Introduction to the basic structure of php arrays
This article brings you an introduction to the basic structure of the group. It has certain reference value. Friends in need can refer to it. I hope it will be helpful to you.
The following is the basic structure, insertion, search and rehash process of PHP array.
Basic structure:
struct _zend_array { zend_refcounted_h gc; union { struct { ZEND_ENDIAN_LOHI_4( zend_uchar flags, zend_uchar nApplyCount, zend_uchar nIteratorsCount, zend_uchar consistency) } v; uint32_t flags; } u; uint32_t nTableMask; // 哈希值计算掩码,等于nTableSize的负值(nTableMask = -nTableSize) Bucket *arData; // 存储元素数组,指向第一个Bucket uint32_t nNumUsed; // 已用Bucket数 uint32_t nNumOfElements; // 哈希表有效元素数 = nNumUsed - num(is_undef) uint32_t nTableSize; // 哈希表总大小,为2的n次方, 最小为8 uint32_t nInternalPointer; // 怀疑是内部指针 zend_long nNextFreeElement; // 下一个可用的数值索引 arr[] = 1;arr["a"] = 2;arr[] = 3; 则nNextFreeElement = 2; dtor_func_t pDestructor; }; typedef struct _Bucket { zval val; // 存储的具体value zend_ulong h; // hash value (or numeric index) zend_string *key; // string key or NULL for numerics } Bucket;
Description:
When the array is stored, the value is first saved in order, and then the value position is saved.
The array that stores records is called a hash table. This array is used to store values, and values are stored in order. Their storage locations will be stored in the idx obtained by calculating the hash of the key modulo nTableMask.
When the array is initialized, the minimum size is 8, which is 16, 32, 64. . .
The idx area created during array initialization will all be initialized to -1, and will also be initialized to -1 during rehash.
When an element is deleted from the array, the type of the deleted element is marked as is_undef, and nNumOfEmelment - 1. If the element is the last element, then nNumUsed - 1.
Insert:
Take $arr = ['a'=>1, 'b'=>2] as an example:
First put 1 into the array, its val.u2.next = -1, calculate the hash according to its subscript a, then take the hash modulo nTableMask to get an idx, and save the index nindex of the previous 1 at the position of the idx.
Store 2 again, its val.u2.next = -1. If the hash is calculated based on its subscript b and modulo nTableMask, the idx obtained already has a value, then it means that a hash collision has occurred. At this time, The value in the current idx is taken out and saved to the current val.u2.next, and the index nindex of 2 is saved in the current idx, and so on.
Search:
Calculate the hash based on the subscript a, take the modulo nTableMask, get an idx, get the value nindex in the idx, and search in arData. If the location is found The key in != a, then it cannot be found; if the key in the found position == a, then check its u2.next. If it is -1, then it is found; if it is not -1, it means that it is in the process of insertion. If a hash conflict occurs, continue searching in arData according to u2.next until it is found.
#rehash:
When rehash, first reset all records in the nindex area to -1, and then move the pointer *p starting from the first element. If the element is not marked as is_undef, then recalculate the key hash of the element and put it into nindex, and then loop, p. If the element is marked as is_undef, then continue to move the pointer p and set a new pointer j to point to the position. Continue the loop and move the elements that are not is_undef to the front one by one. Each time p moves, j encounters is_undef. It will not move until it is assigned a value. Move all the way to the last nNunUsed, then assign j to nNunUsed, and then insert elements from this position, and the previous elements will be directly overwritten.
The above is the detailed content of Introduction to the basic structure of php arrays. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics



PHP 8.4 brings several new features, security improvements, and performance improvements with healthy amounts of feature deprecations and removals. This guide explains how to install PHP 8.4 or upgrade to PHP 8.4 on Ubuntu, Debian, or their derivati

Visual Studio Code, also known as VS Code, is a free source code editor — or integrated development environment (IDE) — available for all major operating systems. With a large collection of extensions for many programming languages, VS Code can be c

This tutorial demonstrates how to efficiently process XML documents using PHP. XML (eXtensible Markup Language) is a versatile text-based markup language designed for both human readability and machine parsing. It's commonly used for data storage an

JWT is an open standard based on JSON, used to securely transmit information between parties, mainly for identity authentication and information exchange. 1. JWT consists of three parts: Header, Payload and Signature. 2. The working principle of JWT includes three steps: generating JWT, verifying JWT and parsing Payload. 3. When using JWT for authentication in PHP, JWT can be generated and verified, and user role and permission information can be included in advanced usage. 4. Common errors include signature verification failure, token expiration, and payload oversized. Debugging skills include using debugging tools and logging. 5. Performance optimization and best practices include using appropriate signature algorithms, setting validity periods reasonably,

A string is a sequence of characters, including letters, numbers, and symbols. This tutorial will learn how to calculate the number of vowels in a given string in PHP using different methods. The vowels in English are a, e, i, o, u, and they can be uppercase or lowercase. What is a vowel? Vowels are alphabetic characters that represent a specific pronunciation. There are five vowels in English, including uppercase and lowercase: a, e, i, o, u Example 1 Input: String = "Tutorialspoint" Output: 6 explain The vowels in the string "Tutorialspoint" are u, o, i, a, o, i. There are 6 yuan in total

How to automatically set the permissions of unixsocket after the system restarts. Every time the system restarts, we need to execute the following command to modify the permissions of unixsocket: sudo...

Static binding (static::) implements late static binding (LSB) in PHP, allowing calling classes to be referenced in static contexts rather than defining classes. 1) The parsing process is performed at runtime, 2) Look up the call class in the inheritance relationship, 3) It may bring performance overhead.

Causes and solutions for errors when using PECL to install extensions in Docker environment When using Docker environment, we often encounter some headaches...
