/* String -> String Map data structure optimized for size. * This file implements a data structure mapping strings to other strings * implementing an O(n) lookup data structure designed to be very memory * efficient. * * The Hash type uses this data structure for hashes composed of a small * number of elements, to switch to a hash table once a given number of * elements is reached. * * Given that many times Hashes are used to represent objects composed * of few fields, this is a very big win in terms of used memory. * * -------------------------------------------------------------------------- * * Copyright (c) 2009-2010, Redis Ltd. * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions are met: * * * Redistributions of source code must retain the above copyright notice, * this list of conditions and the following disclaimer. * * Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * * Neither the name of Redis nor the names of its contributors may be used * to endorse or promote products derived from this software without * specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE * POSSIBILITY OF SUCH DAMAGE. */ /* Memory layout of a zipmap, for the map "foo" => "bar", "hello" => "world": * * "foo""bar""hello""world" * * is 1 byte length that holds the current size of the zipmap. * When the zipmap length is greater than or equal to 254, this value * is not used and the zipmap needs to be traversed to find out the length. * * is the length of the following string (key or value). * lengths are encoded in a single value or in a 5 bytes value. * If the first byte value (as an unsigned 8 bit value) is between 0 and * 253, it's a single-byte length. If it is 254 then a four bytes unsigned * integer follows (in the host byte ordering). A value of 255 is used to * signal the end of the hash. * * is the number of free unused bytes after the string, resulting * from modification of values associated to a key. For instance if "foo" * is set to "bar", and later "foo" will be set to "hi", it will have a * free byte to use if the value will enlarge again later, or even in * order to add a key/value pair if it fits. * * is always an unsigned 8 bit number, because if after an * update operation there are more than a few free bytes, the zipmap will be * reallocated to make sure it is as small as possible. * * The most compact representation of the above two elements hash is actually: * * "\x02\x03foo\x03\x00bar\x05hello\x05\x00world\xff" * * Note that because keys and values are prefixed length "objects", * the lookup will take O(N) where N is the number of elements * in the zipmap and *not* the number of bytes needed to represent the zipmap. * This lowers the constant times considerably. */ #include #include #include "zmalloc.h" #include "endianconv.h" #define ZIPMAP_BIGLEN 254 #define ZIPMAP_END 255 /* The following macro returns the number of bytes needed to encode the length * for the integer value _l, that is, 1 byte for lengths < ZIPMAP_BIGLEN and * 5 bytes for all the other lengths. */ #define ZIPMAP_LEN_BYTES(_l) (((_l) < ZIPMAP_BIGLEN) ? 1 : sizeof(unsigned int) + 1) /* Decode the encoded length pointed by 'p' */ static unsigned int zipmapDecodeLength(unsigned char *p) { unsigned int len = *p; if (len < ZIPMAP_BIGLEN) return len; memcpy(&len, p + 1, sizeof(unsigned int)); memrev32ifbe(&len); return len; } /* Encode the length 'l' writing it in 'p'. If p is NULL it just returns * the amount of bytes required to encode such a length. */ static unsigned int zipmapEncodeLength(unsigned char *p, unsigned int len) { if (p == NULL) { return ZIPMAP_LEN_BYTES(len); } else { if (len < ZIPMAP_BIGLEN) { p[0] = len; return 1; } else { p[0] = ZIPMAP_BIGLEN; memcpy(p + 1, &len, sizeof(len)); memrev32ifbe(p + 1); return 1 + sizeof(len); } } } static unsigned int zipmapGetEncodedLengthSize(unsigned char *p) { return (*p < ZIPMAP_BIGLEN) ? 1 : 5; } /* Return the total amount used by a key (encoded length + payload) */ static unsigned int zipmapRawKeyLength(unsigned char *p) { unsigned int l = zipmapDecodeLength(p); return zipmapEncodeLength(NULL, l) + l; } /* Return the total amount used by a value * (encoded length + single byte free count + payload) */ static unsigned int zipmapRawValueLength(unsigned char *p) { unsigned int l = zipmapDecodeLength(p); unsigned int used; used = zipmapEncodeLength(NULL, l); used += p[used] + 1 + l; return used; } /* Call before iterating through elements via zipmapNext() */ unsigned char *zipmapRewind(unsigned char *zm) { return zm + 1; } /* This function is used to iterate through all the zipmap elements. * In the first call the first argument is the pointer to the zipmap + 1. * In the next calls what zipmapNext returns is used as first argument. * Example: * * unsigned char *i = zipmapRewind(my_zipmap); * while((i = zipmapNext(i,&key,&klen,&value,&vlen)) != NULL) { * printf("%d bytes key at $p\n", klen, key); * printf("%d bytes value at $p\n", vlen, value); * } */ unsigned char * zipmapNext(unsigned char *zm, unsigned char **key, unsigned int *klen, unsigned char **value, unsigned int *vlen) { if (zm[0] == ZIPMAP_END) return NULL; if (key) { *key = zm; *klen = zipmapDecodeLength(zm); *key += ZIPMAP_LEN_BYTES(*klen); } zm += zipmapRawKeyLength(zm); if (value) { *value = zm + 1; *vlen = zipmapDecodeLength(zm); *value += ZIPMAP_LEN_BYTES(*vlen); } zm += zipmapRawValueLength(zm); return zm; } /* Validate the integrity of the data structure. * when `deep` is 0, only the integrity of the header is validated. * when `deep` is 1, we scan all the entries one by one. */ int zipmapValidateIntegrity(unsigned char *zm, size_t size, int deep) { #define OUT_OF_RANGE(p) ((p) < zm + 2 || (p) > zm + size - 1) unsigned int l, s, e; /* check that we can actually read the header (or ZIPMAP_END). */ if (size < 2) return 0; /* the last byte must be the terminator. */ if (zm[size - 1] != ZIPMAP_END) return 0; if (!deep) return 1; unsigned int count = 0; unsigned char *p = zm + 1; /* skip the count */ while (*p != ZIPMAP_END) { /* read the field name length encoding type */ s = zipmapGetEncodedLengthSize(p); /* make sure the entry length doesn't reach outside the edge of the zipmap */ if (OUT_OF_RANGE(p + s)) return 0; /* read the field name length */ l = zipmapDecodeLength(p); p += s; /* skip the encoded field size */ p += l; /* skip the field */ /* make sure the entry doesn't reach outside the edge of the zipmap */ if (OUT_OF_RANGE(p)) return 0; /* read the value length encoding type */ s = zipmapGetEncodedLengthSize(p); /* make sure the entry length doesn't reach outside the edge of the zipmap */ if (OUT_OF_RANGE(p + s)) return 0; /* read the value length */ l = zipmapDecodeLength(p); p += s; /* skip the encoded value size*/ e = *p++; /* skip the encoded free space (always encoded in one byte) */ p += l + e; /* skip the value and free space */ count++; /* make sure the entry doesn't reach outside the edge of the zipmap */ if (OUT_OF_RANGE(p)) return 0; } /* check that the zipmap is not empty. */ if (count == 0) return 0; /* check that the count in the header is correct */ if (zm[0] != ZIPMAP_BIGLEN && zm[0] != count) return 0; return 1; #undef OUT_OF_RANGE }