2009-03-22 10:30:00 +01:00
|
|
|
/* Hash Tables Implementation.
|
|
|
|
*
|
2012-10-02 21:58:36 -07:00
|
|
|
* This file implements in-memory hash tables with insert/del/replace/find/
|
|
|
|
* get-random-element operations. Hash tables will auto-resize if needed
|
2009-03-22 10:30:00 +01:00
|
|
|
* tables of power of two in size are used, collisions are handled by
|
|
|
|
* chaining. See the source code for more information... :)
|
|
|
|
*
|
2012-10-02 21:58:36 -07:00
|
|
|
* Copyright (c) 2006-2012, Salvatore Sanfilippo <antirez at gmail dot com>
|
2009-03-22 10:30:00 +01:00
|
|
|
* All rights reserved.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions are met:
|
|
|
|
*
|
|
|
|
* * Redistributions of source code must retain the above copyright notice,
|
|
|
|
* this list of conditions and the following disclaimer.
|
|
|
|
* * Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
|
|
|
* * Neither the name of Redis nor the names of its contributors may be used
|
|
|
|
* to endorse or promote products derived from this software without
|
|
|
|
* specific prior written permission.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
|
|
|
|
* AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
|
|
|
|
* LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
|
|
|
|
* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
|
|
|
|
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
|
|
|
* INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
|
|
|
|
* CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
|
|
|
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
|
|
|
|
* POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#ifndef __DICT_H
|
|
|
|
#define __DICT_H
|
|
|
|
|
2020-12-23 05:52:07 -08:00
|
|
|
#include "mt19937-64.h"
|
|
|
|
#include <limits.h>
|
|
|
|
#include <stdint.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
|
2009-03-22 10:30:00 +01:00
|
|
|
#define DICT_OK 0
|
|
|
|
#define DICT_ERR 1
|
|
|
|
|
|
|
|
typedef struct dictEntry {
|
|
|
|
void *key;
|
2011-11-02 15:28:45 +01:00
|
|
|
union {
|
|
|
|
void *val;
|
|
|
|
uint64_t u64;
|
2011-11-08 23:59:46 +01:00
|
|
|
int64_t s64;
|
2014-06-06 15:32:21 +02:00
|
|
|
double d;
|
2011-11-02 15:28:45 +01:00
|
|
|
} v;
|
2021-08-31 08:25:36 +02:00
|
|
|
struct dictEntry *next; /* Next entry in the same hash bucket. */
|
|
|
|
void *metadata[]; /* An arbitrary number of bytes (starting at a
|
|
|
|
* pointer-aligned address) of size as returned
|
|
|
|
* by dictType's dictEntryMetadataBytes(). */
|
2009-03-22 10:30:00 +01:00
|
|
|
} dictEntry;
|
|
|
|
|
2021-08-05 08:25:58 +03:00
|
|
|
typedef struct dict dict;
|
|
|
|
|
2009-03-22 10:30:00 +01:00
|
|
|
typedef struct dictType {
|
2017-02-20 16:09:54 +01:00
|
|
|
uint64_t (*hashFunction)(const void *key);
|
2021-08-05 08:25:58 +03:00
|
|
|
void *(*keyDup)(dict *d, const void *key);
|
|
|
|
void *(*valDup)(dict *d, const void *obj);
|
|
|
|
int (*keyCompare)(dict *d, const void *key1, const void *key2);
|
|
|
|
void (*keyDestructor)(dict *d, void *key);
|
|
|
|
void (*valDestructor)(dict *d, void *obj);
|
Limit the main db and expires dictionaries to expand (#7954)
As we know, redis may reject user's requests or evict some keys if
used memory is over maxmemory. Dictionaries expanding may make
things worse, some big dictionaries, such as main db and expires dict,
may eat huge memory at once for allocating a new big hash table and be
far more than maxmemory after expanding.
There are related issues: #4213 #4583
More details, when expand dict in redis, we will allocate a new big
ht[1] that generally is double of ht[0], The size of ht[1] will be
very big if ht[0] already is big. For db dict, if we have more than
64 million keys, we need to cost 1GB for ht[1] when dict expands.
If the sum of used memory and new hash table of dict needed exceeds
maxmemory, we shouldn't allow the dict to expand. Because, if we
enable keys eviction, we still couldn't add much more keys after
eviction and rehashing, what's worse, redis will keep less keys when
redis only remains a little memory for storing new hash table instead
of users' data. Moreover users can't write data in redis if disable
keys eviction.
What this commit changed ?
Add a new member function expandAllowed for dict type, it provide a way
for caller to allow expand or not. We expose two parameters for this
function: more memory needed for expanding and dict current load factor,
users can implement a function to make a decision by them.
For main db dict and expires dict type, these dictionaries may be very
big and cost huge memory for expanding, so we implement a judgement
function: we can stop dict to expand provisionally if used memory will
be over maxmemory after dict expands, but to guarantee the performance
of redis, we still allow dict to expand if dict load factor exceeds the
safe load factor.
Add test cases to verify we don't allow main db to expand when left
memory is not enough, so that avoid keys eviction.
Other changes:
For new hash table size when expand. Before this commit, the size is
that double used of dict and later _dictNextPower. Actually we aim to
control a dict load factor between 0.5 and 1.0. Now we replace *2 with
+1, since the first check is that used >= size, the outcome of before
will usually be the same as _dictNextPower(used+1). The only case where
it'll differ is when dict_can_resize is false during fork, so that later
the _dictNextPower(used*2) will cause the dict to jump to *4 (i.e.
_dictNextPower(1025*2) will return 4096).
Fix rehash test cases due to changing algorithm of new hash table size
when expand.
2020-12-06 17:53:04 +08:00
|
|
|
int (*expandAllowed)(size_t moreMem, double usedRatio);
|
2021-08-31 08:25:36 +02:00
|
|
|
/* Allow a dictEntry to carry extra caller-defined metadata. The
|
|
|
|
* extra memory is initialized to 0 when a dictEntry is allocated. */
|
|
|
|
size_t (*dictEntryMetadataBytes)(dict *d);
|
2009-03-22 10:30:00 +01:00
|
|
|
} dictType;
|
|
|
|
|
2021-08-05 08:25:58 +03:00
|
|
|
#define DICTHT_SIZE(exp) ((exp) == -1 ? 0 : (unsigned long)1<<(exp))
|
|
|
|
#define DICTHT_SIZE_MASK(exp) ((exp) == -1 ? 0 : (DICTHT_SIZE(exp))-1)
|
2010-04-15 11:59:13 +02:00
|
|
|
|
2021-08-05 08:25:58 +03:00
|
|
|
struct dict {
|
2010-04-15 11:59:13 +02:00
|
|
|
dictType *type;
|
2021-08-05 08:25:58 +03:00
|
|
|
|
|
|
|
dictEntry **ht_table[2];
|
|
|
|
unsigned long ht_used[2];
|
|
|
|
|
2014-08-26 10:18:56 +02:00
|
|
|
long rehashidx; /* rehashing not in progress if rehashidx == -1 */
|
2021-08-05 08:25:58 +03:00
|
|
|
|
|
|
|
/* Keep small vars at end for optimal (minimal) struct padding */
|
2021-02-20 02:56:30 -08:00
|
|
|
int16_t pauserehash; /* If >0 rehashing is paused (<0 indicates coding error) */
|
2021-08-15 21:37:44 +03:00
|
|
|
signed char ht_size_exp[2]; /* exponent of size. (size = 1<<exp) */
|
2021-08-05 08:25:58 +03:00
|
|
|
};
|
2009-03-22 10:30:00 +01:00
|
|
|
|
2012-10-02 21:58:36 -07:00
|
|
|
/* If safe is set to 1 this is a safe iterator, that means, you can call
|
2011-05-10 10:15:50 +02:00
|
|
|
* dictAdd, dictFind, and other functions against the dictionary even while
|
|
|
|
* iterating. Otherwise it is a non safe iterator, and only dictNext()
|
|
|
|
* should be called while iterating. */
|
2009-03-22 10:30:00 +01:00
|
|
|
typedef struct dictIterator {
|
2010-04-15 11:59:13 +02:00
|
|
|
dict *d;
|
2014-08-26 10:18:56 +02:00
|
|
|
long index;
|
|
|
|
int table, safe;
|
2009-03-22 10:30:00 +01:00
|
|
|
dictEntry *entry, *nextEntry;
|
2014-08-26 10:18:56 +02:00
|
|
|
/* unsafe iterator fingerprint for misuse detection. */
|
2021-11-11 14:51:33 +03:00
|
|
|
unsigned long long fingerprint;
|
2009-03-22 10:30:00 +01:00
|
|
|
} dictIterator;
|
|
|
|
|
2012-07-09 01:00:26 -07:00
|
|
|
typedef void (dictScanFunction)(void *privdata, const dictEntry *de);
|
2021-08-31 08:25:36 +02:00
|
|
|
typedef void (dictScanBucketFunction)(dict *d, dictEntry **bucketref);
|
2012-07-09 01:00:26 -07:00
|
|
|
|
2009-03-22 10:30:00 +01:00
|
|
|
/* This is the initial size of every hash table */
|
2021-08-05 08:25:58 +03:00
|
|
|
#define DICT_HT_INITIAL_EXP 2
|
|
|
|
#define DICT_HT_INITIAL_SIZE (1<<(DICT_HT_INITIAL_EXP))
|
2009-03-22 10:30:00 +01:00
|
|
|
|
|
|
|
/* ------------------------------- Macros ------------------------------------*/
|
2022-08-03 19:38:08 +03:00
|
|
|
#define dictFreeVal(d, entry) do { \
|
|
|
|
if ((d)->type->valDestructor) \
|
|
|
|
(d)->type->valDestructor((d), (entry)->v.val); \
|
|
|
|
} while(0)
|
2009-03-22 10:30:00 +01:00
|
|
|
|
2011-11-08 17:07:55 +01:00
|
|
|
#define dictSetVal(d, entry, _val_) do { \
|
2010-04-15 11:59:13 +02:00
|
|
|
if ((d)->type->valDup) \
|
2021-08-05 08:25:58 +03:00
|
|
|
(entry)->v.val = (d)->type->valDup((d), _val_); \
|
2009-03-22 10:30:00 +01:00
|
|
|
else \
|
2016-05-09 18:01:09 +03:00
|
|
|
(entry)->v.val = (_val_); \
|
2009-03-22 10:30:00 +01:00
|
|
|
} while(0)
|
|
|
|
|
2011-11-09 13:39:59 +01:00
|
|
|
#define dictSetSignedIntegerVal(entry, _val_) \
|
2016-05-09 18:01:09 +03:00
|
|
|
do { (entry)->v.s64 = _val_; } while(0)
|
2011-11-08 19:41:29 +01:00
|
|
|
|
2011-11-09 13:39:59 +01:00
|
|
|
#define dictSetUnsignedIntegerVal(entry, _val_) \
|
2016-05-09 18:01:09 +03:00
|
|
|
do { (entry)->v.u64 = _val_; } while(0)
|
2011-11-08 19:41:29 +01:00
|
|
|
|
2014-06-06 15:32:21 +02:00
|
|
|
#define dictSetDoubleVal(entry, _val_) \
|
2016-05-09 18:01:09 +03:00
|
|
|
do { (entry)->v.d = _val_; } while(0)
|
2014-06-06 15:32:21 +02:00
|
|
|
|
reprocess command when client is unblocked on keys (#11012)
*TL;DR*
---------------------------------------
Following the discussion over the issue [#7551](https://github.com/redis/redis/issues/7551)
We decided to refactor the client blocking code to eliminate some of the code duplications
and to rebuild the infrastructure better for future key blocking cases.
*In this PR*
---------------------------------------
1. reprocess the command once a client becomes unblocked on key (instead of running
custom code for the unblocked path that's different than the one that would have run if
blocking wasn't needed)
2. eliminate some (now) irrelevant code for handling unblocking lists/zsets/streams etc...
3. modify some tests to intercept the error in cases of error on reprocess after unblock (see
details in the notes section below)
4. replace '$' on the client argv with current stream id. Since once we reprocess the stream
XREAD we need to read from the last msg and not wait for new msg in order to prevent
endless block loop.
5. Added statistics to the info "Clients" section to report the:
* `total_blocking_keys` - number of blocking keys
* `total_blocking_keys_on_nokey` - number of blocking keys which have at least 1 client
which would like
to be unblocked on when the key is deleted.
6. Avoid expiring unblocked key during unblock. Previously we used to lookup the unblocked key
which might have been expired during the lookup. Now we lookup the key using NOTOUCH and
NOEXPIRE to avoid deleting it at this point, so propagating commands in blocked.c is no longer needed.
7. deprecated command flags. We decided to remove the CMD_CALL_STATS and CMD_CALL_SLOWLOG
and make an explicit verification in the call() function in order to decide if stats update should take place.
This should simplify the logic and also mitigate existing issues: for example module calls which are
triggered as part of AOF loading might still report stats even though they are called during AOF loading.
*Behavior changes*
---------------------------------------------------
1. As this implementation prevents writing dedicated code handling unblocked streams/lists/zsets,
since we now re-process the command once the client is unblocked some errors will be reported differently.
The old implementation used to issue
``UNBLOCKED the stream key no longer exists``
in the following cases:
- The stream key has been deleted (ie. calling DEL)
- The stream and group existed but the key type was changed by overriding it (ie. with set command)
- The key not longer exists after we swapdb with a db which does not contains this key
- After swapdb when the new db has this key but with different type.
In the new implementation the reported errors will be the same as if the command was processed after effect:
**NOGROUP** - in case key no longer exists, or **WRONGTYPE** in case the key was overridden with a different type.
2. Reprocessing the command means that some checks will be reevaluated once the
client is unblocked.
For example, ACL rules might change since the command originally was executed and
will fail once the client is unblocked.
Another example is OOM condition checks which might enable the command to run and
block but fail the command reprocess once the client is unblocked.
3. One of the changes in this PR is that no command stats are being updated once the
command is blocked (all stats will be updated once the client is unblocked). This implies
that when we have many clients blocked, users will no longer be able to get that information
from the command stats. However the information can still be gathered from the client list.
**Client blocking**
---------------------------------------------------
the blocking on key will still be triggered the same way as it is done today.
in order to block the current client on list of keys, the call to
blockForKeys will still need to be made which will perform the same as it is today:
* add the client to the list of blocked clients on each key
* keep the key with a matching list node (position in the global blocking clients list for that key)
in the client private blocking key dict.
* flag the client with CLIENT_BLOCKED
* update blocking statistics
* register the client on the timeout table
**Key Unblock**
---------------------------------------------------
Unblocking a specific key will be triggered (same as today) by calling signalKeyAsReady.
the implementation in that part will stay the same as today - adding the key to the global readyList.
The reason to maintain the readyList (as apposed to iterating over all clients blocked on the specific key)
is in order to keep the signal operation as short as possible, since it is called during the command processing.
The main change is that instead of going through a dedicated code path that operates the blocked command
we will just call processPendingCommandsAndResetClient.
**ClientUnblock (keys)**
---------------------------------------------------
1. Unblocking clients on keys will be triggered after command is
processed and during the beforeSleep
8. the general schema is:
9. For each key *k* in the readyList:
```
For each client *c* which is blocked on *k*:
in case either:
1. *k* exists AND the *k* type matches the current client blocking type
OR
2. *k* exists and *c* is blocked on module command
OR
3. *k* does not exists and *c* was blocked with the flag
unblock_on_deleted_key
do:
1. remove the client from the list of clients blocked on this key
2. remove the blocking list node from the client blocking key dict
3. remove the client from the timeout list
10. queue the client on the unblocked_clients list
11. *NEW*: call processCommandAndResetClient(c);
```
*NOTE:* for module blocked clients we will still call the moduleUnblockClientByHandle
which will queue the client for processing in moduleUnblockedClients list.
**Process Unblocked clients**
---------------------------------------------------
The process of all unblocked clients is done in the beforeSleep and no change is planned
in that part.
The general schema will be:
For each client *c* in server.unblocked_clients:
* remove client from the server.unblocked_clients
* set back the client readHandler
* continue processing the pending command and input buffer.
*Some notes regarding the new implementation*
---------------------------------------------------
1. Although it was proposed, it is currently difficult to remove the
read handler from the client while it is blocked.
The reason is that a blocked client should be unblocked when it is
disconnected, or we might consume data into void.
2. While this PR mainly keep the current blocking logic as-is, there
might be some future additions to the infrastructure that we would
like to have:
- allow non-preemptive blocking of client - sometimes we can think
that a new kind of blocking can be expected to not be preempt. for
example lets imagine we hold some keys on disk and when a command
needs to process them it will block until the keys are uploaded.
in this case we will want the client to not disconnect or be
unblocked until the process is completed (remove the client read
handler, prevent client timeout, disable unblock via debug command etc...).
- allow generic blocking based on command declared keys - we might
want to add a hook before command processing to check if any of the
declared keys require the command to block. this way it would be
easier to add new kinds of key-based blocking mechanisms.
Co-authored-by: Oran Agra <oran@redislabs.com>
Signed-off-by: Ran Shidlansik <ranshid@amazon.com>
2023-01-01 23:35:42 +02:00
|
|
|
#define dictIncrSignedIntegerVal(entry, _val_) \
|
|
|
|
((entry)->v.s64 += _val_)
|
|
|
|
|
|
|
|
#define dictIncrUnsignedIntegerVal(entry, _val_) \
|
|
|
|
((entry)->v.u64 += _val_)
|
|
|
|
|
|
|
|
#define dictIncrDoubleVal(entry, _val_) \
|
|
|
|
((entry)->v.d += _val_)
|
|
|
|
|
2011-11-08 17:07:55 +01:00
|
|
|
#define dictFreeKey(d, entry) \
|
2010-04-15 11:59:13 +02:00
|
|
|
if ((d)->type->keyDestructor) \
|
2021-08-05 08:25:58 +03:00
|
|
|
(d)->type->keyDestructor((d), (entry)->key)
|
2009-03-22 10:30:00 +01:00
|
|
|
|
2011-11-08 17:07:55 +01:00
|
|
|
#define dictSetKey(d, entry, _key_) do { \
|
2010-04-15 11:59:13 +02:00
|
|
|
if ((d)->type->keyDup) \
|
2021-08-05 08:25:58 +03:00
|
|
|
(entry)->key = (d)->type->keyDup((d), _key_); \
|
2009-03-22 10:30:00 +01:00
|
|
|
else \
|
2016-05-09 18:01:09 +03:00
|
|
|
(entry)->key = (_key_); \
|
2009-03-22 10:30:00 +01:00
|
|
|
} while(0)
|
|
|
|
|
2011-11-08 17:07:55 +01:00
|
|
|
#define dictCompareKeys(d, key1, key2) \
|
2010-04-15 11:59:13 +02:00
|
|
|
(((d)->type->keyCompare) ? \
|
2021-08-05 08:25:58 +03:00
|
|
|
(d)->type->keyCompare((d), key1, key2) : \
|
2009-03-22 10:30:00 +01:00
|
|
|
(key1) == (key2))
|
|
|
|
|
2021-08-31 08:25:36 +02:00
|
|
|
#define dictMetadata(entry) (&(entry)->metadata)
|
|
|
|
#define dictMetadataSize(d) ((d)->type->dictEntryMetadataBytes \
|
|
|
|
? (d)->type->dictEntryMetadataBytes(d) : 0)
|
|
|
|
|
2022-08-03 19:38:08 +03:00
|
|
|
#define dictHashKey(d, key) ((d)->type->hashFunction(key))
|
2011-11-08 17:07:55 +01:00
|
|
|
#define dictGetKey(he) ((he)->key)
|
|
|
|
#define dictGetVal(he) ((he)->v.val)
|
2011-11-09 13:39:59 +01:00
|
|
|
#define dictGetSignedIntegerVal(he) ((he)->v.s64)
|
|
|
|
#define dictGetUnsignedIntegerVal(he) ((he)->v.u64)
|
2014-06-06 15:32:21 +02:00
|
|
|
#define dictGetDoubleVal(he) ((he)->v.d)
|
2021-08-05 08:25:58 +03:00
|
|
|
#define dictSlots(d) (DICTHT_SIZE((d)->ht_size_exp[0])+DICTHT_SIZE((d)->ht_size_exp[1]))
|
|
|
|
#define dictSize(d) ((d)->ht_used[0]+(d)->ht_used[1])
|
2012-05-18 20:34:10 +08:00
|
|
|
#define dictIsRehashing(d) ((d)->rehashidx != -1)
|
2022-08-03 19:38:08 +03:00
|
|
|
#define dictPauseRehashing(d) ((d)->pauserehash++)
|
|
|
|
#define dictResumeRehashing(d) ((d)->pauserehash--)
|
2009-03-22 10:30:00 +01:00
|
|
|
|
2020-12-23 05:52:07 -08:00
|
|
|
/* If our unsigned long type can store a 64 bit number, use a 64 bit PRNG. */
|
|
|
|
#if ULONG_MAX >= 0xffffffffffffffff
|
|
|
|
#define randomULong() ((unsigned long) genrand64_int64())
|
|
|
|
#else
|
|
|
|
#define randomULong() random()
|
|
|
|
#endif
|
|
|
|
|
2009-03-22 10:30:00 +01:00
|
|
|
/* API */
|
2021-08-05 08:25:58 +03:00
|
|
|
dict *dictCreate(dictType *type);
|
2010-04-15 18:07:57 +02:00
|
|
|
int dictExpand(dict *d, unsigned long size);
|
2020-11-22 21:22:49 +02:00
|
|
|
int dictTryExpand(dict *d, unsigned long size);
|
2010-04-15 18:07:57 +02:00
|
|
|
int dictAdd(dict *d, void *key, void *val);
|
2016-05-09 18:01:09 +03:00
|
|
|
dictEntry *dictAddRaw(dict *d, void *key, dictEntry **existing);
|
2016-09-14 16:43:38 +02:00
|
|
|
dictEntry *dictAddOrFind(dict *d, void *key);
|
2010-04-15 18:07:57 +02:00
|
|
|
int dictReplace(dict *d, void *key, void *val);
|
|
|
|
int dictDelete(dict *d, const void *key);
|
2021-08-05 08:25:58 +03:00
|
|
|
dictEntry *dictUnlink(dict *d, const void *key);
|
2016-05-09 18:01:09 +03:00
|
|
|
void dictFreeUnlinkedEntry(dict *d, dictEntry *he);
|
2022-11-30 17:56:36 +08:00
|
|
|
dictEntry *dictTwoPhaseUnlinkFind(dict *d, const void *key, dictEntry ***plink, int *table_index);
|
|
|
|
void dictTwoPhaseUnlinkFree(dict *d, dictEntry *he, dictEntry **plink, int table_index);
|
2010-04-15 18:07:57 +02:00
|
|
|
void dictRelease(dict *d);
|
|
|
|
dictEntry * dictFind(dict *d, const void *key);
|
2010-04-16 10:04:51 +02:00
|
|
|
void *dictFetchValue(dict *d, const void *key);
|
2010-04-15 18:07:57 +02:00
|
|
|
int dictResize(dict *d);
|
|
|
|
dictIterator *dictGetIterator(dict *d);
|
2011-05-10 10:15:50 +02:00
|
|
|
dictIterator *dictGetSafeIterator(dict *d);
|
2022-09-08 04:57:43 +03:00
|
|
|
void dictInitIterator(dictIterator *iter, dict *d);
|
|
|
|
void dictInitSafeIterator(dictIterator *iter, dict *d);
|
|
|
|
void dictResetIterator(dictIterator *iter);
|
2009-03-22 10:30:00 +01:00
|
|
|
dictEntry *dictNext(dictIterator *iter);
|
|
|
|
void dictReleaseIterator(dictIterator *iter);
|
2010-04-15 18:07:57 +02:00
|
|
|
dictEntry *dictGetRandomKey(dict *d);
|
2019-02-18 18:27:18 +01:00
|
|
|
dictEntry *dictGetFairRandomKey(dict *d);
|
2015-02-06 15:48:42 +01:00
|
|
|
unsigned int dictGetSomeKeys(dict *d, dictEntry **des, unsigned int count);
|
2015-07-14 17:15:37 +02:00
|
|
|
void dictGetStats(char *buf, size_t bufsize, dict *d);
|
2021-12-13 20:16:25 +01:00
|
|
|
uint64_t dictGenHashFunction(const void *key, size_t len);
|
|
|
|
uint64_t dictGenCaseHashFunction(const unsigned char *buf, size_t len);
|
2021-08-05 08:25:58 +03:00
|
|
|
void dictEmpty(dict *d, void(callback)(dict*));
|
2010-04-08 20:08:51 +02:00
|
|
|
void dictEnableResize(void);
|
|
|
|
void dictDisableResize(void);
|
2010-04-15 11:59:13 +02:00
|
|
|
int dictRehash(dict *d, int n);
|
2010-04-15 18:07:57 +02:00
|
|
|
int dictRehashMilliseconds(dict *d, int ms);
|
2017-02-20 16:09:54 +01:00
|
|
|
void dictSetHashFunctionSeed(uint8_t *seed);
|
|
|
|
uint8_t *dictGetHashFunctionSeed(void);
|
2016-12-30 03:37:52 +02:00
|
|
|
unsigned long dictScan(dict *d, unsigned long v, dictScanFunction *fn, dictScanBucketFunction *bucketfn, void *privdata);
|
2017-11-30 11:34:37 +08:00
|
|
|
uint64_t dictGetHash(dict *d, const void *key);
|
|
|
|
dictEntry **dictFindEntryRefByPtrAndHash(dict *d, const void *oldptr, uint64_t hash);
|
2009-03-22 10:30:00 +01:00
|
|
|
|
2021-03-10 15:13:11 +08:00
|
|
|
#ifdef REDIS_TEST
|
2021-11-16 14:55:10 +08:00
|
|
|
int dictTest(int argc, char *argv[], int flags);
|
2021-03-10 15:13:11 +08:00
|
|
|
#endif
|
|
|
|
|
2009-03-22 10:30:00 +01:00
|
|
|
#endif /* __DICT_H */
|