ltable.c 32 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995
  1. /*
  2. ** $Id: ltable.c $
  3. ** Lua tables (hash)
  4. ** See Copyright Notice in lua.h
  5. */
  6. #define ltable_c
  7. #define LUA_CORE
  8. #include "lprefix.h"
  9. /*
  10. ** Implementation of tables (aka arrays, objects, or hash tables).
  11. ** Tables keep its elements in two parts: an array part and a hash part.
  12. ** Non-negative integer keys are all candidates to be kept in the array
  13. ** part. The actual size of the array is the largest 'n' such that
  14. ** more than half the slots between 1 and n are in use.
  15. ** Hash uses a mix of chained scatter table with Brent's variation.
  16. ** A main invariant of these tables is that, if an element is not
  17. ** in its main position (i.e. the 'original' position that its hash gives
  18. ** to it), then the colliding element is in its own main position.
  19. ** Hence even when the load factor reaches 100%, performance remains good.
  20. */
  21. #include <math.h>
  22. #include <limits.h>
  23. #include "lua.h"
  24. #include "ldebug.h"
  25. #include "ldo.h"
  26. #include "lgc.h"
  27. #include "lmem.h"
  28. #include "lobject.h"
  29. #include "lstate.h"
  30. #include "lstring.h"
  31. #include "ltable.h"
  32. #include "lvm.h"
  33. /*
  34. ** MAXABITS is the largest integer such that MAXASIZE fits in an
  35. ** unsigned int.
  36. */
  37. #define MAXABITS cast_int(sizeof(int) * CHAR_BIT - 1)
  38. /*
  39. ** MAXASIZE is the maximum size of the array part. It is the minimum
  40. ** between 2^MAXABITS and the maximum size that, measured in bytes,
  41. ** fits in a 'size_t'.
  42. */
  43. #define MAXASIZE luaM_limitN(1u << MAXABITS, TValue)
  44. /*
  45. ** MAXHBITS is the largest integer such that 2^MAXHBITS fits in a
  46. ** signed int.
  47. */
  48. #define MAXHBITS (MAXABITS - 1)
  49. /*
  50. ** MAXHSIZE is the maximum size of the hash part. It is the minimum
  51. ** between 2^MAXHBITS and the maximum size such that, measured in bytes,
  52. ** it fits in a 'size_t'.
  53. */
  54. #define MAXHSIZE luaM_limitN(1u << MAXHBITS, Node)
  55. /*
  56. ** When the original hash value is good, hashing by a power of 2
  57. ** avoids the cost of '%'.
  58. */
  59. #define hashpow2(t,n) (gnode(t, lmod((n), sizenode(t))))
  60. /*
  61. ** for other types, it is better to avoid modulo by power of 2, as
  62. ** they can have many 2 factors.
  63. */
  64. #define hashmod(t,n) (gnode(t, ((n) % ((sizenode(t)-1)|1))))
  65. #define hashstr(t,str) hashpow2(t, (str)->hash)
  66. #define hashboolean(t,p) hashpow2(t, p)
  67. #define hashpointer(t,p) hashmod(t, point2uint(p))
  68. #define dummynode (&dummynode_)
  69. static const Node dummynode_ = {
  70. {{NULL}, LUA_VEMPTY, /* value's value and type */
  71. LUA_VNIL, 0, {NULL}} /* key type, next, and key value */
  72. };
  73. static const TValue absentkey = {ABSTKEYCONSTANT};
  74. /*
  75. ** Hash for integers. To allow a good hash, use the remainder operator
  76. ** ('%'). If integer fits as a non-negative int, compute an int
  77. ** remainder, which is faster. Otherwise, use an unsigned-integer
  78. ** remainder, which uses all bits and ensures a non-negative result.
  79. */
  80. static Node *hashint (const Table *t, lua_Integer i) {
  81. lua_Unsigned ui = l_castS2U(i);
  82. if (ui <= cast_uint(INT_MAX))
  83. return hashmod(t, cast_int(ui));
  84. else
  85. return hashmod(t, ui);
  86. }
  87. /*
  88. ** Hash for floating-point numbers.
  89. ** The main computation should be just
  90. ** n = frexp(n, &i); return (n * INT_MAX) + i
  91. ** but there are some numerical subtleties.
  92. ** In a two-complement representation, INT_MAX does not has an exact
  93. ** representation as a float, but INT_MIN does; because the absolute
  94. ** value of 'frexp' is smaller than 1 (unless 'n' is inf/NaN), the
  95. ** absolute value of the product 'frexp * -INT_MIN' is smaller or equal
  96. ** to INT_MAX. Next, the use of 'unsigned int' avoids overflows when
  97. ** adding 'i'; the use of '~u' (instead of '-u') avoids problems with
  98. ** INT_MIN.
  99. */
  100. #if !defined(l_hashfloat)
  101. static int l_hashfloat (lua_Number n) {
  102. int i;
  103. lua_Integer ni;
  104. n = l_mathop(frexp)(n, &i) * -cast_num(INT_MIN);
  105. if (!lua_numbertointeger(n, &ni)) { /* is 'n' inf/-inf/NaN? */
  106. lua_assert(luai_numisnan(n) || l_mathop(fabs)(n) == cast_num(HUGE_VAL));
  107. return 0;
  108. }
  109. else { /* normal case */
  110. unsigned int u = cast_uint(i) + cast_uint(ni);
  111. return cast_int(u <= cast_uint(INT_MAX) ? u : ~u);
  112. }
  113. }
  114. #endif
  115. /*
  116. ** returns the 'main' position of an element in a table (that is,
  117. ** the index of its hash value).
  118. */
  119. static Node *mainpositionTV (const Table *t, const TValue *key) {
  120. switch (ttypetag(key)) {
  121. case LUA_VNUMINT: {
  122. lua_Integer i = ivalue(key);
  123. return hashint(t, i);
  124. }
  125. case LUA_VNUMFLT: {
  126. lua_Number n = fltvalue(key);
  127. return hashmod(t, l_hashfloat(n));
  128. }
  129. case LUA_VSHRSTR: {
  130. TString *ts = tsvalue(key);
  131. return hashstr(t, ts);
  132. }
  133. case LUA_VLNGSTR: {
  134. TString *ts = tsvalue(key);
  135. return hashpow2(t, luaS_hashlongstr(ts));
  136. }
  137. case LUA_VFALSE:
  138. return hashboolean(t, 0);
  139. case LUA_VTRUE:
  140. return hashboolean(t, 1);
  141. case LUA_VLIGHTUSERDATA: {
  142. void *p = pvalue(key);
  143. return hashpointer(t, p);
  144. }
  145. case LUA_VLCF: {
  146. lua_CFunction f = fvalue(key);
  147. return hashpointer(t, f);
  148. }
  149. default: {
  150. GCObject *o = gcvalue(key);
  151. return hashpointer(t, o);
  152. }
  153. }
  154. }
  155. l_sinline Node *mainpositionfromnode (const Table *t, Node *nd) {
  156. TValue key;
  157. getnodekey(cast(lua_State *, NULL), &key, nd);
  158. return mainpositionTV(t, &key);
  159. }
  160. /*
  161. ** Check whether key 'k1' is equal to the key in node 'n2'. This
  162. ** equality is raw, so there are no metamethods. Floats with integer
  163. ** values have been normalized, so integers cannot be equal to
  164. ** floats. It is assumed that 'eqshrstr' is simply pointer equality, so
  165. ** that short strings are handled in the default case.
  166. ** A true 'deadok' means to accept dead keys as equal to their original
  167. ** values. All dead keys are compared in the default case, by pointer
  168. ** identity. (Only collectable objects can produce dead keys.) Note that
  169. ** dead long strings are also compared by identity.
  170. ** Once a key is dead, its corresponding value may be collected, and
  171. ** then another value can be created with the same address. If this
  172. ** other value is given to 'next', 'equalkey' will signal a false
  173. ** positive. In a regular traversal, this situation should never happen,
  174. ** as all keys given to 'next' came from the table itself, and therefore
  175. ** could not have been collected. Outside a regular traversal, we
  176. ** have garbage in, garbage out. What is relevant is that this false
  177. ** positive does not break anything. (In particular, 'next' will return
  178. ** some other valid item on the table or nil.)
  179. */
  180. static int equalkey (const TValue *k1, const Node *n2, int deadok) {
  181. if ((rawtt(k1) != keytt(n2)) && /* not the same variants? */
  182. !(deadok && keyisdead(n2) && iscollectable(k1)))
  183. return 0; /* cannot be same key */
  184. switch (keytt(n2)) {
  185. case LUA_VNIL: case LUA_VFALSE: case LUA_VTRUE:
  186. return 1;
  187. case LUA_VNUMINT:
  188. return (ivalue(k1) == keyival(n2));
  189. case LUA_VNUMFLT:
  190. return luai_numeq(fltvalue(k1), fltvalueraw(keyval(n2)));
  191. case LUA_VLIGHTUSERDATA:
  192. return pvalue(k1) == pvalueraw(keyval(n2));
  193. case LUA_VLCF:
  194. return fvalue(k1) == fvalueraw(keyval(n2));
  195. case ctb(LUA_VLNGSTR):
  196. return luaS_eqlngstr(tsvalue(k1), keystrval(n2));
  197. default:
  198. return gcvalue(k1) == gcvalueraw(keyval(n2));
  199. }
  200. }
  201. /*
  202. ** True if value of 'alimit' is equal to the real size of the array
  203. ** part of table 't'. (Otherwise, the array part must be larger than
  204. ** 'alimit'.)
  205. */
  206. #define limitequalsasize(t) (isrealasize(t) || ispow2((t)->alimit))
  207. /*
  208. ** Returns the real size of the 'array' array
  209. */
  210. LUAI_FUNC unsigned int luaH_realasize (const Table *t) {
  211. if (limitequalsasize(t))
  212. return t->alimit; /* this is the size */
  213. else {
  214. unsigned int size = t->alimit;
  215. /* compute the smallest power of 2 not smaller than 'size' */
  216. size |= (size >> 1);
  217. size |= (size >> 2);
  218. size |= (size >> 4);
  219. size |= (size >> 8);
  220. #if (UINT_MAX >> 14) > 3 /* unsigned int has more than 16 bits */
  221. size |= (size >> 16);
  222. #if (UINT_MAX >> 30) > 3
  223. size |= (size >> 32); /* unsigned int has more than 32 bits */
  224. #endif
  225. #endif
  226. size++;
  227. lua_assert(ispow2(size) && size/2 < t->alimit && t->alimit < size);
  228. return size;
  229. }
  230. }
  231. /*
  232. ** Check whether real size of the array is a power of 2.
  233. ** (If it is not, 'alimit' cannot be changed to any other value
  234. ** without changing the real size.)
  235. */
  236. static int ispow2realasize (const Table *t) {
  237. return (!isrealasize(t) || ispow2(t->alimit));
  238. }
  239. static unsigned int setlimittosize (Table *t) {
  240. t->alimit = luaH_realasize(t);
  241. setrealasize(t);
  242. return t->alimit;
  243. }
  244. #define limitasasize(t) check_exp(isrealasize(t), t->alimit)
  245. /*
  246. ** "Generic" get version. (Not that generic: not valid for integers,
  247. ** which may be in array part, nor for floats with integral values.)
  248. ** See explanation about 'deadok' in function 'equalkey'.
  249. */
  250. static const TValue *getgeneric (Table *t, const TValue *key, int deadok) {
  251. Node *n = mainpositionTV(t, key);
  252. for (;;) { /* check whether 'key' is somewhere in the chain */
  253. if (equalkey(key, n, deadok))
  254. return gval(n); /* that's it */
  255. else {
  256. int nx = gnext(n);
  257. if (nx == 0)
  258. return &absentkey; /* not found */
  259. n += nx;
  260. }
  261. }
  262. }
  263. /*
  264. ** returns the index for 'k' if 'k' is an appropriate key to live in
  265. ** the array part of a table, 0 otherwise.
  266. */
  267. static unsigned int arrayindex (lua_Integer k) {
  268. if (l_castS2U(k) - 1u < MAXASIZE) /* 'k' in [1, MAXASIZE]? */
  269. return cast_uint(k); /* 'key' is an appropriate array index */
  270. else
  271. return 0;
  272. }
  273. /*
  274. ** returns the index of a 'key' for table traversals. First goes all
  275. ** elements in the array part, then elements in the hash part. The
  276. ** beginning of a traversal is signaled by 0.
  277. */
  278. static unsigned int findindex (lua_State *L, Table *t, TValue *key,
  279. unsigned int asize) {
  280. unsigned int i;
  281. if (ttisnil(key)) return 0; /* first iteration */
  282. i = ttisinteger(key) ? arrayindex(ivalue(key)) : 0;
  283. if (i - 1u < asize) /* is 'key' inside array part? */
  284. return i; /* yes; that's the index */
  285. else {
  286. const TValue *n = getgeneric(t, key, 1);
  287. if (l_unlikely(isabstkey(n)))
  288. luaG_runerror(L, "invalid key to 'next'"); /* key not found */
  289. i = cast_int(nodefromval(n) - gnode(t, 0)); /* key index in hash table */
  290. /* hash elements are numbered after array ones */
  291. return (i + 1) + asize;
  292. }
  293. }
  294. int luaH_next (lua_State *L, Table *t, StkId key) {
  295. unsigned int asize = luaH_realasize(t);
  296. unsigned int i = findindex(L, t, s2v(key), asize); /* find original key */
  297. for (; i < asize; i++) { /* try first array part */
  298. if (!isempty(&t->array[i])) { /* a non-empty entry? */
  299. setivalue(s2v(key), i + 1);
  300. setobj2s(L, key + 1, &t->array[i]);
  301. return 1;
  302. }
  303. }
  304. for (i -= asize; cast_int(i) < sizenode(t); i++) { /* hash part */
  305. if (!isempty(gval(gnode(t, i)))) { /* a non-empty entry? */
  306. Node *n = gnode(t, i);
  307. getnodekey(L, s2v(key), n);
  308. setobj2s(L, key + 1, gval(n));
  309. return 1;
  310. }
  311. }
  312. return 0; /* no more elements */
  313. }
  314. static void freehash (lua_State *L, Table *t) {
  315. if (!isdummy(t))
  316. luaM_freearray(L, t->node, cast_sizet(sizenode(t)));
  317. }
  318. /*
  319. ** {=============================================================
  320. ** Rehash
  321. ** ==============================================================
  322. */
  323. /*
  324. ** Compute the optimal size for the array part of table 't'. 'nums' is a
  325. ** "count array" where 'nums[i]' is the number of integers in the table
  326. ** between 2^(i - 1) + 1 and 2^i. 'pna' enters with the total number of
  327. ** integer keys in the table and leaves with the number of keys that
  328. ** will go to the array part; return the optimal size. (The condition
  329. ** 'twotoi > 0' in the for loop stops the loop if 'twotoi' overflows.)
  330. */
  331. static unsigned int computesizes (unsigned int nums[], unsigned int *pna) {
  332. int i;
  333. unsigned int twotoi; /* 2^i (candidate for optimal size) */
  334. unsigned int a = 0; /* number of elements smaller than 2^i */
  335. unsigned int na = 0; /* number of elements to go to array part */
  336. unsigned int optimal = 0; /* optimal size for array part */
  337. /* loop while keys can fill more than half of total size */
  338. for (i = 0, twotoi = 1;
  339. twotoi > 0 && *pna > twotoi / 2;
  340. i++, twotoi *= 2) {
  341. a += nums[i];
  342. if (a > twotoi/2) { /* more than half elements present? */
  343. optimal = twotoi; /* optimal size (till now) */
  344. na = a; /* all elements up to 'optimal' will go to array part */
  345. }
  346. }
  347. lua_assert((optimal == 0 || optimal / 2 < na) && na <= optimal);
  348. *pna = na;
  349. return optimal;
  350. }
  351. static int countint (lua_Integer key, unsigned int *nums) {
  352. unsigned int k = arrayindex(key);
  353. if (k != 0) { /* is 'key' an appropriate array index? */
  354. nums[luaO_ceillog2(k)]++; /* count as such */
  355. return 1;
  356. }
  357. else
  358. return 0;
  359. }
  360. /*
  361. ** Count keys in array part of table 't': Fill 'nums[i]' with
  362. ** number of keys that will go into corresponding slice and return
  363. ** total number of non-nil keys.
  364. */
  365. static unsigned int numusearray (const Table *t, unsigned int *nums) {
  366. int lg;
  367. unsigned int ttlg; /* 2^lg */
  368. unsigned int ause = 0; /* summation of 'nums' */
  369. unsigned int i = 1; /* count to traverse all array keys */
  370. unsigned int asize = limitasasize(t); /* real array size */
  371. /* traverse each slice */
  372. for (lg = 0, ttlg = 1; lg <= MAXABITS; lg++, ttlg *= 2) {
  373. unsigned int lc = 0; /* counter */
  374. unsigned int lim = ttlg;
  375. if (lim > asize) {
  376. lim = asize; /* adjust upper limit */
  377. if (i > lim)
  378. break; /* no more elements to count */
  379. }
  380. /* count elements in range (2^(lg - 1), 2^lg] */
  381. for (; i <= lim; i++) {
  382. if (!isempty(&t->array[i-1]))
  383. lc++;
  384. }
  385. nums[lg] += lc;
  386. ause += lc;
  387. }
  388. return ause;
  389. }
  390. static int numusehash (const Table *t, unsigned int *nums, unsigned int *pna) {
  391. int totaluse = 0; /* total number of elements */
  392. int ause = 0; /* elements added to 'nums' (can go to array part) */
  393. int i = sizenode(t);
  394. while (i--) {
  395. Node *n = &t->node[i];
  396. if (!isempty(gval(n))) {
  397. if (keyisinteger(n))
  398. ause += countint(keyival(n), nums);
  399. totaluse++;
  400. }
  401. }
  402. *pna += ause;
  403. return totaluse;
  404. }
  405. /*
  406. ** Creates an array for the hash part of a table with the given
  407. ** size, or reuses the dummy node if size is zero.
  408. ** The computation for size overflow is in two steps: the first
  409. ** comparison ensures that the shift in the second one does not
  410. ** overflow.
  411. */
  412. static void setnodevector (lua_State *L, Table *t, unsigned int size) {
  413. if (size == 0) { /* no elements to hash part? */
  414. t->node = cast(Node *, dummynode); /* use common 'dummynode' */
  415. t->lsizenode = 0;
  416. t->lastfree = NULL; /* signal that it is using dummy node */
  417. }
  418. else {
  419. int i;
  420. int lsize = luaO_ceillog2(size);
  421. if (lsize > MAXHBITS || (1u << lsize) > MAXHSIZE)
  422. luaG_runerror(L, "table overflow");
  423. size = twoto(lsize);
  424. t->node = luaM_newvector(L, size, Node);
  425. for (i = 0; i < cast_int(size); i++) {
  426. Node *n = gnode(t, i);
  427. gnext(n) = 0;
  428. setnilkey(n);
  429. setempty(gval(n));
  430. }
  431. t->lsizenode = cast_byte(lsize);
  432. t->lastfree = gnode(t, size); /* all positions are free */
  433. }
  434. }
  435. /*
  436. ** (Re)insert all elements from the hash part of 'ot' into table 't'.
  437. */
  438. static void reinsert (lua_State *L, Table *ot, Table *t) {
  439. int j;
  440. int size = sizenode(ot);
  441. for (j = 0; j < size; j++) {
  442. Node *old = gnode(ot, j);
  443. if (!isempty(gval(old))) {
  444. /* doesn't need barrier/invalidate cache, as entry was
  445. already present in the table */
  446. TValue k;
  447. getnodekey(L, &k, old);
  448. luaH_set(L, t, &k, gval(old));
  449. }
  450. }
  451. }
  452. /*
  453. ** Exchange the hash part of 't1' and 't2'.
  454. */
  455. static void exchangehashpart (Table *t1, Table *t2) {
  456. lu_byte lsizenode = t1->lsizenode;
  457. Node *node = t1->node;
  458. Node *lastfree = t1->lastfree;
  459. t1->lsizenode = t2->lsizenode;
  460. t1->node = t2->node;
  461. t1->lastfree = t2->lastfree;
  462. t2->lsizenode = lsizenode;
  463. t2->node = node;
  464. t2->lastfree = lastfree;
  465. }
  466. /*
  467. ** Resize table 't' for the new given sizes. Both allocations (for
  468. ** the hash part and for the array part) can fail, which creates some
  469. ** subtleties. If the first allocation, for the hash part, fails, an
  470. ** error is raised and that is it. Otherwise, it copies the elements from
  471. ** the shrinking part of the array (if it is shrinking) into the new
  472. ** hash. Then it reallocates the array part. If that fails, the table
  473. ** is in its original state; the function frees the new hash part and then
  474. ** raises the allocation error. Otherwise, it sets the new hash part
  475. ** into the table, initializes the new part of the array (if any) with
  476. ** nils and reinserts the elements of the old hash back into the new
  477. ** parts of the table.
  478. */
  479. void luaH_resize (lua_State *L, Table *t, unsigned int newasize,
  480. unsigned int nhsize) {
  481. unsigned int i;
  482. Table newt; /* to keep the new hash part */
  483. unsigned int oldasize = setlimittosize(t);
  484. TValue *newarray;
  485. /* create new hash part with appropriate size into 'newt' */
  486. setnodevector(L, &newt, nhsize);
  487. if (newasize < oldasize) { /* will array shrink? */
  488. t->alimit = newasize; /* pretend array has new size... */
  489. exchangehashpart(t, &newt); /* and new hash */
  490. /* re-insert into the new hash the elements from vanishing slice */
  491. for (i = newasize; i < oldasize; i++) {
  492. if (!isempty(&t->array[i]))
  493. luaH_setint(L, t, i + 1, &t->array[i]);
  494. }
  495. t->alimit = oldasize; /* restore current size... */
  496. exchangehashpart(t, &newt); /* and hash (in case of errors) */
  497. }
  498. /* allocate new array */
  499. newarray = luaM_reallocvector(L, t->array, oldasize, newasize, TValue);
  500. if (l_unlikely(newarray == NULL && newasize > 0)) { /* allocation failed? */
  501. freehash(L, &newt); /* release new hash part */
  502. luaM_error(L); /* raise error (with array unchanged) */
  503. }
  504. /* allocation ok; initialize new part of the array */
  505. exchangehashpart(t, &newt); /* 't' has the new hash ('newt' has the old) */
  506. t->array = newarray; /* set new array part */
  507. t->alimit = newasize;
  508. for (i = oldasize; i < newasize; i++) /* clear new slice of the array */
  509. setempty(&t->array[i]);
  510. /* re-insert elements from old hash part into new parts */
  511. reinsert(L, &newt, t); /* 'newt' now has the old hash */
  512. freehash(L, &newt); /* free old hash part */
  513. }
  514. void luaH_resizearray (lua_State *L, Table *t, unsigned int nasize) {
  515. int nsize = allocsizenode(t);
  516. luaH_resize(L, t, nasize, nsize);
  517. }
  518. /*
  519. ** nums[i] = number of keys 'k' where 2^(i - 1) < k <= 2^i
  520. */
  521. static void rehash (lua_State *L, Table *t, const TValue *ek) {
  522. unsigned int asize; /* optimal size for array part */
  523. unsigned int na; /* number of keys in the array part */
  524. unsigned int nums[MAXABITS + 1];
  525. int i;
  526. int totaluse;
  527. for (i = 0; i <= MAXABITS; i++) nums[i] = 0; /* reset counts */
  528. setlimittosize(t);
  529. na = numusearray(t, nums); /* count keys in array part */
  530. totaluse = na; /* all those keys are integer keys */
  531. totaluse += numusehash(t, nums, &na); /* count keys in hash part */
  532. /* count extra key */
  533. if (ttisinteger(ek))
  534. na += countint(ivalue(ek), nums);
  535. totaluse++;
  536. /* compute new size for array part */
  537. asize = computesizes(nums, &na);
  538. /* resize the table to new computed sizes */
  539. luaH_resize(L, t, asize, totaluse - na);
  540. }
  541. /*
  542. ** }=============================================================
  543. */
  544. Table *luaH_new (lua_State *L) {
  545. GCObject *o = luaC_newobj(L, LUA_VTABLE, sizeof(Table));
  546. Table *t = gco2t(o);
  547. t->metatable = NULL;
  548. t->flags = cast_byte(maskflags); /* table has no metamethod fields */
  549. t->array = NULL;
  550. t->alimit = 0;
  551. setnodevector(L, t, 0);
  552. return t;
  553. }
  554. void luaH_free (lua_State *L, Table *t) {
  555. freehash(L, t);
  556. luaM_freearray(L, t->array, luaH_realasize(t));
  557. luaM_free(L, t);
  558. }
  559. static Node *getfreepos (Table *t) {
  560. if (!isdummy(t)) {
  561. while (t->lastfree > t->node) {
  562. t->lastfree--;
  563. if (keyisnil(t->lastfree))
  564. return t->lastfree;
  565. }
  566. }
  567. return NULL; /* could not find a free place */
  568. }
  569. /*
  570. ** inserts a new key into a hash table; first, check whether key's main
  571. ** position is free. If not, check whether colliding node is in its main
  572. ** position or not: if it is not, move colliding node to an empty place and
  573. ** put new key in its main position; otherwise (colliding node is in its main
  574. ** position), new key goes to an empty position.
  575. */
  576. static void luaH_newkey (lua_State *L, Table *t, const TValue *key,
  577. TValue *value) {
  578. Node *mp;
  579. TValue aux;
  580. if (l_unlikely(ttisnil(key)))
  581. luaG_runerror(L, "table index is nil");
  582. else if (ttisfloat(key)) {
  583. lua_Number f = fltvalue(key);
  584. lua_Integer k;
  585. if (luaV_flttointeger(f, &k, F2Ieq)) { /* does key fit in an integer? */
  586. setivalue(&aux, k);
  587. key = &aux; /* insert it as an integer */
  588. }
  589. else if (l_unlikely(luai_numisnan(f)))
  590. luaG_runerror(L, "table index is NaN");
  591. }
  592. if (ttisnil(value))
  593. return; /* do not insert nil values */
  594. mp = mainpositionTV(t, key);
  595. if (!isempty(gval(mp)) || isdummy(t)) { /* main position is taken? */
  596. Node *othern;
  597. Node *f = getfreepos(t); /* get a free place */
  598. if (f == NULL) { /* cannot find a free place? */
  599. rehash(L, t, key); /* grow table */
  600. /* whatever called 'newkey' takes care of TM cache */
  601. luaH_set(L, t, key, value); /* insert key into grown table */
  602. return;
  603. }
  604. lua_assert(!isdummy(t));
  605. othern = mainpositionfromnode(t, mp);
  606. if (othern != mp) { /* is colliding node out of its main position? */
  607. /* yes; move colliding node into free position */
  608. while (othern + gnext(othern) != mp) /* find previous */
  609. othern += gnext(othern);
  610. gnext(othern) = cast_int(f - othern); /* rechain to point to 'f' */
  611. *f = *mp; /* copy colliding node into free pos. (mp->next also goes) */
  612. if (gnext(mp) != 0) {
  613. gnext(f) += cast_int(mp - f); /* correct 'next' */
  614. gnext(mp) = 0; /* now 'mp' is free */
  615. }
  616. setempty(gval(mp));
  617. }
  618. else { /* colliding node is in its own main position */
  619. /* new node will go into free position */
  620. if (gnext(mp) != 0)
  621. gnext(f) = cast_int((mp + gnext(mp)) - f); /* chain new position */
  622. else lua_assert(gnext(f) == 0);
  623. gnext(mp) = cast_int(f - mp);
  624. mp = f;
  625. }
  626. }
  627. setnodekey(L, mp, key);
  628. luaC_barrierback(L, obj2gco(t), key);
  629. lua_assert(isempty(gval(mp)));
  630. setobj2t(L, gval(mp), value);
  631. }
  632. /*
  633. ** Search function for integers. If integer is inside 'alimit', get it
  634. ** directly from the array part. Otherwise, if 'alimit' is not
  635. ** the real size of the array, the key still can be in the array part.
  636. ** In this case, do the "Xmilia trick" to check whether 'key-1' is
  637. ** smaller than the real size.
  638. ** The trick works as follow: let 'p' be an integer such that
  639. ** '2^(p+1) >= alimit > 2^p', or '2^(p+1) > alimit-1 >= 2^p'.
  640. ** That is, 2^(p+1) is the real size of the array, and 'p' is the highest
  641. ** bit on in 'alimit-1'. What we have to check becomes 'key-1 < 2^(p+1)'.
  642. ** We compute '(key-1) & ~(alimit-1)', which we call 'res'; it will
  643. ** have the 'p' bit cleared. If the key is outside the array, that is,
  644. ** 'key-1 >= 2^(p+1)', then 'res' will have some bit on higher than 'p',
  645. ** therefore it will be larger or equal to 'alimit', and the check
  646. ** will fail. If 'key-1 < 2^(p+1)', then 'res' has no bit on higher than
  647. ** 'p', and as the bit 'p' itself was cleared, 'res' will be smaller
  648. ** than 2^p, therefore smaller than 'alimit', and the check succeeds.
  649. ** As special cases, when 'alimit' is 0 the condition is trivially false,
  650. ** and when 'alimit' is 1 the condition simplifies to 'key-1 < alimit'.
  651. ** If key is 0 or negative, 'res' will have its higher bit on, so that
  652. ** if cannot be smaller than alimit.
  653. */
  654. const TValue *luaH_getint (Table *t, lua_Integer key) {
  655. lua_Unsigned alimit = t->alimit;
  656. if (l_castS2U(key) - 1u < alimit) /* 'key' in [1, t->alimit]? */
  657. return &t->array[key - 1];
  658. else if (!isrealasize(t) && /* key still may be in the array part? */
  659. (((l_castS2U(key) - 1u) & ~(alimit - 1u)) < alimit)) {
  660. t->alimit = cast_uint(key); /* probably '#t' is here now */
  661. return &t->array[key - 1];
  662. }
  663. else { /* key is not in the array part; check the hash */
  664. Node *n = hashint(t, key);
  665. for (;;) { /* check whether 'key' is somewhere in the chain */
  666. if (keyisinteger(n) && keyival(n) == key)
  667. return gval(n); /* that's it */
  668. else {
  669. int nx = gnext(n);
  670. if (nx == 0) break;
  671. n += nx;
  672. }
  673. }
  674. return &absentkey;
  675. }
  676. }
  677. /*
  678. ** search function for short strings
  679. */
  680. const TValue *luaH_getshortstr (Table *t, TString *key) {
  681. Node *n = hashstr(t, key);
  682. lua_assert(key->tt == LUA_VSHRSTR);
  683. for (;;) { /* check whether 'key' is somewhere in the chain */
  684. if (keyisshrstr(n) && eqshrstr(keystrval(n), key))
  685. return gval(n); /* that's it */
  686. else {
  687. int nx = gnext(n);
  688. if (nx == 0)
  689. return &absentkey; /* not found */
  690. n += nx;
  691. }
  692. }
  693. }
  694. const TValue *luaH_getstr (Table *t, TString *key) {
  695. if (key->tt == LUA_VSHRSTR)
  696. return luaH_getshortstr(t, key);
  697. else { /* for long strings, use generic case */
  698. TValue ko;
  699. setsvalue(cast(lua_State *, NULL), &ko, key);
  700. return getgeneric(t, &ko, 0);
  701. }
  702. }
  703. /*
  704. ** main search function
  705. */
  706. const TValue *luaH_get (Table *t, const TValue *key) {
  707. switch (ttypetag(key)) {
  708. case LUA_VSHRSTR: return luaH_getshortstr(t, tsvalue(key));
  709. case LUA_VNUMINT: return luaH_getint(t, ivalue(key));
  710. case LUA_VNIL: return &absentkey;
  711. case LUA_VNUMFLT: {
  712. lua_Integer k;
  713. if (luaV_flttointeger(fltvalue(key), &k, F2Ieq)) /* integral index? */
  714. return luaH_getint(t, k); /* use specialized version */
  715. /* else... */
  716. } /* FALLTHROUGH */
  717. default:
  718. return getgeneric(t, key, 0);
  719. }
  720. }
  721. /*
  722. ** Finish a raw "set table" operation, where 'slot' is where the value
  723. ** should have been (the result of a previous "get table").
  724. ** Beware: when using this function you probably need to check a GC
  725. ** barrier and invalidate the TM cache.
  726. */
  727. void luaH_finishset (lua_State *L, Table *t, const TValue *key,
  728. const TValue *slot, TValue *value) {
  729. if (isabstkey(slot))
  730. luaH_newkey(L, t, key, value);
  731. else
  732. setobj2t(L, cast(TValue *, slot), value);
  733. }
  734. /*
  735. ** beware: when using this function you probably need to check a GC
  736. ** barrier and invalidate the TM cache.
  737. */
  738. void luaH_set (lua_State *L, Table *t, const TValue *key, TValue *value) {
  739. const TValue *slot = luaH_get(t, key);
  740. luaH_finishset(L, t, key, slot, value);
  741. }
  742. void luaH_setint (lua_State *L, Table *t, lua_Integer key, TValue *value) {
  743. const TValue *p = luaH_getint(t, key);
  744. if (isabstkey(p)) {
  745. TValue k;
  746. setivalue(&k, key);
  747. luaH_newkey(L, t, &k, value);
  748. }
  749. else
  750. setobj2t(L, cast(TValue *, p), value);
  751. }
  752. /*
  753. ** Try to find a boundary in the hash part of table 't'. From the
  754. ** caller, we know that 'j' is zero or present and that 'j + 1' is
  755. ** present. We want to find a larger key that is absent from the
  756. ** table, so that we can do a binary search between the two keys to
  757. ** find a boundary. We keep doubling 'j' until we get an absent index.
  758. ** If the doubling would overflow, we try LUA_MAXINTEGER. If it is
  759. ** absent, we are ready for the binary search. ('j', being max integer,
  760. ** is larger or equal to 'i', but it cannot be equal because it is
  761. ** absent while 'i' is present; so 'j > i'.) Otherwise, 'j' is a
  762. ** boundary. ('j + 1' cannot be a present integer key because it is
  763. ** not a valid integer in Lua.)
  764. */
  765. static lua_Unsigned hash_search (Table *t, lua_Unsigned j) {
  766. lua_Unsigned i;
  767. if (j == 0) j++; /* the caller ensures 'j + 1' is present */
  768. do {
  769. i = j; /* 'i' is a present index */
  770. if (j <= l_castS2U(LUA_MAXINTEGER) / 2)
  771. j *= 2;
  772. else {
  773. j = LUA_MAXINTEGER;
  774. if (isempty(luaH_getint(t, j))) /* t[j] not present? */
  775. break; /* 'j' now is an absent index */
  776. else /* weird case */
  777. return j; /* well, max integer is a boundary... */
  778. }
  779. } while (!isempty(luaH_getint(t, j))); /* repeat until an absent t[j] */
  780. /* i < j && t[i] present && t[j] absent */
  781. while (j - i > 1u) { /* do a binary search between them */
  782. lua_Unsigned m = (i + j) / 2;
  783. if (isempty(luaH_getint(t, m))) j = m;
  784. else i = m;
  785. }
  786. return i;
  787. }
  788. static unsigned int binsearch (const TValue *array, unsigned int i,
  789. unsigned int j) {
  790. while (j - i > 1u) { /* binary search */
  791. unsigned int m = (i + j) / 2;
  792. if (isempty(&array[m - 1])) j = m;
  793. else i = m;
  794. }
  795. return i;
  796. }
  797. /*
  798. ** Try to find a boundary in table 't'. (A 'boundary' is an integer index
  799. ** such that t[i] is present and t[i+1] is absent, or 0 if t[1] is absent
  800. ** and 'maxinteger' if t[maxinteger] is present.)
  801. ** (In the next explanation, we use Lua indices, that is, with base 1.
  802. ** The code itself uses base 0 when indexing the array part of the table.)
  803. ** The code starts with 'limit = t->alimit', a position in the array
  804. ** part that may be a boundary.
  805. **
  806. ** (1) If 't[limit]' is empty, there must be a boundary before it.
  807. ** As a common case (e.g., after 't[#t]=nil'), check whether 'limit-1'
  808. ** is present. If so, it is a boundary. Otherwise, do a binary search
  809. ** between 0 and limit to find a boundary. In both cases, try to
  810. ** use this boundary as the new 'alimit', as a hint for the next call.
  811. **
  812. ** (2) If 't[limit]' is not empty and the array has more elements
  813. ** after 'limit', try to find a boundary there. Again, try first
  814. ** the special case (which should be quite frequent) where 'limit+1'
  815. ** is empty, so that 'limit' is a boundary. Otherwise, check the
  816. ** last element of the array part. If it is empty, there must be a
  817. ** boundary between the old limit (present) and the last element
  818. ** (absent), which is found with a binary search. (This boundary always
  819. ** can be a new limit.)
  820. **
  821. ** (3) The last case is when there are no elements in the array part
  822. ** (limit == 0) or its last element (the new limit) is present.
  823. ** In this case, must check the hash part. If there is no hash part
  824. ** or 'limit+1' is absent, 'limit' is a boundary. Otherwise, call
  825. ** 'hash_search' to find a boundary in the hash part of the table.
  826. ** (In those cases, the boundary is not inside the array part, and
  827. ** therefore cannot be used as a new limit.)
  828. */
  829. lua_Unsigned luaH_getn (Table *t) {
  830. unsigned int limit = t->alimit;
  831. if (limit > 0 && isempty(&t->array[limit - 1])) { /* (1)? */
  832. /* there must be a boundary before 'limit' */
  833. if (limit >= 2 && !isempty(&t->array[limit - 2])) {
  834. /* 'limit - 1' is a boundary; can it be a new limit? */
  835. if (ispow2realasize(t) && !ispow2(limit - 1)) {
  836. t->alimit = limit - 1;
  837. setnorealasize(t); /* now 'alimit' is not the real size */
  838. }
  839. return limit - 1;
  840. }
  841. else { /* must search for a boundary in [0, limit] */
  842. unsigned int boundary = binsearch(t->array, 0, limit);
  843. /* can this boundary represent the real size of the array? */
  844. if (ispow2realasize(t) && boundary > luaH_realasize(t) / 2) {
  845. t->alimit = boundary; /* use it as the new limit */
  846. setnorealasize(t);
  847. }
  848. return boundary;
  849. }
  850. }
  851. /* 'limit' is zero or present in table */
  852. if (!limitequalsasize(t)) { /* (2)? */
  853. /* 'limit' > 0 and array has more elements after 'limit' */
  854. if (isempty(&t->array[limit])) /* 'limit + 1' is empty? */
  855. return limit; /* this is the boundary */
  856. /* else, try last element in the array */
  857. limit = luaH_realasize(t);
  858. if (isempty(&t->array[limit - 1])) { /* empty? */
  859. /* there must be a boundary in the array after old limit,
  860. and it must be a valid new limit */
  861. unsigned int boundary = binsearch(t->array, t->alimit, limit);
  862. t->alimit = boundary;
  863. return boundary;
  864. }
  865. /* else, new limit is present in the table; check the hash part */
  866. }
  867. /* (3) 'limit' is the last element and either is zero or present in table */
  868. lua_assert(limit == luaH_realasize(t) &&
  869. (limit == 0 || !isempty(&t->array[limit - 1])));
  870. if (isdummy(t) || isempty(luaH_getint(t, cast(lua_Integer, limit + 1))))
  871. return limit; /* 'limit + 1' is absent */
  872. else /* 'limit + 1' is also present */
  873. return hash_search(t, limit);
  874. }
  875. #if defined(LUA_DEBUG)
  876. /* export these functions for the test library */
  877. Node *luaH_mainposition (const Table *t, const TValue *key) {
  878. return mainpositionTV(t, key);
  879. }
  880. #endif