首页 \ 问答 \ 在AtomicReference getAndSet和其他此类方法中,字段valueOffSet的作用是什么(What is role of field valueOffSet in AtomicReference getAndSet and other such methods)

在AtomicReference getAndSet和其他此类方法中,字段valueOffSet的作用是什么(What is role of field valueOffSet in AtomicReference getAndSet and other such methods)

我正在研究非阻塞算法。 我意识到对volatile和Atomic *等领域的研究对此至关重要。 所以这是一个问题。
AtomicReference中compareAndSet使用unsafe.compareAndSwapObject(this,valueOffset,expect,update) 。 另一个,臭名昭着的lazySet使用unsafe.putOrderedObject(this,valueOffset,newValue);
我假设在这些方法中的某个地方,期望和更新对象的比较将使用“equals”来完成。 想知道它是如何以原子方式完成的。我想,最终使用CAS,在某种程度上......我想,valueOffset在那里有一个角色。
不幸的是,Unsafe的源代码不可用..而且这段代码对于理解世界上的valueOffset及其作用至关重要。 任何人有任何想法吗? 谢谢!


I am studying non blocking algorithms. I realize that study of areas like volatile and Atomic* are crucial for this. So here is a question.
In AtomicReference, compareAndSet uses unsafe.compareAndSwapObject(this, valueOffset, expect, update). Another one, the infamous lazySet uses unsafe.putOrderedObject(this, valueOffset, newValue);.
I assume somewhere in these methods, a comparison of expect and update object will be done using "equals". Wonder how it is done atomically.. I guess, using CAS eventually, in some way.. and I guess, valueOffset has a role there.
Unfortunately, source code of Unsafe is not available.. and this code appears rather crucial to understand what in the world is valueOffset and what does it do. Anyone any idea please? Thanks!


原文:https://stackoverflow.com/questions/36000545
更新时间:2023-09-28 20:09

最满意答案

你的问题很常见。

许多学习者无法从包含四个字母“NULL”的字符串中分辨出NULL值。 而后者绝对没有特殊意义。

还有一个坏消息:HTTP协议是基于文本的。 意味着使用HTTP方法不能发送除字符串之外的任何内容,因此无法通过HTTP POST发送NULL值。

要使此代码有效,您必须在服务器端添加NULL,就像您为密码所做的那样:

function post($POST)
{   
   $POST = array_map('trim', $_POST);
   $hash = "$2y$10$";
   $salt = "nekiludistringzahash22";
   $his = $hash . $salt;
   $POST['pass'] = crypt($_POST['pass'],$his);
   $POST['reg_time'] = NULL;
   $POST['id'] = NULL;
   return $POST;  
}

但是,这不是您的代码的主要问题。 最糟糕的消息是你的代码非常容易受到sql注入的攻击 ,尽管看似正确的绑定。

为了使其安全,请使您的函数接受允许字段列表 ,并为缺少的字段分配NULL值:

function post($allowed)
{   
    $post = array();
    foreach ($allowed as $key)
    {
       if (isset($_POST[$key])) $post[$key] = trim($_POST[$key]);
       else $_POST[$key] = NULL;
   }
   $hash = "$2y$10$";
   $salt = "nekiludistringzahash22";
   $his = $hash . $salt;
   $POST['pass'] = crypt($_POST['pass'],$his);
}

然后像这样调用它:

$post = post(array('id','uname','pass','name','lname','reg_time'));
$sql = "insert into users values(:" . implode(",:", array_keys($post)).");";
$reg = $db->prepare($sql);
$reg->execute($post);

这样您就可以过滤掉所有字段名称。

作为奖励,您将能够为提交按钮分配自定义值;)


Your problem is quite common.

Many learners cannot tell a NULL value from a string that consists of four letters "NULL". While the latter has absolutely no special meaning.

And also there are bad news: HTTP protocol is text-based. Means one cannot send anything but a string using an HTTP method, and thus a NULL value cannot be sent over HTTP POST.

To make this code work, you have to add your NULLs at the server side, just like you are doing it for the password:

function post($POST)
{   
   $POST = array_map('trim', $_POST);
   $hash = "$2y$10$";
   $salt = "nekiludistringzahash22";
   $his = $hash . $salt;
   $POST['pass'] = crypt($_POST['pass'],$his);
   $POST['reg_time'] = NULL;
   $POST['id'] = NULL;
   return $POST;  
}

However, it is not the main problem with your code. The worst news is that your code is severely vulnerable to sql injection, despite the seemingly proper binding.

To make it safe, make your function accept the list of allowed fields, and assign a NULL value to absent ones:

function post($allowed)
{   
    $post = array();
    foreach ($allowed as $key)
    {
       if (isset($_POST[$key])) $post[$key] = trim($_POST[$key]);
       else $_POST[$key] = NULL;
   }
   $hash = "$2y$10$";
   $salt = "nekiludistringzahash22";
   $his = $hash . $salt;
   $POST['pass'] = crypt($_POST['pass'],$his);
}

And then call it like this:

$post = post(array('id','uname','pass','name','lname','reg_time'));
$sql = "insert into users values(:" . implode(",:", array_keys($post)).");";
$reg = $db->prepare($sql);
$reg->execute($post);

this way you will have all the field names filtered out.

As a bonus, you'll be able to assign a custom value to your submit button ;)

相关问答

更多

相关文章

更多

最新问答

更多
  • 获取MVC 4使用的DisplayMode后缀(Get the DisplayMode Suffix being used by MVC 4)
  • 如何通过引用返回对象?(How is returning an object by reference possible?)
  • 矩阵如何存储在内存中?(How are matrices stored in memory?)
  • 每个请求的Java新会话?(Java New Session For Each Request?)
  • css:浮动div中重叠的标题h1(css: overlapping headlines h1 in floated divs)
  • 无论图像如何,Caffe预测同一类(Caffe predicts same class regardless of image)
  • xcode语法颜色编码解释?(xcode syntax color coding explained?)
  • 在Access 2010 Runtime中使用Office 2000校对工具(Use Office 2000 proofing tools in Access 2010 Runtime)
  • 从单独的Web主机将图像传输到服务器上(Getting images onto server from separate web host)
  • 从旧版本复制文件并保留它们(旧/新版本)(Copy a file from old revision and keep both of them (old / new revision))
  • 西安哪有PLC可控制编程的培训
  • 在Entity Framework中选择基类(Select base class in Entity Framework)
  • 在Android中出现错误“数据集和渲染器应该不为null,并且应该具有相同数量的系列”(Error “Dataset and renderer should be not null and should have the same number of series” in Android)
  • 电脑二级VF有什么用
  • Datamapper Ruby如何添加Hook方法(Datamapper Ruby How to add Hook Method)
  • 金华英语角.
  • 手机软件如何制作
  • 用于Android webview中图像保存的上下文菜单(Context Menu for Image Saving in an Android webview)
  • 注意:未定义的偏移量:PHP(Notice: Undefined offset: PHP)
  • 如何读R中的大数据集[复制](How to read large dataset in R [duplicate])
  • Unity 5 Heighmap与地形宽度/地形长度的分辨率关系?(Unity 5 Heighmap Resolution relationship to terrain width / terrain length?)
  • 如何通知PipedOutputStream线程写入最后一个字节的PipedInputStream线程?(How to notify PipedInputStream thread that PipedOutputStream thread has written last byte?)
  • python的访问器方法有哪些
  • DeviceNetworkInformation:哪个是哪个?(DeviceNetworkInformation: Which is which?)
  • 在Ruby中对组合进行排序(Sorting a combination in Ruby)
  • 网站开发的流程?
  • 使用Zend Framework 2中的JOIN sql检索数据(Retrieve data using JOIN sql in Zend Framework 2)
  • 条带格式类型格式模式编号无法正常工作(Stripes format type format pattern number not working properly)
  • 透明度错误IE11(Transparency bug IE11)
  • linux的基本操作命令。。。