk breaking things.

    Even if nobody is to blame for it, the end result is still the same: an undocumented mess that is hard to wrap your head around if you aren't the original author, who is the only one with the bigger picture.

    I tried for roughly a week to pull the code (there are some more files than this and some of the inter dependencies are nasty) apart into stacked utility libraries and a pure command line parsing front end, with the hopes to maybe get this upstream once it is done. I gave up and decided that at this point I understood enough about the format to start afresh and not touch what I believed to be an unmaintained mess.

  • The Byte Order Fiasco
    7 projects | news.ycombinator.com | 8 May 2021
    FWIW there is an on various BSDs that contains "beXXtoh", "leXXtoh", "htobeXX", "htoleXX" where XX is a number of bits (16, 32, 64).

    That header is also available on Linux, but glibc (and compatible libraries) put named it instead.

    See: man 3 endian (https://linux.die.net/man/3/endian)

    Of course it gets a bit hairier if the code is also supposed to run on other systems.

    MacOS has OSSwapHostToLittleIntXX, OSSwapLittleToHostIntXX, OSSwapHostToBigIntXX and OSSwapBigToHostIntXX in .

    I'm not sure if Windows has something similar, or if it even supports running on big endian machines (if you know, please tell).

    My solution for achieving some portability currently entails cobbling together a "compat.h" header that defines macros for the MacOS functions and including the right headers. Something like this:

    https://github.com/AgentD/squashfs-tools-ng/blob/master/incl...

    This is usually my go-to-solution for working with low level on-disk or on-the-wire binary data structures that demand a specific endianness. In C I use "load/store" style functions that memcpy the data from a buffer into a struct instance and do the endian swapping. The copying is also necessary because the struct in the buffer may not have proper alignment.

    In C++ code, all of this can of course be neatly stowed away in a special class with overloaded operators that transparently takes care of everything and "decays" into a single integer and exactly the above code after compilation, but is IMO somewhat cleaner to read and adds much needed type safety.

  • Tar is an ill-specified format
    3 projects | news.ycombinator.com | 29 Mar 2021
    I once foolishly thought, I'll write a tar parser because, "how hard can it be" [1].

    I simply tried to follow the tar(5) man page[2], and got a reference test set from another website posted previously on HN[3].

    Along the way I discovered that NetBSD pax apparently cannot handle the PAX format[3] and my parser inadvertently uncovered that git-archive was doing the checksums wrong, but nobody noticed because other tar parsers were more lax about it[4].

    As the article describes (as does the man page), tar is actually a really simple format, but there are just so many variants to choose from.

    Turns out, if you strive for maximum compatibility, it's easiest to stick to what GNU tar does. If you think about it, IMO in many ways the GNU project ended up doing "embrace, extend, extinguish" with Unix.

    [1] https://github.com/AgentD/squashfs-tools-ng/tree/master/lib/...

    [2] https://www.freebsd.org/cgi/man.cgi?query=tar&sektion=5

    [3] https://mgorny.pl/articles/portability-of-tar-features.html

    [4] https://www.spinics.net/lists/git/msg363049.html

  • LZ4, an Extremely Fast Compression Algorithm
    9 projects | news.ycombinator.com | 27 Jan 2021
    A while ago I did some simplistic SquashFS pack/unpack benchmarks[1][2]. I was primarily interested in looking at the behavior of my thread-pool based packer, but as a side effect I got a comparison of compressor speed & ratios over the various available compressors for my Debian test image.

    I must say that LZ4 definitely stands out for both compression and uncompression speed, while still being able to cut the data size in half, making it probably quite suitable for life filesystems and network protocols. Particularly interesting was also comparing Zstd and LZ4[3], the former being substantially slower, but at the same time achieving a compression ratio somewhere between zlib and xz, while beating both in time (in my benchmark at least).

    [1] https://github.com/AgentD/squashfs-tools-ng/blob/master/doc/...

    [2] https://github.com/AgentD/squashfs-tools-ng/blob/master/doc/...

    [3] https://github.com/AgentD/squashfs-tools-ng/blob/master/doc/...

SDS

Posts with mentions or reviews of SDS. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-05-06.
  • Strlcpy and strlcat added to glibc 2.38
    1 project | news.ycombinator.com | 18 Jul 2023
    Let me reframe this. What we're saying to do is stop using C string manipulation such as strcat, strcpy, etc. Particularly, I'm saying simply don't use C-style null terminated strings until you actually go to call a C ABI interface where it is necessary.

    The argument against this is that you might call something that already does this. Yes, sure, that IS true, but what this betrays is the fact that you have to deal with that regardless of whether or not you add additional error-prone C string manipulation code on top of having to worry about memory ownership, mutation, etc. when passing blobs of memory to "untrusted" APIs.

    It's not about passing the buck. Passing a blob of memory to an API that might do horrible things not defined by an API contract is not safe if you do strcat to construct the string or you clone it out of an std::string or you marshal it from Go or Rust. It's about not creating a bigger mess than you already have.

    Okay fine, but what if someone hates C++ and Rust and Go and Zig? No problem. There are a slew of options for C that can all handle safer, less error-prone string manipulation, including interoperability with null-terminated C strings. Like this one used in Redis:

    https://github.com/antirez/sds

    And on top of everything else, it's quite ergonomic, so it seems silly to not consider it.

    This entire line of thinking deeply reminds me of Technology Connection's video The LED Traffic Light and the Danger of "But Sometimes!".

    https://youtube.com/watch?v=GiYO1TObNz8

    I think hypothetically you can construct some scenarios where not using C strings for string manipulation requires more care, but justifying error prone C string manipulation with "well, I might call something that might do something unreasonable" as if that isn't still your problem regardless of how you get there makes zero sense to me.

    And besides, these hypothetical incorrect APIs would crash horrifically on the DS9K anyways.

  • Safest way to copy a string?
    3 projects | /r/C_Programming | 6 May 2023
    Even better, use a string handling library. Personally I am a big fan of (sds)[https://github.com/antirez/sds] from the Redis creator. It's not even a dependancy you can just copy the .c and .h to your project.
  • New C features in GCC 13
    3 projects | /r/C_Programming | 4 May 2023
    One nice application is length-prefixed string literals to complement dynamic string libraries:
  • Strlcpy and Strlcat – Consistent, Safe, String Copy and Concatenation (1999) [pdf]
    1 project | news.ycombinator.com | 25 Apr 2023
    The better answer would be to add data types like SDS[0] to the standard library, and use them as ADTs (Abstract Data Types) [1].

    Unfortunely WG14 has proven in 30 years of existence, that it isn't something that they care to fix, and while 3rd party solutions exist, without vocabulary types on the stardard library adoption will never take off.

    [0] - https://github.com/antirez/sds

    [1] - https://en.wikipedia.org/wiki/Abstract_data_type

  • C Strings and my slow descent to madness
    3 projects | news.ycombinator.com | 6 Apr 2023
    With the woes of string.h being known, why not just use an alternative like https://github.com/antirez/sds ?

    I’ve also been having a blast with C because writing C feels like being a god! But the biggest thing that I like about C is that the world is sort of written on it!

    Just yesterday I needed to parse a JSON… found a bunch of libraries that do that and just picked one that I liked the API.

  • How can i know for sure that i am allocating enough memory?
    1 project | /r/C_Programming | 15 Mar 2023
    Please note that the discussion started with requirement for no dynamic allocation in critical code what virtually eliminates std::string. I agree that std::string code tends to be simpler but the main reason is that the standard C library sucks on strings. There are better alternatives like sds but they are ... not standard.
  • str_header.h - A single header C string library
    1 project | /r/C_Programming | 28 Jan 2023
    Another day, another post about a writing a bespoke string lib instead of using SDS
  • C_dictionary: A simple dynamically typed and sized hashmap in C - feedback welcome
    10 projects | /r/C_Programming | 23 Jan 2023
    d) everything being a macro seems overkill for me (and possibly dangerous, see b)). Maybe implement more as static inline functions, see the sds header: https://github.com/antirez/sds/blob/master/sds.h (which does a similar thing with the header struct).
  • Updated book to learn C
    2 projects | /r/C_Programming | 15 Jan 2023
    For example, you can use the C language with sds strings (see https://github.com/antirez/sds) if you want to have an easier time with string formatting and don't want to worry about using the famously unsafe string.h functions correctly. You'll still program in ISO C, but just not in the standard library. The same applies to pretty much all parts of the standard library, the only part unsurpassed is pretty much just printf and the math headers (math.h, fenv.h, tgmath.h, complex.h) imo, and the occasional call to exit. A good place to look for libraries if you want to go that route is the awesome-c collection: https://github.com/oz123/awesome-c
  • Convenient Containers: A usability-oriented generic container library
    4 projects | /r/C_Programming | 26 Dec 2022
    One way around this problem is to declare the container as a pointer to the element type and then store the container’s metadata, alongside its elements, in the heap block to which the pointer points. This approach is already used for dynamic arrays in several container libraries, most notably stb_ds and sds. They place the metadata before the elements and provide the user with a pointer to the elements themselves (this has the nice effect that users can use the [] operator to access elements).

What are some alternatives?

When comparing squashfs-tools-ng and SDS you can also consider the following projects:

squashfs-tools - tools to create and extract Squashfs filesystems

Better String - The Better String Library

7-Zip-zstd - 7-Zip with support for Brotli, Fast-LZMA2, Lizard, LZ4, LZ5 and Zstandard

Experimental Boost.MSM-lite - Boost.SML (formerly called Boost.MSM-lite)

dracut - dracut the event driven initramfs infrastructure

libcpuid - a small C library for x86 CPU detection and feature extraction

zfs - OpenZFS on Linux and FreeBSD

ZXing - ZXing ("Zebra Crossing") barcode scanning library for Java, Android

genext2fs - genext2fs - ext2 filesystem generator for embedded systems

safestringlib

zstd - Zstandard - Fast real-time compression algorithm

stb - stb single-file public domain libraries for C/C++