aboutsummaryrefslogtreecommitdiff
path: root/zig-lua/lua-5.4.7/ltable.c
diff options
context:
space:
mode:
Diffstat (limited to 'zig-lua/lua-5.4.7/ltable.c')
-rw-r--r--zig-lua/lua-5.4.7/ltable.c995
1 files changed, 995 insertions, 0 deletions
diff --git a/zig-lua/lua-5.4.7/ltable.c b/zig-lua/lua-5.4.7/ltable.c
new file mode 100644
index 0000000..3353c04
--- /dev/null
+++ b/zig-lua/lua-5.4.7/ltable.c
@@ -0,0 +1,995 @@
1/*
2** $Id: ltable.c $
3** Lua tables (hash)
4** See Copyright Notice in lua.h
5*/
6
7#define ltable_c
8#define LUA_CORE
9
10#include "lprefix.h"
11
12
13/*
14** Implementation of tables (aka arrays, objects, or hash tables).
15** Tables keep its elements in two parts: an array part and a hash part.
16** Non-negative integer keys are all candidates to be kept in the array
17** part. The actual size of the array is the largest 'n' such that
18** more than half the slots between 1 and n are in use.
19** Hash uses a mix of chained scatter table with Brent's variation.
20** A main invariant of these tables is that, if an element is not
21** in its main position (i.e. the 'original' position that its hash gives
22** to it), then the colliding element is in its own main position.
23** Hence even when the load factor reaches 100%, performance remains good.
24*/
25
26#include <math.h>
27#include <limits.h>
28
29#include "lua.h"
30
31#include "ldebug.h"
32#include "ldo.h"
33#include "lgc.h"
34#include "lmem.h"
35#include "lobject.h"
36#include "lstate.h"
37#include "lstring.h"
38#include "ltable.h"
39#include "lvm.h"
40
41
42/*
43** MAXABITS is the largest integer such that MAXASIZE fits in an
44** unsigned int.
45*/
46#define MAXABITS cast_int(sizeof(int) * CHAR_BIT - 1)
47
48
49/*
50** MAXASIZE is the maximum size of the array part. It is the minimum
51** between 2^MAXABITS and the maximum size that, measured in bytes,
52** fits in a 'size_t'.
53*/
54#define MAXASIZE luaM_limitN(1u << MAXABITS, TValue)
55
56/*
57** MAXHBITS is the largest integer such that 2^MAXHBITS fits in a
58** signed int.
59*/
60#define MAXHBITS (MAXABITS - 1)
61
62
63/*
64** MAXHSIZE is the maximum size of the hash part. It is the minimum
65** between 2^MAXHBITS and the maximum size such that, measured in bytes,
66** it fits in a 'size_t'.
67*/
68#define MAXHSIZE luaM_limitN(1u << MAXHBITS, Node)
69
70
71/*
72** When the original hash value is good, hashing by a power of 2
73** avoids the cost of '%'.
74*/
75#define hashpow2(t,n) (gnode(t, lmod((n), sizenode(t))))
76
77/*
78** for other types, it is better to avoid modulo by power of 2, as
79** they can have many 2 factors.
80*/
81#define hashmod(t,n) (gnode(t, ((n) % ((sizenode(t)-1)|1))))
82
83
84#define hashstr(t,str) hashpow2(t, (str)->hash)
85#define hashboolean(t,p) hashpow2(t, p)
86
87
88#define hashpointer(t,p) hashmod(t, point2uint(p))
89
90
91#define dummynode (&dummynode_)
92
93static const Node dummynode_ = {
94 {{NULL}, LUA_VEMPTY, /* value's value and type */
95 LUA_VNIL, 0, {NULL}} /* key type, next, and key value */
96};
97
98
99static const TValue absentkey = {ABSTKEYCONSTANT};
100
101
102/*
103** Hash for integers. To allow a good hash, use the remainder operator
104** ('%'). If integer fits as a non-negative int, compute an int
105** remainder, which is faster. Otherwise, use an unsigned-integer
106** remainder, which uses all bits and ensures a non-negative result.
107*/
108static Node *hashint (const Table *t, lua_Integer i) {
109 lua_Unsigned ui = l_castS2U(i);
110 if (ui <= cast_uint(INT_MAX))
111 return hashmod(t, cast_int(ui));
112 else
113 return hashmod(t, ui);
114}
115
116
117/*
118** Hash for floating-point numbers.
119** The main computation should be just
120** n = frexp(n, &i); return (n * INT_MAX) + i
121** but there are some numerical subtleties.
122** In a two-complement representation, INT_MAX does not has an exact
123** representation as a float, but INT_MIN does; because the absolute
124** value of 'frexp' is smaller than 1 (unless 'n' is inf/NaN), the
125** absolute value of the product 'frexp * -INT_MIN' is smaller or equal
126** to INT_MAX. Next, the use of 'unsigned int' avoids overflows when
127** adding 'i'; the use of '~u' (instead of '-u') avoids problems with
128** INT_MIN.
129*/
130#if !defined(l_hashfloat)
131static int l_hashfloat (lua_Number n) {
132 int i;
133 lua_Integer ni;
134 n = l_mathop(frexp)(n, &i) * -cast_num(INT_MIN);
135 if (!lua_numbertointeger(n, &ni)) { /* is 'n' inf/-inf/NaN? */
136 lua_assert(luai_numisnan(n) || l_mathop(fabs)(n) == cast_num(HUGE_VAL));
137 return 0;
138 }
139 else { /* normal case */
140 unsigned int u = cast_uint(i) + cast_uint(ni);
141 return cast_int(u <= cast_uint(INT_MAX) ? u : ~u);
142 }
143}
144#endif
145
146
147/*
148** returns the 'main' position of an element in a table (that is,
149** the index of its hash value).
150*/
151static Node *mainpositionTV (const Table *t, const TValue *key) {
152 switch (ttypetag(key)) {
153 case LUA_VNUMINT: {
154 lua_Integer i = ivalue(key);
155 return hashint(t, i);
156 }
157 case LUA_VNUMFLT: {
158 lua_Number n = fltvalue(key);
159 return hashmod(t, l_hashfloat(n));
160 }
161 case LUA_VSHRSTR: {
162 TString *ts = tsvalue(key);
163 return hashstr(t, ts);
164 }
165 case LUA_VLNGSTR: {
166 TString *ts = tsvalue(key);
167 return hashpow2(t, luaS_hashlongstr(ts));
168 }
169 case LUA_VFALSE:
170 return hashboolean(t, 0);
171 case LUA_VTRUE:
172 return hashboolean(t, 1);
173 case LUA_VLIGHTUSERDATA: {
174 void *p = pvalue(key);
175 return hashpointer(t, p);
176 }
177 case LUA_VLCF: {
178 lua_CFunction f = fvalue(key);
179 return hashpointer(t, f);
180 }
181 default: {
182 GCObject *o = gcvalue(key);
183 return hashpointer(t, o);
184 }
185 }
186}
187
188
189l_sinline Node *mainpositionfromnode (const Table *t, Node *nd) {
190 TValue key;
191 getnodekey(cast(lua_State *, NULL), &key, nd);
192 return mainpositionTV(t, &key);
193}
194
195
196/*
197** Check whether key 'k1' is equal to the key in node 'n2'. This
198** equality is raw, so there are no metamethods. Floats with integer
199** values have been normalized, so integers cannot be equal to
200** floats. It is assumed that 'eqshrstr' is simply pointer equality, so
201** that short strings are handled in the default case.
202** A true 'deadok' means to accept dead keys as equal to their original
203** values. All dead keys are compared in the default case, by pointer
204** identity. (Only collectable objects can produce dead keys.) Note that
205** dead long strings are also compared by identity.
206** Once a key is dead, its corresponding value may be collected, and
207** then another value can be created with the same address. If this
208** other value is given to 'next', 'equalkey' will signal a false
209** positive. In a regular traversal, this situation should never happen,
210** as all keys given to 'next' came from the table itself, and therefore
211** could not have been collected. Outside a regular traversal, we
212** have garbage in, garbage out. What is relevant is that this false
213** positive does not break anything. (In particular, 'next' will return
214** some other valid item on the table or nil.)
215*/
216static int equalkey (const TValue *k1, const Node *n2, int deadok) {
217 if ((rawtt(k1) != keytt(n2)) && /* not the same variants? */
218 !(deadok && keyisdead(n2) && iscollectable(k1)))
219 return 0; /* cannot be same key */
220 switch (keytt(n2)) {
221 case LUA_VNIL: case LUA_VFALSE: case LUA_VTRUE:
222 return 1;
223 case LUA_VNUMINT:
224 return (ivalue(k1) == keyival(n2));
225 case LUA_VNUMFLT:
226 return luai_numeq(fltvalue(k1), fltvalueraw(keyval(n2)));
227 case LUA_VLIGHTUSERDATA:
228 return pvalue(k1) == pvalueraw(keyval(n2));
229 case LUA_VLCF:
230 return fvalue(k1) == fvalueraw(keyval(n2));
231 case ctb(LUA_VLNGSTR):
232 return luaS_eqlngstr(tsvalue(k1), keystrval(n2));
233 default:
234 return gcvalue(k1) == gcvalueraw(keyval(n2));
235 }
236}
237
238
239/*
240** True if value of 'alimit' is equal to the real size of the array
241** part of table 't'. (Otherwise, the array part must be larger than
242** 'alimit'.)
243*/
244#define limitequalsasize(t) (isrealasize(t) || ispow2((t)->alimit))
245
246
247/*
248** Returns the real size of the 'array' array
249*/
250LUAI_FUNC unsigned int luaH_realasize (const Table *t) {
251 if (limitequalsasize(t))
252 return t->alimit; /* this is the size */
253 else {
254 unsigned int size = t->alimit;
255 /* compute the smallest power of 2 not smaller than 'size' */
256 size |= (size >> 1);
257 size |= (size >> 2);
258 size |= (size >> 4);
259 size |= (size >> 8);
260#if (UINT_MAX >> 14) > 3 /* unsigned int has more than 16 bits */
261 size |= (size >> 16);
262#if (UINT_MAX >> 30) > 3
263 size |= (size >> 32); /* unsigned int has more than 32 bits */
264#endif
265#endif
266 size++;
267 lua_assert(ispow2(size) && size/2 < t->alimit && t->alimit < size);
268 return size;
269 }
270}
271
272
273/*
274** Check whether real size of the array is a power of 2.
275** (If it is not, 'alimit' cannot be changed to any other value
276** without changing the real size.)
277*/
278static int ispow2realasize (const Table *t) {
279 return (!isrealasize(t) || ispow2(t->alimit));
280}
281
282
283static unsigned int setlimittosize (Table *t) {
284 t->alimit = luaH_realasize(t);
285 setrealasize(t);
286 return t->alimit;
287}
288
289
290#define limitasasize(t) check_exp(isrealasize(t), t->alimit)
291
292
293
294/*
295** "Generic" get version. (Not that generic: not valid for integers,
296** which may be in array part, nor for floats with integral values.)
297** See explanation about 'deadok' in function 'equalkey'.
298*/
299static const TValue *getgeneric (Table *t, const TValue *key, int deadok) {
300 Node *n = mainpositionTV(t, key);
301 for (;;) { /* check whether 'key' is somewhere in the chain */
302 if (equalkey(key, n, deadok))
303 return gval(n); /* that's it */
304 else {
305 int nx = gnext(n);
306 if (nx == 0)
307 return &absentkey; /* not found */
308 n += nx;
309 }
310 }
311}
312
313
314/*
315** returns the index for 'k' if 'k' is an appropriate key to live in
316** the array part of a table, 0 otherwise.
317*/
318static unsigned int arrayindex (lua_Integer k) {
319 if (l_castS2U(k) - 1u < MAXASIZE) /* 'k' in [1, MAXASIZE]? */
320 return cast_uint(k); /* 'key' is an appropriate array index */
321 else
322 return 0;
323}
324
325
326/*
327** returns the index of a 'key' for table traversals. First goes all
328** elements in the array part, then elements in the hash part. The
329** beginning of a traversal is signaled by 0.
330*/
331static unsigned int findindex (lua_State *L, Table *t, TValue *key,
332 unsigned int asize) {
333 unsigned int i;
334 if (ttisnil(key)) return 0; /* first iteration */
335 i = ttisinteger(key) ? arrayindex(ivalue(key)) : 0;
336 if (i - 1u < asize) /* is 'key' inside array part? */
337 return i; /* yes; that's the index */
338 else {
339 const TValue *n = getgeneric(t, key, 1);
340 if (l_unlikely(isabstkey(n)))
341 luaG_runerror(L, "invalid key to 'next'"); /* key not found */
342 i = cast_int(nodefromval(n) - gnode(t, 0)); /* key index in hash table */
343 /* hash elements are numbered after array ones */
344 return (i + 1) + asize;
345 }
346}
347
348
349int luaH_next (lua_State *L, Table *t, StkId key) {
350 unsigned int asize = luaH_realasize(t);
351 unsigned int i = findindex(L, t, s2v(key), asize); /* find original key */
352 for (; i < asize; i++) { /* try first array part */
353 if (!isempty(&t->array[i])) { /* a non-empty entry? */
354 setivalue(s2v(key), i + 1);
355 setobj2s(L, key + 1, &t->array[i]);
356 return 1;
357 }
358 }
359 for (i -= asize; cast_int(i) < sizenode(t); i++) { /* hash part */
360 if (!isempty(gval(gnode(t, i)))) { /* a non-empty entry? */
361 Node *n = gnode(t, i);
362 getnodekey(L, s2v(key), n);
363 setobj2s(L, key + 1, gval(n));
364 return 1;
365 }
366 }
367 return 0; /* no more elements */
368}
369
370
371static void freehash (lua_State *L, Table *t) {
372 if (!isdummy(t))
373 luaM_freearray(L, t->node, cast_sizet(sizenode(t)));
374}
375
376
377/*
378** {=============================================================
379** Rehash
380** ==============================================================
381*/
382
383/*
384** Compute the optimal size for the array part of table 't'. 'nums' is a
385** "count array" where 'nums[i]' is the number of integers in the table
386** between 2^(i - 1) + 1 and 2^i. 'pna' enters with the total number of
387** integer keys in the table and leaves with the number of keys that
388** will go to the array part; return the optimal size. (The condition
389** 'twotoi > 0' in the for loop stops the loop if 'twotoi' overflows.)
390*/
391static unsigned int computesizes (unsigned int nums[], unsigned int *pna) {
392 int i;
393 unsigned int twotoi; /* 2^i (candidate for optimal size) */
394 unsigned int a = 0; /* number of elements smaller than 2^i */
395 unsigned int na = 0; /* number of elements to go to array part */
396 unsigned int optimal = 0; /* optimal size for array part */
397 /* loop while keys can fill more than half of total size */
398 for (i = 0, twotoi = 1;
399 twotoi > 0 && *pna > twotoi / 2;
400 i++, twotoi *= 2) {
401 a += nums[i];
402 if (a > twotoi/2) { /* more than half elements present? */
403 optimal = twotoi; /* optimal size (till now) */
404 na = a; /* all elements up to 'optimal' will go to array part */
405 }
406 }
407 lua_assert((optimal == 0 || optimal / 2 < na) && na <= optimal);
408 *pna = na;
409 return optimal;
410}
411
412
413static int countint (lua_Integer key, unsigned int *nums) {
414 unsigned int k = arrayindex(key);
415 if (k != 0) { /* is 'key' an appropriate array index? */
416 nums[luaO_ceillog2(k)]++; /* count as such */
417 return 1;
418 }
419 else
420 return 0;
421}
422
423
424/*
425** Count keys in array part of table 't': Fill 'nums[i]' with
426** number of keys that will go into corresponding slice and return
427** total number of non-nil keys.
428*/
429static unsigned int numusearray (const Table *t, unsigned int *nums) {
430 int lg;
431 unsigned int ttlg; /* 2^lg */
432 unsigned int ause = 0; /* summation of 'nums' */
433 unsigned int i = 1; /* count to traverse all array keys */
434 unsigned int asize = limitasasize(t); /* real array size */
435 /* traverse each slice */
436 for (lg = 0, ttlg = 1; lg <= MAXABITS; lg++, ttlg *= 2) {
437 unsigned int lc = 0; /* counter */
438 unsigned int lim = ttlg;
439 if (lim > asize) {
440 lim = asize; /* adjust upper limit */
441 if (i > lim)
442 break; /* no more elements to count */
443 }
444 /* count elements in range (2^(lg - 1), 2^lg] */
445 for (; i <= lim; i++) {
446 if (!isempty(&t->array[i-1]))
447 lc++;
448 }
449 nums[lg] += lc;
450 ause += lc;
451 }
452 return ause;
453}
454
455
456static int numusehash (const Table *t, unsigned int *nums, unsigned int *pna) {
457 int totaluse = 0; /* total number of elements */
458 int ause = 0; /* elements added to 'nums' (can go to array part) */
459 int i = sizenode(t);
460 while (i--) {
461 Node *n = &t->node[i];
462 if (!isempty(gval(n))) {
463 if (keyisinteger(n))
464 ause += countint(keyival(n), nums);
465 totaluse++;
466 }
467 }
468 *pna += ause;
469 return totaluse;
470}
471
472
473/*
474** Creates an array for the hash part of a table with the given
475** size, or reuses the dummy node if size is zero.
476** The computation for size overflow is in two steps: the first
477** comparison ensures that the shift in the second one does not
478** overflow.
479*/
480static void setnodevector (lua_State *L, Table *t, unsigned int size) {
481 if (size == 0) { /* no elements to hash part? */
482 t->node = cast(Node *, dummynode); /* use common 'dummynode' */
483 t->lsizenode = 0;
484 t->lastfree = NULL; /* signal that it is using dummy node */
485 }
486 else {
487 int i;
488 int lsize = luaO_ceillog2(size);
489 if (lsize > MAXHBITS || (1u << lsize) > MAXHSIZE)
490 luaG_runerror(L, "table overflow");
491 size = twoto(lsize);
492 t->node = luaM_newvector(L, size, Node);
493 for (i = 0; i < cast_int(size); i++) {
494 Node *n = gnode(t, i);
495 gnext(n) = 0;
496 setnilkey(n);
497 setempty(gval(n));
498 }
499 t->lsizenode = cast_byte(lsize);
500 t->lastfree = gnode(t, size); /* all positions are free */
501 }
502}
503
504
505/*
506** (Re)insert all elements from the hash part of 'ot' into table 't'.
507*/
508static void reinsert (lua_State *L, Table *ot, Table *t) {
509 int j;
510 int size = sizenode(ot);
511 for (j = 0; j < size; j++) {
512 Node *old = gnode(ot, j);
513 if (!isempty(gval(old))) {
514 /* doesn't need barrier/invalidate cache, as entry was
515 already present in the table */
516 TValue k;
517 getnodekey(L, &k, old);
518 luaH_set(L, t, &k, gval(old));
519 }
520 }
521}
522
523
524/*
525** Exchange the hash part of 't1' and 't2'.
526*/
527static void exchangehashpart (Table *t1, Table *t2) {
528 lu_byte lsizenode = t1->lsizenode;
529 Node *node = t1->node;
530 Node *lastfree = t1->lastfree;
531 t1->lsizenode = t2->lsizenode;
532 t1->node = t2->node;
533 t1->lastfree = t2->lastfree;
534 t2->lsizenode = lsizenode;
535 t2->node = node;
536 t2->lastfree = lastfree;
537}
538
539
540/*
541** Resize table 't' for the new given sizes. Both allocations (for
542** the hash part and for the array part) can fail, which creates some
543** subtleties. If the first allocation, for the hash part, fails, an
544** error is raised and that is it. Otherwise, it copies the elements from
545** the shrinking part of the array (if it is shrinking) into the new
546** hash. Then it reallocates the array part. If that fails, the table
547** is in its original state; the function frees the new hash part and then
548** raises the allocation error. Otherwise, it sets the new hash part
549** into the table, initializes the new part of the array (if any) with
550** nils and reinserts the elements of the old hash back into the new
551** parts of the table.
552*/
553void luaH_resize (lua_State *L, Table *t, unsigned int newasize,
554 unsigned int nhsize) {
555 unsigned int i;
556 Table newt; /* to keep the new hash part */
557 unsigned int oldasize = setlimittosize(t);
558 TValue *newarray;
559 /* create new hash part with appropriate size into 'newt' */
560 setnodevector(L, &newt, nhsize);
561 if (newasize < oldasize) { /* will array shrink? */
562 t->alimit = newasize; /* pretend array has new size... */
563 exchangehashpart(t, &newt); /* and new hash */
564 /* re-insert into the new hash the elements from vanishing slice */
565 for (i = newasize; i < oldasize; i++) {
566 if (!isempty(&t->array[i]))
567 luaH_setint(L, t, i + 1, &t->array[i]);
568 }
569 t->alimit = oldasize; /* restore current size... */
570 exchangehashpart(t, &newt); /* and hash (in case of errors) */
571 }
572 /* allocate new array */
573 newarray = luaM_reallocvector(L, t->array, oldasize, newasize, TValue);
574 if (l_unlikely(newarray == NULL && newasize > 0)) { /* allocation failed? */
575 freehash(L, &newt); /* release new hash part */
576 luaM_error(L); /* raise error (with array unchanged) */
577 }
578 /* allocation ok; initialize new part of the array */
579 exchangehashpart(t, &newt); /* 't' has the new hash ('newt' has the old) */
580 t->array = newarray; /* set new array part */
581 t->alimit = newasize;
582 for (i = oldasize; i < newasize; i++) /* clear new slice of the array */
583 setempty(&t->array[i]);
584 /* re-insert elements from old hash part into new parts */
585 reinsert(L, &newt, t); /* 'newt' now has the old hash */
586 freehash(L, &newt); /* free old hash part */
587}
588
589
590void luaH_resizearray (lua_State *L, Table *t, unsigned int nasize) {
591 int nsize = allocsizenode(t);
592 luaH_resize(L, t, nasize, nsize);
593}
594
595/*
596** nums[i] = number of keys 'k' where 2^(i - 1) < k <= 2^i
597*/
598static void rehash (lua_State *L, Table *t, const TValue *ek) {
599 unsigned int asize; /* optimal size for array part */
600 unsigned int na; /* number of keys in the array part */
601 unsigned int nums[MAXABITS + 1];
602 int i;
603 int totaluse;
604 for (i = 0; i <= MAXABITS; i++) nums[i] = 0; /* reset counts */
605 setlimittosize(t);
606 na = numusearray(t, nums); /* count keys in array part */
607 totaluse = na; /* all those keys are integer keys */
608 totaluse += numusehash(t, nums, &na); /* count keys in hash part */
609 /* count extra key */
610 if (ttisinteger(ek))
611 na += countint(ivalue(ek), nums);
612 totaluse++;
613 /* compute new size for array part */
614 asize = computesizes(nums, &na);
615 /* resize the table to new computed sizes */
616 luaH_resize(L, t, asize, totaluse - na);
617}
618
619
620
621/*
622** }=============================================================
623*/
624
625
626Table *luaH_new (lua_State *L) {
627 GCObject *o = luaC_newobj(L, LUA_VTABLE, sizeof(Table));
628 Table *t = gco2t(o);
629 t->metatable = NULL;
630 t->flags = cast_byte(maskflags); /* table has no metamethod fields */
631 t->array = NULL;
632 t->alimit = 0;
633 setnodevector(L, t, 0);
634 return t;
635}
636
637
638void luaH_free (lua_State *L, Table *t) {
639 freehash(L, t);
640 luaM_freearray(L, t->array, luaH_realasize(t));
641 luaM_free(L, t);
642}
643
644
645static Node *getfreepos (Table *t) {
646 if (!isdummy(t)) {
647 while (t->lastfree > t->node) {
648 t->lastfree--;
649 if (keyisnil(t->lastfree))
650 return t->lastfree;
651 }
652 }
653 return NULL; /* could not find a free place */
654}
655
656
657
658/*
659** inserts a new key into a hash table; first, check whether key's main
660** position is free. If not, check whether colliding node is in its main
661** position or not: if it is not, move colliding node to an empty place and
662** put new key in its main position; otherwise (colliding node is in its main
663** position), new key goes to an empty position.
664*/
665static void luaH_newkey (lua_State *L, Table *t, const TValue *key,
666 TValue *value) {
667 Node *mp;
668 TValue aux;
669 if (l_unlikely(ttisnil(key)))
670 luaG_runerror(L, "table index is nil");
671 else if (ttisfloat(key)) {
672 lua_Number f = fltvalue(key);
673 lua_Integer k;
674 if (luaV_flttointeger(f, &k, F2Ieq)) { /* does key fit in an integer? */
675 setivalue(&aux, k);
676 key = &aux; /* insert it as an integer */
677 }
678 else if (l_unlikely(luai_numisnan(f)))
679 luaG_runerror(L, "table index is NaN");
680 }
681 if (ttisnil(value))
682 return; /* do not insert nil values */
683 mp = mainpositionTV(t, key);
684 if (!isempty(gval(mp)) || isdummy(t)) { /* main position is taken? */
685 Node *othern;
686 Node *f = getfreepos(t); /* get a free place */
687 if (f == NULL) { /* cannot find a free place? */
688 rehash(L, t, key); /* grow table */
689 /* whatever called 'newkey' takes care of TM cache */
690 luaH_set(L, t, key, value); /* insert key into grown table */
691 return;
692 }
693 lua_assert(!isdummy(t));
694 othern = mainpositionfromnode(t, mp);
695 if (othern != mp) { /* is colliding node out of its main position? */
696 /* yes; move colliding node into free position */
697 while (othern + gnext(othern) != mp) /* find previous */
698 othern += gnext(othern);
699 gnext(othern) = cast_int(f - othern); /* rechain to point to 'f' */
700 *f = *mp; /* copy colliding node into free pos. (mp->next also goes) */
701 if (gnext(mp) != 0) {
702 gnext(f) += cast_int(mp - f); /* correct 'next' */
703 gnext(mp) = 0; /* now 'mp' is free */
704 }
705 setempty(gval(mp));
706 }
707 else { /* colliding node is in its own main position */
708 /* new node will go into free position */
709 if (gnext(mp) != 0)
710 gnext(f) = cast_int((mp + gnext(mp)) - f); /* chain new position */
711 else lua_assert(gnext(f) == 0);
712 gnext(mp) = cast_int(f - mp);
713 mp = f;
714 }
715 }
716 setnodekey(L, mp, key);
717 luaC_barrierback(L, obj2gco(t), key);
718 lua_assert(isempty(gval(mp)));
719 setobj2t(L, gval(mp), value);
720}
721
722
723/*
724** Search function for integers. If integer is inside 'alimit', get it
725** directly from the array part. Otherwise, if 'alimit' is not
726** the real size of the array, the key still can be in the array part.
727** In this case, do the "Xmilia trick" to check whether 'key-1' is
728** smaller than the real size.
729** The trick works as follow: let 'p' be an integer such that
730** '2^(p+1) >= alimit > 2^p', or '2^(p+1) > alimit-1 >= 2^p'.
731** That is, 2^(p+1) is the real size of the array, and 'p' is the highest
732** bit on in 'alimit-1'. What we have to check becomes 'key-1 < 2^(p+1)'.
733** We compute '(key-1) & ~(alimit-1)', which we call 'res'; it will
734** have the 'p' bit cleared. If the key is outside the array, that is,
735** 'key-1 >= 2^(p+1)', then 'res' will have some bit on higher than 'p',
736** therefore it will be larger or equal to 'alimit', and the check
737** will fail. If 'key-1 < 2^(p+1)', then 'res' has no bit on higher than
738** 'p', and as the bit 'p' itself was cleared, 'res' will be smaller
739** than 2^p, therefore smaller than 'alimit', and the check succeeds.
740** As special cases, when 'alimit' is 0 the condition is trivially false,
741** and when 'alimit' is 1 the condition simplifies to 'key-1 < alimit'.
742** If key is 0 or negative, 'res' will have its higher bit on, so that
743** if cannot be smaller than alimit.
744*/
745const TValue *luaH_getint (Table *t, lua_Integer key) {
746 lua_Unsigned alimit = t->alimit;
747 if (l_castS2U(key) - 1u < alimit) /* 'key' in [1, t->alimit]? */
748 return &t->array[key - 1];
749 else if (!isrealasize(t) && /* key still may be in the array part? */
750 (((l_castS2U(key) - 1u) & ~(alimit - 1u)) < alimit)) {
751 t->alimit = cast_uint(key); /* probably '#t' is here now */
752 return &t->array[key - 1];
753 }
754 else { /* key is not in the array part; check the hash */
755 Node *n = hashint(t, key);
756 for (;;) { /* check whether 'key' is somewhere in the chain */
757 if (keyisinteger(n) && keyival(n) == key)
758 return gval(n); /* that's it */
759 else {
760 int nx = gnext(n);
761 if (nx == 0) break;
762 n += nx;
763 }
764 }
765 return &absentkey;
766 }
767}
768
769
770/*
771** search function for short strings
772*/
773const TValue *luaH_getshortstr (Table *t, TString *key) {
774 Node *n = hashstr(t, key);
775 lua_assert(key->tt == LUA_VSHRSTR);
776 for (;;) { /* check whether 'key' is somewhere in the chain */
777 if (keyisshrstr(n) && eqshrstr(keystrval(n), key))
778 return gval(n); /* that's it */
779 else {
780 int nx = gnext(n);
781 if (nx == 0)
782 return &absentkey; /* not found */
783 n += nx;
784 }
785 }
786}
787
788
789const TValue *luaH_getstr (Table *t, TString *key) {
790 if (key->tt == LUA_VSHRSTR)
791 return luaH_getshortstr(t, key);
792 else { /* for long strings, use generic case */
793 TValue ko;
794 setsvalue(cast(lua_State *, NULL), &ko, key);
795 return getgeneric(t, &ko, 0);
796 }
797}
798
799
800/*
801** main search function
802*/
803const TValue *luaH_get (Table *t, const TValue *key) {
804 switch (ttypetag(key)) {
805 case LUA_VSHRSTR: return luaH_getshortstr(t, tsvalue(key));
806 case LUA_VNUMINT: return luaH_getint(t, ivalue(key));
807 case LUA_VNIL: return &absentkey;
808 case LUA_VNUMFLT: {
809 lua_Integer k;
810 if (luaV_flttointeger(fltvalue(key), &k, F2Ieq)) /* integral index? */
811 return luaH_getint(t, k); /* use specialized version */
812 /* else... */
813 } /* FALLTHROUGH */
814 default:
815 return getgeneric(t, key, 0);
816 }
817}
818
819
820/*
821** Finish a raw "set table" operation, where 'slot' is where the value
822** should have been (the result of a previous "get table").
823** Beware: when using this function you probably need to check a GC
824** barrier and invalidate the TM cache.
825*/
826void luaH_finishset (lua_State *L, Table *t, const TValue *key,
827 const TValue *slot, TValue *value) {
828 if (isabstkey(slot))
829 luaH_newkey(L, t, key, value);
830 else
831 setobj2t(L, cast(TValue *, slot), value);
832}
833
834
835/*
836** beware: when using this function you probably need to check a GC
837** barrier and invalidate the TM cache.
838*/
839void luaH_set (lua_State *L, Table *t, const TValue *key, TValue *value) {
840 const TValue *slot = luaH_get(t, key);
841 luaH_finishset(L, t, key, slot, value);
842}
843
844
845void luaH_setint (lua_State *L, Table *t, lua_Integer key, TValue *value) {
846 const TValue *p = luaH_getint(t, key);
847 if (isabstkey(p)) {
848 TValue k;
849 setivalue(&k, key);
850 luaH_newkey(L, t, &k, value);
851 }
852 else
853 setobj2t(L, cast(TValue *, p), value);
854}
855
856
857/*
858** Try to find a boundary in the hash part of table 't'. From the
859** caller, we know that 'j' is zero or present and that 'j + 1' is
860** present. We want to find a larger key that is absent from the
861** table, so that we can do a binary search between the two keys to
862** find a boundary. We keep doubling 'j' until we get an absent index.
863** If the doubling would overflow, we try LUA_MAXINTEGER. If it is
864** absent, we are ready for the binary search. ('j', being max integer,
865** is larger or equal to 'i', but it cannot be equal because it is
866** absent while 'i' is present; so 'j > i'.) Otherwise, 'j' is a
867** boundary. ('j + 1' cannot be a present integer key because it is
868** not a valid integer in Lua.)
869*/
870static lua_Unsigned hash_search (Table *t, lua_Unsigned j) {
871 lua_Unsigned i;
872 if (j == 0) j++; /* the caller ensures 'j + 1' is present */
873 do {
874 i = j; /* 'i' is a present index */
875 if (j <= l_castS2U(LUA_MAXINTEGER) / 2)
876 j *= 2;
877 else {
878 j = LUA_MAXINTEGER;
879 if (isempty(luaH_getint(t, j))) /* t[j] not present? */
880 break; /* 'j' now is an absent index */
881 else /* weird case */
882 return j; /* well, max integer is a boundary... */
883 }
884 } while (!isempty(luaH_getint(t, j))); /* repeat until an absent t[j] */
885 /* i < j && t[i] present && t[j] absent */
886 while (j - i > 1u) { /* do a binary search between them */
887 lua_Unsigned m = (i + j) / 2;
888 if (isempty(luaH_getint(t, m))) j = m;
889 else i = m;
890 }
891 return i;
892}
893
894
895static unsigned int binsearch (const TValue *array, unsigned int i,
896 unsigned int j) {
897 while (j - i > 1u) { /* binary search */
898 unsigned int m = (i + j) / 2;
899 if (isempty(&array[m - 1])) j = m;
900 else i = m;
901 }
902 return i;
903}
904
905
906/*
907** Try to find a boundary in table 't'. (A 'boundary' is an integer index
908** such that t[i] is present and t[i+1] is absent, or 0 if t[1] is absent
909** and 'maxinteger' if t[maxinteger] is present.)
910** (In the next explanation, we use Lua indices, that is, with base 1.
911** The code itself uses base 0 when indexing the array part of the table.)
912** The code starts with 'limit = t->alimit', a position in the array
913** part that may be a boundary.
914**
915** (1) If 't[limit]' is empty, there must be a boundary before it.
916** As a common case (e.g., after 't[#t]=nil'), check whether 'limit-1'
917** is present. If so, it is a boundary. Otherwise, do a binary search
918** between 0 and limit to find a boundary. In both cases, try to
919** use this boundary as the new 'alimit', as a hint for the next call.
920**
921** (2) If 't[limit]' is not empty and the array has more elements
922** after 'limit', try to find a boundary there. Again, try first
923** the special case (which should be quite frequent) where 'limit+1'
924** is empty, so that 'limit' is a boundary. Otherwise, check the
925** last element of the array part. If it is empty, there must be a
926** boundary between the old limit (present) and the last element
927** (absent), which is found with a binary search. (This boundary always
928** can be a new limit.)
929**
930** (3) The last case is when there are no elements in the array part
931** (limit == 0) or its last element (the new limit) is present.
932** In this case, must check the hash part. If there is no hash part
933** or 'limit+1' is absent, 'limit' is a boundary. Otherwise, call
934** 'hash_search' to find a boundary in the hash part of the table.
935** (In those cases, the boundary is not inside the array part, and
936** therefore cannot be used as a new limit.)
937*/
938lua_Unsigned luaH_getn (Table *t) {
939 unsigned int limit = t->alimit;
940 if (limit > 0 && isempty(&t->array[limit - 1])) { /* (1)? */
941 /* there must be a boundary before 'limit' */
942 if (limit >= 2 && !isempty(&t->array[limit - 2])) {
943 /* 'limit - 1' is a boundary; can it be a new limit? */
944 if (ispow2realasize(t) && !ispow2(limit - 1)) {
945 t->alimit = limit - 1;
946 setnorealasize(t); /* now 'alimit' is not the real size */
947 }
948 return limit - 1;
949 }
950 else { /* must search for a boundary in [0, limit] */
951 unsigned int boundary = binsearch(t->array, 0, limit);
952 /* can this boundary represent the real size of the array? */
953 if (ispow2realasize(t) && boundary > luaH_realasize(t) / 2) {
954 t->alimit = boundary; /* use it as the new limit */
955 setnorealasize(t);
956 }
957 return boundary;
958 }
959 }
960 /* 'limit' is zero or present in table */
961 if (!limitequalsasize(t)) { /* (2)? */
962 /* 'limit' > 0 and array has more elements after 'limit' */
963 if (isempty(&t->array[limit])) /* 'limit + 1' is empty? */
964 return limit; /* this is the boundary */
965 /* else, try last element in the array */
966 limit = luaH_realasize(t);
967 if (isempty(&t->array[limit - 1])) { /* empty? */
968 /* there must be a boundary in the array after old limit,
969 and it must be a valid new limit */
970 unsigned int boundary = binsearch(t->array, t->alimit, limit);
971 t->alimit = boundary;
972 return boundary;
973 }
974 /* else, new limit is present in the table; check the hash part */
975 }
976 /* (3) 'limit' is the last element and either is zero or present in table */
977 lua_assert(limit == luaH_realasize(t) &&
978 (limit == 0 || !isempty(&t->array[limit - 1])));
979 if (isdummy(t) || isempty(luaH_getint(t, cast(lua_Integer, limit + 1))))
980 return limit; /* 'limit + 1' is absent */
981 else /* 'limit + 1' is also present */
982 return hash_search(t, limit);
983}
984
985
986
987#if defined(LUA_DEBUG)
988
989/* export these functions for the test library */
990
991Node *luaH_mainposition (const Table *t, const TValue *key) {
992 return mainpositionTV(t, key);
993}
994
995#endif