
Deletes zipmapSet, zipmapGet, etc. Only keep iterator and validate integrity, what we use when loading an old RDB file. Adjust unit tests to not use zipmapSet, etc. Solves a build failure where when compiling with fortify source. --------- Signed-off-by: Viktor Söderqvist <viktor.soderqvist@est.tech>
230 lines
8.7 KiB
C
230 lines
8.7 KiB
C
/* String -> String Map data structure optimized for size.
|
|
* This file implements a data structure mapping strings to other strings
|
|
* implementing an O(n) lookup data structure designed to be very memory
|
|
* efficient.
|
|
*
|
|
* The Hash type uses this data structure for hashes composed of a small
|
|
* number of elements, to switch to a hash table once a given number of
|
|
* elements is reached.
|
|
*
|
|
* Given that many times Hashes are used to represent objects composed
|
|
* of few fields, this is a very big win in terms of used memory.
|
|
*
|
|
* --------------------------------------------------------------------------
|
|
*
|
|
* Copyright (c) 2009-2010, Redis Ltd.
|
|
* All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions are met:
|
|
*
|
|
* * Redistributions of source code must retain the above copyright notice,
|
|
* this list of conditions and the following disclaimer.
|
|
* * Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
* documentation and/or other materials provided with the distribution.
|
|
* * Neither the name of Redis nor the names of its contributors may be used
|
|
* to endorse or promote products derived from this software without
|
|
* specific prior written permission.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
|
|
* AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
|
|
* LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
|
|
* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
|
|
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
|
* INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
|
|
* CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
|
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
|
|
* POSSIBILITY OF SUCH DAMAGE.
|
|
*/
|
|
|
|
/* Memory layout of a zipmap, for the map "foo" => "bar", "hello" => "world":
|
|
*
|
|
* <zmlen><len>"foo"<len><free>"bar"<len>"hello"<len><free>"world"
|
|
*
|
|
* <zmlen> is 1 byte length that holds the current size of the zipmap.
|
|
* When the zipmap length is greater than or equal to 254, this value
|
|
* is not used and the zipmap needs to be traversed to find out the length.
|
|
*
|
|
* <len> is the length of the following string (key or value).
|
|
* <len> lengths are encoded in a single value or in a 5 bytes value.
|
|
* If the first byte value (as an unsigned 8 bit value) is between 0 and
|
|
* 253, it's a single-byte length. If it is 254 then a four bytes unsigned
|
|
* integer follows (in the host byte ordering). A value of 255 is used to
|
|
* signal the end of the hash.
|
|
*
|
|
* <free> is the number of free unused bytes after the string, resulting
|
|
* from modification of values associated to a key. For instance if "foo"
|
|
* is set to "bar", and later "foo" will be set to "hi", it will have a
|
|
* free byte to use if the value will enlarge again later, or even in
|
|
* order to add a key/value pair if it fits.
|
|
*
|
|
* <free> is always an unsigned 8 bit number, because if after an
|
|
* update operation there are more than a few free bytes, the zipmap will be
|
|
* reallocated to make sure it is as small as possible.
|
|
*
|
|
* The most compact representation of the above two elements hash is actually:
|
|
*
|
|
* "\x02\x03foo\x03\x00bar\x05hello\x05\x00world\xff"
|
|
*
|
|
* Note that because keys and values are prefixed length "objects",
|
|
* the lookup will take O(N) where N is the number of elements
|
|
* in the zipmap and *not* the number of bytes needed to represent the zipmap.
|
|
* This lowers the constant times considerably.
|
|
*/
|
|
|
|
#include <stdio.h>
|
|
#include <string.h>
|
|
#include "zmalloc.h"
|
|
#include "endianconv.h"
|
|
|
|
#define ZIPMAP_BIGLEN 254
|
|
#define ZIPMAP_END 255
|
|
|
|
/* The following macro returns the number of bytes needed to encode the length
|
|
* for the integer value _l, that is, 1 byte for lengths < ZIPMAP_BIGLEN and
|
|
* 5 bytes for all the other lengths. */
|
|
#define ZIPMAP_LEN_BYTES(_l) (((_l) < ZIPMAP_BIGLEN) ? 1 : sizeof(unsigned int) + 1)
|
|
|
|
/* Decode the encoded length pointed by 'p' */
|
|
static unsigned int zipmapDecodeLength(unsigned char *p) {
|
|
unsigned int len = *p;
|
|
|
|
if (len < ZIPMAP_BIGLEN) return len;
|
|
memcpy(&len, p + 1, sizeof(unsigned int));
|
|
memrev32ifbe(&len);
|
|
return len;
|
|
}
|
|
|
|
/* Encode the length 'l' writing it in 'p'. If p is NULL it just returns
|
|
* the amount of bytes required to encode such a length. */
|
|
static unsigned int zipmapEncodeLength(unsigned char *p, unsigned int len) {
|
|
if (p == NULL) {
|
|
return ZIPMAP_LEN_BYTES(len);
|
|
} else {
|
|
if (len < ZIPMAP_BIGLEN) {
|
|
p[0] = len;
|
|
return 1;
|
|
} else {
|
|
p[0] = ZIPMAP_BIGLEN;
|
|
memcpy(p + 1, &len, sizeof(len));
|
|
memrev32ifbe(p + 1);
|
|
return 1 + sizeof(len);
|
|
}
|
|
}
|
|
}
|
|
|
|
static unsigned int zipmapGetEncodedLengthSize(unsigned char *p) {
|
|
return (*p < ZIPMAP_BIGLEN) ? 1 : 5;
|
|
}
|
|
|
|
/* Return the total amount used by a key (encoded length + payload) */
|
|
static unsigned int zipmapRawKeyLength(unsigned char *p) {
|
|
unsigned int l = zipmapDecodeLength(p);
|
|
return zipmapEncodeLength(NULL, l) + l;
|
|
}
|
|
|
|
/* Return the total amount used by a value
|
|
* (encoded length + single byte free count + payload) */
|
|
static unsigned int zipmapRawValueLength(unsigned char *p) {
|
|
unsigned int l = zipmapDecodeLength(p);
|
|
unsigned int used;
|
|
|
|
used = zipmapEncodeLength(NULL, l);
|
|
used += p[used] + 1 + l;
|
|
return used;
|
|
}
|
|
|
|
/* Call before iterating through elements via zipmapNext() */
|
|
unsigned char *zipmapRewind(unsigned char *zm) {
|
|
return zm + 1;
|
|
}
|
|
|
|
/* This function is used to iterate through all the zipmap elements.
|
|
* In the first call the first argument is the pointer to the zipmap + 1.
|
|
* In the next calls what zipmapNext returns is used as first argument.
|
|
* Example:
|
|
*
|
|
* unsigned char *i = zipmapRewind(my_zipmap);
|
|
* while((i = zipmapNext(i,&key,&klen,&value,&vlen)) != NULL) {
|
|
* printf("%d bytes key at $p\n", klen, key);
|
|
* printf("%d bytes value at $p\n", vlen, value);
|
|
* }
|
|
*/
|
|
unsigned char *
|
|
zipmapNext(unsigned char *zm, unsigned char **key, unsigned int *klen, unsigned char **value, unsigned int *vlen) {
|
|
if (zm[0] == ZIPMAP_END) return NULL;
|
|
if (key) {
|
|
*key = zm;
|
|
*klen = zipmapDecodeLength(zm);
|
|
*key += ZIPMAP_LEN_BYTES(*klen);
|
|
}
|
|
zm += zipmapRawKeyLength(zm);
|
|
if (value) {
|
|
*value = zm + 1;
|
|
*vlen = zipmapDecodeLength(zm);
|
|
*value += ZIPMAP_LEN_BYTES(*vlen);
|
|
}
|
|
zm += zipmapRawValueLength(zm);
|
|
return zm;
|
|
}
|
|
|
|
/* Validate the integrity of the data structure.
|
|
* when `deep` is 0, only the integrity of the header is validated.
|
|
* when `deep` is 1, we scan all the entries one by one. */
|
|
int zipmapValidateIntegrity(unsigned char *zm, size_t size, int deep) {
|
|
#define OUT_OF_RANGE(p) ((p) < zm + 2 || (p) > zm + size - 1)
|
|
unsigned int l, s, e;
|
|
|
|
/* check that we can actually read the header (or ZIPMAP_END). */
|
|
if (size < 2) return 0;
|
|
|
|
/* the last byte must be the terminator. */
|
|
if (zm[size - 1] != ZIPMAP_END) return 0;
|
|
|
|
if (!deep) return 1;
|
|
|
|
unsigned int count = 0;
|
|
unsigned char *p = zm + 1; /* skip the count */
|
|
while (*p != ZIPMAP_END) {
|
|
/* read the field name length encoding type */
|
|
s = zipmapGetEncodedLengthSize(p);
|
|
/* make sure the entry length doesn't reach outside the edge of the zipmap */
|
|
if (OUT_OF_RANGE(p + s)) return 0;
|
|
|
|
/* read the field name length */
|
|
l = zipmapDecodeLength(p);
|
|
p += s; /* skip the encoded field size */
|
|
p += l; /* skip the field */
|
|
|
|
/* make sure the entry doesn't reach outside the edge of the zipmap */
|
|
if (OUT_OF_RANGE(p)) return 0;
|
|
|
|
/* read the value length encoding type */
|
|
s = zipmapGetEncodedLengthSize(p);
|
|
/* make sure the entry length doesn't reach outside the edge of the zipmap */
|
|
if (OUT_OF_RANGE(p + s)) return 0;
|
|
|
|
/* read the value length */
|
|
l = zipmapDecodeLength(p);
|
|
p += s; /* skip the encoded value size*/
|
|
e = *p++; /* skip the encoded free space (always encoded in one byte) */
|
|
p += l + e; /* skip the value and free space */
|
|
count++;
|
|
|
|
/* make sure the entry doesn't reach outside the edge of the zipmap */
|
|
if (OUT_OF_RANGE(p)) return 0;
|
|
}
|
|
|
|
/* check that the zipmap is not empty. */
|
|
if (count == 0) return 0;
|
|
|
|
/* check that the count in the header is correct */
|
|
if (zm[0] != ZIPMAP_BIGLEN && zm[0] != count) return 0;
|
|
|
|
return 1;
|
|
#undef OUT_OF_RANGE
|
|
}
|