/src/testdir/build/lua-master/source/ltable.c
Line | Count | Source (jump to first uncovered line) |
1 | | /* |
2 | | ** $Id: ltable.c $ |
3 | | ** Lua tables (hash) |
4 | | ** See Copyright Notice in lua.h |
5 | | */ |
6 | | |
7 | | #define ltable_c |
8 | | #define LUA_CORE |
9 | | |
10 | | #include "lprefix.h" |
11 | | |
12 | | |
13 | | /* |
14 | | ** Implementation of tables (aka arrays, objects, or hash tables). |
15 | | ** Tables keep its elements in two parts: an array part and a hash part. |
16 | | ** Non-negative integer keys are all candidates to be kept in the array |
17 | | ** part. The actual size of the array is the largest 'n' such that |
18 | | ** more than half the slots between 1 and n are in use. |
19 | | ** Hash uses a mix of chained scatter table with Brent's variation. |
20 | | ** A main invariant of these tables is that, if an element is not |
21 | | ** in its main position (i.e. the 'original' position that its hash gives |
22 | | ** to it), then the colliding element is in its own main position. |
23 | | ** Hence even when the load factor reaches 100%, performance remains good. |
24 | | */ |
25 | | |
26 | | #include <math.h> |
27 | | #include <limits.h> |
28 | | |
29 | | #include "lua.h" |
30 | | |
31 | | #include "ldebug.h" |
32 | | #include "ldo.h" |
33 | | #include "lgc.h" |
34 | | #include "lmem.h" |
35 | | #include "lobject.h" |
36 | | #include "lstate.h" |
37 | | #include "lstring.h" |
38 | | #include "ltable.h" |
39 | | #include "lvm.h" |
40 | | |
41 | | |
42 | | /* |
43 | | ** MAXABITS is the largest integer such that MAXASIZE fits in an |
44 | | ** unsigned int. |
45 | | */ |
46 | 3.60M | #define MAXABITS cast_int(sizeof(int) * CHAR_BIT - 1) |
47 | | |
48 | | |
49 | | /* |
50 | | ** MAXASIZE is the maximum size of the array part. It is the minimum |
51 | | ** between 2^MAXABITS and the maximum size that, measured in bytes, |
52 | | ** fits in a 'size_t'. |
53 | | */ |
54 | 35.7k | #define MAXASIZE luaM_limitN(1u << MAXABITS, TValue) |
55 | | |
56 | | /* |
57 | | ** MAXHBITS is the largest integer such that 2^MAXHBITS fits in a |
58 | | ** signed int. |
59 | | */ |
60 | 353k | #define MAXHBITS (MAXABITS - 1) |
61 | | |
62 | | |
63 | | /* |
64 | | ** MAXHSIZE is the maximum size of the hash part. It is the minimum |
65 | | ** between 2^MAXHBITS and the maximum size such that, measured in bytes, |
66 | | ** it fits in a 'size_t'. |
67 | | */ |
68 | 176k | #define MAXHSIZE luaM_limitN(1u << MAXHBITS, Node) |
69 | | |
70 | | |
71 | | /* |
72 | | ** When the original hash value is good, hashing by a power of 2 |
73 | | ** avoids the cost of '%'. |
74 | | */ |
75 | 7.52M | #define hashpow2(t,n) (gnode(t, lmod((n), sizenode(t)))) |
76 | | |
77 | | /* |
78 | | ** for other types, it is better to avoid modulo by power of 2, as |
79 | | ** they can have many 2 factors. |
80 | | */ |
81 | 680k | #define hashmod(t,n) (gnode(t, ((n) % ((sizenode(t)-1)|1)))) |
82 | | |
83 | | |
84 | 7.43M | #define hashstr(t,str) hashpow2(t, (str)->hash) |
85 | 10.9k | #define hashboolean(t,p) hashpow2(t, p) |
86 | | |
87 | | |
88 | 22.0k | #define hashpointer(t,p) hashmod(t, point2uint(p)) |
89 | | |
90 | | |
91 | | #define dummynode (&dummynode_) |
92 | | |
93 | | static const Node dummynode_ = { |
94 | | {{NULL}, LUA_VEMPTY, /* value's value and type */ |
95 | | LUA_VNIL, 0, {NULL}} /* key type, next, and key value */ |
96 | | }; |
97 | | |
98 | | |
99 | | static const TValue absentkey = {ABSTKEYCONSTANT}; |
100 | | |
101 | | |
102 | | /* |
103 | | ** Hash for integers. To allow a good hash, use the remainder operator |
104 | | ** ('%'). If integer fits as a non-negative int, compute an int |
105 | | ** remainder, which is faster. Otherwise, use an unsigned-integer |
106 | | ** remainder, which uses all bits and ensures a non-negative result. |
107 | | */ |
108 | 466k | static Node *hashint (const Table *t, lua_Integer i) { |
109 | 466k | lua_Unsigned ui = l_castS2U(i); |
110 | 466k | if (ui <= cast_uint(INT_MAX)) |
111 | 397k | return hashmod(t, cast_int(ui)); |
112 | 68.5k | else |
113 | 68.5k | return hashmod(t, ui); |
114 | 466k | } |
115 | | |
116 | | |
117 | | /* |
118 | | ** Hash for floating-point numbers. |
119 | | ** The main computation should be just |
120 | | ** n = frexp(n, &i); return (n * INT_MAX) + i |
121 | | ** but there are some numerical subtleties. |
122 | | ** In a two-complement representation, INT_MAX does not has an exact |
123 | | ** representation as a float, but INT_MIN does; because the absolute |
124 | | ** value of 'frexp' is smaller than 1 (unless 'n' is inf/NaN), the |
125 | | ** absolute value of the product 'frexp * -INT_MIN' is smaller or equal |
126 | | ** to INT_MAX. Next, the use of 'unsigned int' avoids overflows when |
127 | | ** adding 'i'; the use of '~u' (instead of '-u') avoids problems with |
128 | | ** INT_MIN. |
129 | | */ |
130 | | #if !defined(l_hashfloat) |
131 | 192k | static int l_hashfloat (lua_Number n) { |
132 | 192k | int i; |
133 | 192k | lua_Integer ni; |
134 | 192k | n = l_mathop(frexp)(n, &i) * -cast_num(INT_MIN); |
135 | 192k | if (!lua_numbertointeger(n, &ni)) { /* is 'n' inf/-inf/NaN? */ |
136 | 72.2k | lua_assert(luai_numisnan(n) || l_mathop(fabs)(n) == cast_num(HUGE_VAL)); |
137 | 72.2k | return 0; |
138 | 72.2k | } |
139 | 119k | else { /* normal case */ |
140 | 119k | unsigned int u = cast_uint(i) + cast_uint(ni); |
141 | 119k | return cast_int(u <= cast_uint(INT_MAX) ? u : ~u); |
142 | 119k | } |
143 | 192k | } |
144 | | #endif |
145 | | |
146 | | |
147 | | /* |
148 | | ** returns the 'main' position of an element in a table (that is, |
149 | | ** the index of its hash value). |
150 | | */ |
151 | 2.19M | static Node *mainpositionTV (const Table *t, const TValue *key) { |
152 | 2.19M | switch (ttypetag(key)) { |
153 | 90.6k | case LUA_VNUMINT: { |
154 | 90.6k | lua_Integer i = ivalue(key); |
155 | 0 | return hashint(t, i); |
156 | 90.6k | } |
157 | 192k | case LUA_VNUMFLT: { |
158 | 192k | lua_Number n = fltvalue(key); |
159 | 192k | return hashmod(t, l_hashfloat(n)); |
160 | 192k | } |
161 | 1.79M | case LUA_VSHRSTR: { |
162 | 3.59M | TString *ts = tsvalue(key); |
163 | 3.59M | return hashstr(t, ts); |
164 | 3.59M | } |
165 | 79.3k | case LUA_VLNGSTR: { |
166 | 158k | TString *ts = tsvalue(key); |
167 | 158k | return hashpow2(t, luaS_hashlongstr(ts)); |
168 | 158k | } |
169 | 8.14k | case LUA_VFALSE: |
170 | 8.14k | return hashboolean(t, 0); |
171 | 2.82k | case LUA_VTRUE: |
172 | 2.82k | return hashboolean(t, 1); |
173 | 0 | case LUA_VLIGHTUSERDATA: { |
174 | 0 | void *p = pvalue(key); |
175 | 0 | return hashpointer(t, p); |
176 | 0 | } |
177 | 414 | case LUA_VLCF: { |
178 | 414 | lua_CFunction f = fvalue(key); |
179 | 414 | return hashpointer(t, f); |
180 | 414 | } |
181 | 21.6k | default: { |
182 | 21.6k | GCObject *o = gcvalue(key); |
183 | 21.6k | return hashpointer(t, o); |
184 | 21.6k | } |
185 | 2.19M | } |
186 | 2.19M | } |
187 | | |
188 | | |
189 | 494k | l_sinline Node *mainpositionfromnode (const Table *t, Node *nd) { |
190 | 494k | TValue key; |
191 | 494k | getnodekey(cast(lua_State *, NULL), &key, nd); |
192 | 494k | return mainpositionTV(t, &key); |
193 | 494k | } |
194 | | |
195 | | |
196 | | /* |
197 | | ** Check whether key 'k1' is equal to the key in node 'n2'. This |
198 | | ** equality is raw, so there are no metamethods. Floats with integer |
199 | | ** values have been normalized, so integers cannot be equal to |
200 | | ** floats. It is assumed that 'eqshrstr' is simply pointer equality, so |
201 | | ** that short strings are handled in the default case. |
202 | | ** A true 'deadok' means to accept dead keys as equal to their original |
203 | | ** values. All dead keys are compared in the default case, by pointer |
204 | | ** identity. (Only collectable objects can produce dead keys.) Note that |
205 | | ** dead long strings are also compared by identity. |
206 | | ** Once a key is dead, its corresponding value may be collected, and |
207 | | ** then another value can be created with the same address. If this |
208 | | ** other value is given to 'next', 'equalkey' will signal a false |
209 | | ** positive. In a regular traversal, this situation should never happen, |
210 | | ** as all keys given to 'next' came from the table itself, and therefore |
211 | | ** could not have been collected. Outside a regular traversal, we |
212 | | ** have garbage in, garbage out. What is relevant is that this false |
213 | | ** positive does not break anything. (In particular, 'next' will return |
214 | | ** some other valid item on the table or nil.) |
215 | | */ |
216 | 345k | static int equalkey (const TValue *k1, const Node *n2, int deadok) { |
217 | 345k | if ((rawtt(k1) != keytt(n2)) && /* not the same variants? */ |
218 | 345k | !(deadok && keyisdead(n2) && iscollectable(k1))) |
219 | 109k | return 0; /* cannot be same key */ |
220 | 236k | switch (keytt(n2)) { |
221 | 1.60k | case LUA_VNIL: case LUA_VFALSE: case LUA_VTRUE: |
222 | 1.60k | return 1; |
223 | 0 | case LUA_VNUMINT: |
224 | 0 | return (ivalue(k1) == keyival(n2)); |
225 | 135k | case LUA_VNUMFLT: |
226 | 135k | return luai_numeq(fltvalue(k1), fltvalueraw(keyval(n2))); |
227 | 0 | case LUA_VLIGHTUSERDATA: |
228 | 0 | return pvalue(k1) == pvalueraw(keyval(n2)); |
229 | 0 | case LUA_VLCF: |
230 | 0 | return fvalue(k1) == fvalueraw(keyval(n2)); |
231 | 97.7k | case ctb(LUA_VLNGSTR): |
232 | 195k | return luaS_eqlngstr(tsvalue(k1), keystrval(n2)); |
233 | 1.36k | default: |
234 | 1.36k | return gcvalue(k1) == gcvalueraw(keyval(n2)); |
235 | 236k | } |
236 | 236k | } |
237 | | |
238 | | |
239 | | /* |
240 | | ** True if value of 'alimit' is equal to the real size of the array |
241 | | ** part of table 't'. (Otherwise, the array part must be larger than |
242 | | ** 'alimit'.) |
243 | | */ |
244 | 1.56M | #define limitequalsasize(t) (isrealasize(t) || ispow2((t)->alimit)) |
245 | | |
246 | | |
247 | | /* |
248 | | ** Returns the real size of the 'array' array |
249 | | */ |
250 | 839k | LUAI_FUNC unsigned int luaH_realasize (const Table *t) { |
251 | 839k | if (limitequalsasize(t)) |
252 | 837k | return t->alimit; /* this is the size */ |
253 | 2.27k | else { |
254 | 2.27k | unsigned int size = t->alimit; |
255 | | /* compute the smallest power of 2 not smaller than 'n' */ |
256 | 2.27k | size |= (size >> 1); |
257 | 2.27k | size |= (size >> 2); |
258 | 2.27k | size |= (size >> 4); |
259 | 2.27k | size |= (size >> 8); |
260 | 2.27k | #if (UINT_MAX >> 14) > 3 /* unsigned int has more than 16 bits */ |
261 | 2.27k | size |= (size >> 16); |
262 | | #if (UINT_MAX >> 30) > 3 |
263 | | size |= (size >> 32); /* unsigned int has more than 32 bits */ |
264 | | #endif |
265 | 2.27k | #endif |
266 | 2.27k | size++; |
267 | 2.27k | lua_assert(ispow2(size) && size/2 < t->alimit && t->alimit < size); |
268 | 2.27k | return size; |
269 | 2.27k | } |
270 | 839k | } |
271 | | |
272 | | |
273 | | /* |
274 | | ** Check whether real size of the array is a power of 2. |
275 | | ** (If it is not, 'alimit' cannot be changed to any other value |
276 | | ** without changing the real size.) |
277 | | */ |
278 | 3.25k | static int ispow2realasize (const Table *t) { |
279 | 3.25k | return (!isrealasize(t) || ispow2(t->alimit)); |
280 | 3.25k | } |
281 | | |
282 | | |
283 | 301k | static unsigned int setlimittosize (Table *t) { |
284 | 301k | t->alimit = luaH_realasize(t); |
285 | 301k | setrealasize(t); |
286 | 301k | return t->alimit; |
287 | 301k | } |
288 | | |
289 | | |
290 | 99.8k | #define limitasasize(t) check_exp(isrealasize(t), t->alimit) |
291 | | |
292 | | |
293 | | |
294 | | /* |
295 | | ** "Generic" get version. (Not that generic: not valid for integers, |
296 | | ** which may be in array part, nor for floats with integral values.) |
297 | | ** See explanation about 'deadok' in function 'equalkey'. |
298 | | */ |
299 | 325k | static const TValue *getgeneric (Table *t, const TValue *key, int deadok) { |
300 | 325k | Node *n = mainpositionTV(t, key); |
301 | 464k | for (;;) { /* check whether 'key' is somewhere in the chain */ |
302 | 464k | if (equalkey(key, n, deadok)) |
303 | 269k | return gval(n); /* that's it */ |
304 | 195k | else { |
305 | 195k | int nx = gnext(n); |
306 | 195k | if (nx == 0) |
307 | 56.8k | return &absentkey; /* not found */ |
308 | 138k | n += nx; |
309 | 138k | } |
310 | 464k | } |
311 | 325k | } |
312 | | |
313 | | |
314 | | /* |
315 | | ** returns the index for 'k' if 'k' is an appropriate key to live in |
316 | | ** the array part of a table, 0 otherwise. |
317 | | */ |
318 | 35.7k | static unsigned int arrayindex (lua_Integer k) { |
319 | 35.7k | if (l_castS2U(k) - 1u < MAXASIZE) /* 'k' in [1, MAXASIZE]? */ |
320 | 17.7k | return cast_uint(k); /* 'key' is an appropriate array index */ |
321 | 18.0k | else |
322 | 18.0k | return 0; |
323 | 35.7k | } |
324 | | |
325 | | |
326 | | /* |
327 | | ** returns the index of a 'key' for table traversals. First goes all |
328 | | ** elements in the array part, then elements in the hash part. The |
329 | | ** beginning of a traversal is signaled by 0. |
330 | | */ |
331 | | static unsigned int findindex (lua_State *L, Table *t, TValue *key, |
332 | 260 | unsigned int asize) { |
333 | 260 | unsigned int i; |
334 | 260 | if (ttisnil(key)) return 0; /* first iteration */ |
335 | 248 | i = ttisinteger(key) ? arrayindex(ivalue(key)) : 0; |
336 | 248 | if (i - 1u < asize) /* is 'key' inside array part? */ |
337 | 0 | return i; /* yes; that's the index */ |
338 | 248 | else { |
339 | 248 | const TValue *n = getgeneric(t, key, 1); |
340 | 248 | if (l_unlikely(isabstkey(n))) |
341 | 0 | luaG_runerror(L, "invalid key to 'next'"); /* key not found */ |
342 | 248 | i = cast_int(nodefromval(n) - gnode(t, 0)); /* key index in hash table */ |
343 | | /* hash elements are numbered after array ones */ |
344 | 248 | return (i + 1) + asize; |
345 | 248 | } |
346 | 248 | } |
347 | | |
348 | | |
349 | 260 | int luaH_next (lua_State *L, Table *t, StkId key) { |
350 | 260 | unsigned int asize = luaH_realasize(t); |
351 | 260 | unsigned int i = findindex(L, t, s2v(key), asize); /* find original key */ |
352 | 260 | for (; i < asize; i++) { /* try first array part */ |
353 | 0 | if (!isempty(&t->array[i])) { /* a non-empty entry? */ |
354 | 0 | setivalue(s2v(key), i + 1); |
355 | 0 | setobj2s(L, key + 1, &t->array[i]); |
356 | 0 | return 1; |
357 | 0 | } |
358 | 0 | } |
359 | 436 | for (i -= asize; cast_int(i) < sizenode(t); i++) { /* hash part */ |
360 | 428 | if (!isempty(gval(gnode(t, i)))) { /* a non-empty entry? */ |
361 | 252 | Node *n = gnode(t, i); |
362 | 252 | getnodekey(L, s2v(key), n); |
363 | 252 | setobj2s(L, key + 1, gval(n)); |
364 | 252 | return 1; |
365 | 252 | } |
366 | 428 | } |
367 | 8 | return 0; /* no more elements */ |
368 | 260 | } |
369 | | |
370 | | |
371 | 350k | static void freehash (lua_State *L, Table *t) { |
372 | 350k | if (!isdummy(t)) |
373 | 176k | luaM_freearray(L, t->node, cast_sizet(sizenode(t))); |
374 | 350k | } |
375 | | |
376 | | |
377 | | /* |
378 | | ** {============================================================= |
379 | | ** Rehash |
380 | | ** ============================================================== |
381 | | */ |
382 | | |
383 | | /* |
384 | | ** Compute the optimal size for the array part of table 't'. 'nums' is a |
385 | | ** "count array" where 'nums[i]' is the number of integers in the table |
386 | | ** between 2^(i - 1) + 1 and 2^i. 'pna' enters with the total number of |
387 | | ** integer keys in the table and leaves with the number of keys that |
388 | | ** will go to the array part; return the optimal size. (The condition |
389 | | ** 'twotoi > 0' in the for loop stops the loop if 'twotoi' overflows.) |
390 | | */ |
391 | 99.8k | static unsigned int computesizes (unsigned int nums[], unsigned int *pna) { |
392 | 99.8k | int i; |
393 | 99.8k | unsigned int twotoi; /* 2^i (candidate for optimal size) */ |
394 | 99.8k | unsigned int a = 0; /* number of elements smaller than 2^i */ |
395 | 99.8k | unsigned int na = 0; /* number of elements to go to array part */ |
396 | 99.8k | unsigned int optimal = 0; /* optimal size for array part */ |
397 | | /* loop while keys can fill more than half of total size */ |
398 | 99.8k | for (i = 0, twotoi = 1; |
399 | 143k | twotoi > 0 && *pna > twotoi / 2; |
400 | 99.8k | i++, twotoi *= 2) { |
401 | 43.6k | a += nums[i]; |
402 | 43.6k | if (a > twotoi/2) { /* more than half elements present? */ |
403 | 32.4k | optimal = twotoi; /* optimal size (till now) */ |
404 | 32.4k | na = a; /* all elements up to 'optimal' will go to array part */ |
405 | 32.4k | } |
406 | 43.6k | } |
407 | 99.8k | lua_assert((optimal == 0 || optimal / 2 < na) && na <= optimal); |
408 | 99.8k | *pna = na; |
409 | 99.8k | return optimal; |
410 | 99.8k | } |
411 | | |
412 | | |
413 | 35.7k | static int countint (lua_Integer key, unsigned int *nums) { |
414 | 35.7k | unsigned int k = arrayindex(key); |
415 | 35.7k | if (k != 0) { /* is 'key' an appropriate array index? */ |
416 | 17.7k | nums[luaO_ceillog2(k)]++; /* count as such */ |
417 | 17.7k | return 1; |
418 | 17.7k | } |
419 | 18.0k | else |
420 | 18.0k | return 0; |
421 | 35.7k | } |
422 | | |
423 | | |
424 | | /* |
425 | | ** Count keys in array part of table 't': Fill 'nums[i]' with |
426 | | ** number of keys that will go into corresponding slice and return |
427 | | ** total number of non-nil keys. |
428 | | */ |
429 | 99.8k | static unsigned int numusearray (const Table *t, unsigned int *nums) { |
430 | 99.8k | int lg; |
431 | 99.8k | unsigned int ttlg; /* 2^lg */ |
432 | 99.8k | unsigned int ause = 0; /* summation of 'nums' */ |
433 | 99.8k | unsigned int i = 1; /* count to traverse all array keys */ |
434 | 99.8k | unsigned int asize = limitasasize(t); /* real array size */ |
435 | | /* traverse each slice */ |
436 | 135k | for (lg = 0, ttlg = 1; lg <= MAXABITS; lg++, ttlg *= 2) { |
437 | 135k | unsigned int lc = 0; /* counter */ |
438 | 135k | unsigned int lim = ttlg; |
439 | 135k | if (lim > asize) { |
440 | 99.9k | lim = asize; /* adjust upper limit */ |
441 | 99.9k | if (i > lim) |
442 | 99.8k | break; /* no more elements to count */ |
443 | 99.9k | } |
444 | | /* count elements in range (2^(lg - 1), 2^lg] */ |
445 | 267k | for (; i <= lim; i++) { |
446 | 232k | if (!isempty(&t->array[i-1])) |
447 | 57.4k | lc++; |
448 | 232k | } |
449 | 35.1k | nums[lg] += lc; |
450 | 35.1k | ause += lc; |
451 | 35.1k | } |
452 | 99.8k | return ause; |
453 | 99.8k | } |
454 | | |
455 | | |
456 | 102k | static int numusehash (const Table *t, unsigned int *nums, unsigned int *pna) { |
457 | 102k | int totaluse = 0; /* total number of elements */ |
458 | 102k | int ause = 0; /* elements added to 'nums' (can go to array part) */ |
459 | 102k | int i = sizenode(t); |
460 | 718k | while (i--) { |
461 | 616k | Node *n = &t->node[i]; |
462 | 616k | if (!isempty(gval(n))) { |
463 | 587k | if (keyisinteger(n)) |
464 | 28.0k | ause += countint(keyival(n), nums); |
465 | 587k | totaluse++; |
466 | 587k | } |
467 | 616k | } |
468 | 102k | *pna += ause; |
469 | 102k | return totaluse; |
470 | 102k | } |
471 | | |
472 | | |
473 | | /* |
474 | | ** Creates an array for the hash part of a table with the given |
475 | | ** size, or reuses the dummy node if size is zero. |
476 | | ** The computation for size overflow is in two steps: the first |
477 | | ** comparison ensures that the shift in the second one does not |
478 | | ** overflow. |
479 | | */ |
480 | 350k | static void setnodevector (lua_State *L, Table *t, unsigned int size) { |
481 | 350k | if (size == 0) { /* no elements to hash part? */ |
482 | 174k | t->node = cast(Node *, dummynode); /* use common 'dummynode' */ |
483 | 174k | t->lsizenode = 0; |
484 | 174k | t->lastfree = NULL; /* signal that it is using dummy node */ |
485 | 174k | } |
486 | 176k | else { |
487 | 176k | int i; |
488 | 176k | int lsize = luaO_ceillog2(size); |
489 | 176k | if (lsize > MAXHBITS || (1u << lsize) > MAXHSIZE) |
490 | 0 | luaG_runerror(L, "table overflow"); |
491 | 176k | size = twoto(lsize); |
492 | 176k | t->node = luaM_newvector(L, size, Node); |
493 | 1.96M | for (i = 0; i < cast_int(size); i++) { |
494 | 1.78M | Node *n = gnode(t, i); |
495 | 1.78M | gnext(n) = 0; |
496 | 1.78M | setnilkey(n); |
497 | 1.78M | setempty(gval(n)); |
498 | 1.78M | } |
499 | 176k | t->lsizenode = cast_byte(lsize); |
500 | 176k | t->lastfree = gnode(t, size); /* all positions are free */ |
501 | 176k | } |
502 | 350k | } |
503 | | |
504 | | |
505 | | /* |
506 | | ** (Re)insert all elements from the hash part of 'ot' into table 't'. |
507 | | */ |
508 | 196k | static void reinsert (lua_State *L, Table *ot, Table *t) { |
509 | 196k | int j; |
510 | 196k | int size = sizenode(ot); |
511 | 855k | for (j = 0; j < size; j++) { |
512 | 659k | Node *old = gnode(ot, j); |
513 | 659k | if (!isempty(gval(old))) { |
514 | | /* doesn't need barrier/invalidate cache, as entry was |
515 | | already present in the table */ |
516 | 534k | TValue k; |
517 | 534k | getnodekey(L, &k, old); |
518 | 534k | luaH_set(L, t, &k, gval(old)); |
519 | 534k | } |
520 | 659k | } |
521 | 196k | } |
522 | | |
523 | | |
524 | | /* |
525 | | ** Exchange the hash part of 't1' and 't2'. |
526 | | */ |
527 | 206k | static void exchangehashpart (Table *t1, Table *t2) { |
528 | 206k | lu_byte lsizenode = t1->lsizenode; |
529 | 206k | Node *node = t1->node; |
530 | 206k | Node *lastfree = t1->lastfree; |
531 | 206k | t1->lsizenode = t2->lsizenode; |
532 | 206k | t1->node = t2->node; |
533 | 206k | t1->lastfree = t2->lastfree; |
534 | 206k | t2->lsizenode = lsizenode; |
535 | 206k | t2->node = node; |
536 | 206k | t2->lastfree = lastfree; |
537 | 206k | } |
538 | | |
539 | | |
540 | | /* |
541 | | ** Resize table 't' for the new given sizes. Both allocations (for |
542 | | ** the hash part and for the array part) can fail, which creates some |
543 | | ** subtleties. If the first allocation, for the hash part, fails, an |
544 | | ** error is raised and that is it. Otherwise, it copies the elements from |
545 | | ** the shrinking part of the array (if it is shrinking) into the new |
546 | | ** hash. Then it reallocates the array part. If that fails, the table |
547 | | ** is in its original state; the function frees the new hash part and then |
548 | | ** raises the allocation error. Otherwise, it sets the new hash part |
549 | | ** into the table, initializes the new part of the array (if any) with |
550 | | ** nils and reinserts the elements of the old hash back into the new |
551 | | ** parts of the table. |
552 | | */ |
553 | | void luaH_resize (lua_State *L, Table *t, unsigned int newasize, |
554 | 199k | unsigned int nhsize) { |
555 | 199k | unsigned int i; |
556 | 199k | Table newt; /* to keep the new hash part */ |
557 | 199k | unsigned int oldasize = setlimittosize(t); |
558 | 199k | TValue *newarray; |
559 | | /* create new hash part with appropriate size into 'newt' */ |
560 | 199k | setnodevector(L, &newt, nhsize); |
561 | 199k | if (newasize < oldasize) { /* will array shrink? */ |
562 | 3.77k | t->alimit = newasize; /* pretend array has new size... */ |
563 | 3.77k | exchangehashpart(t, &newt); /* and new hash */ |
564 | | /* re-insert into the new hash the elements from vanishing slice */ |
565 | 204k | for (i = newasize; i < oldasize; i++) { |
566 | 201k | if (!isempty(&t->array[i])) |
567 | 26.6k | luaH_setint(L, t, i + 1, &t->array[i]); |
568 | 201k | } |
569 | 3.77k | t->alimit = oldasize; /* restore current size... */ |
570 | 3.77k | exchangehashpart(t, &newt); /* and hash (in case of errors) */ |
571 | 3.77k | } |
572 | | /* allocate new array */ |
573 | 199k | newarray = luaM_reallocvector(L, t->array, oldasize, newasize, TValue); |
574 | 199k | if (l_unlikely(newarray == NULL && newasize > 0)) { /* allocation failed? */ |
575 | 0 | freehash(L, &newt); /* release new hash part */ |
576 | 0 | luaM_error(L); /* raise error (with array unchanged) */ |
577 | 0 | } |
578 | | /* allocation ok; initialize new part of the array */ |
579 | 199k | exchangehashpart(t, &newt); /* 't' has the new hash ('newt' has the old) */ |
580 | 199k | t->array = newarray; /* set new array part */ |
581 | 199k | t->alimit = newasize; |
582 | 596k | for (i = oldasize; i < newasize; i++) /* clear new slice of the array */ |
583 | 397k | setempty(&t->array[i]); |
584 | | /* re-insert elements from old hash part into new parts */ |
585 | 199k | reinsert(L, &newt, t); /* 'newt' now has the old hash */ |
586 | 199k | freehash(L, &newt); /* free old hash part */ |
587 | 199k | } |
588 | | |
589 | | |
590 | 494 | void luaH_resizearray (lua_State *L, Table *t, unsigned int nasize) { |
591 | 494 | int nsize = allocsizenode(t); |
592 | 494 | luaH_resize(L, t, nasize, nsize); |
593 | 494 | } |
594 | | |
595 | | /* |
596 | | ** nums[i] = number of keys 'k' where 2^(i - 1) < k <= 2^i |
597 | | */ |
598 | 99.8k | static void rehash (lua_State *L, Table *t, const TValue *ek) { |
599 | 99.8k | unsigned int asize; /* optimal size for array part */ |
600 | 99.8k | unsigned int na; /* number of keys in the array part */ |
601 | 99.8k | unsigned int nums[MAXABITS + 1]; |
602 | 99.8k | int i; |
603 | 99.8k | int totaluse; |
604 | 3.29M | for (i = 0; i <= MAXABITS; i++) nums[i] = 0; /* reset counts */ |
605 | 99.8k | setlimittosize(t); |
606 | 99.8k | na = numusearray(t, nums); /* count keys in array part */ |
607 | 99.8k | totaluse = na; /* all those keys are integer keys */ |
608 | 99.8k | totaluse += numusehash(t, nums, &na); /* count keys in hash part */ |
609 | | /* count extra key */ |
610 | 99.8k | if (ttisinteger(ek)) |
611 | 7.39k | na += countint(ivalue(ek), nums); |
612 | 99.8k | totaluse++; |
613 | | /* compute new size for array part */ |
614 | 99.8k | asize = computesizes(nums, &na); |
615 | | /* resize the table to new computed sizes */ |
616 | 99.8k | luaH_resize(L, t, asize, totaluse - na); |
617 | 99.8k | } |
618 | | |
619 | | |
620 | | |
621 | | /* |
622 | | ** }============================================================= |
623 | | */ |
624 | | |
625 | | |
626 | 140k | Table *luaH_new (lua_State *L) { |
627 | 140k | GCObject *o = luaC_newobj(L, LUA_VTABLE, sizeof(Table)); |
628 | 140k | Table *t = gco2t(o); |
629 | 0 | t->metatable = NULL; |
630 | 140k | t->flags = cast_byte(maskflags); /* table has no metamethod fields */ |
631 | 140k | t->array = NULL; |
632 | 140k | t->alimit = 0; |
633 | 140k | setnodevector(L, t, 0); |
634 | 140k | return t; |
635 | 140k | } |
636 | | |
637 | | |
638 | 151k | void luaH_free (lua_State *L, Table *t) { |
639 | 151k | freehash(L, t); |
640 | 151k | luaM_freearray(L, t->array, luaH_realasize(t)); |
641 | 151k | luaM_free(L, t); |
642 | 151k | } |
643 | | |
644 | | |
645 | 631k | static Node *getfreepos (Table *t) { |
646 | 631k | if (!isdummy(t)) { |
647 | 1.09M | while (t->lastfree > t->node) { |
648 | 1.02M | t->lastfree--; |
649 | 1.02M | if (keyisnil(t->lastfree)) |
650 | 529k | return t->lastfree; |
651 | 1.02M | } |
652 | 602k | } |
653 | 102k | return NULL; /* could not find a free place */ |
654 | 631k | } |
655 | | |
656 | | |
657 | | |
658 | | /* |
659 | | ** inserts a new key into a hash table; first, check whether key's main |
660 | | ** position is free. If not, check whether colliding node is in its main |
661 | | ** position or not: if it is not, move colliding node to an empty place and |
662 | | ** put new key in its main position; otherwise (colliding node is in its main |
663 | | ** position), new key goes to an empty position. |
664 | | */ |
665 | | static void luaH_newkey (lua_State *L, Table *t, const TValue *key, |
666 | 1.45M | TValue *value) { |
667 | 1.45M | Node *mp; |
668 | 1.45M | TValue aux; |
669 | 1.45M | if (l_unlikely(ttisnil(key))) |
670 | 16 | luaG_runerror(L, "table index is nil"); |
671 | 1.45M | else if (ttisfloat(key)) { |
672 | 31.0k | lua_Number f = fltvalue(key); |
673 | 0 | lua_Integer k; |
674 | 31.0k | if (luaV_flttointeger(f, &k, F2Ieq)) { /* does key fit in an integer? */ |
675 | 4.55k | setivalue(&aux, k); |
676 | 4.55k | key = &aux; /* insert it as an integer */ |
677 | 4.55k | } |
678 | 26.4k | else if (l_unlikely(luai_numisnan(f))) |
679 | 0 | luaG_runerror(L, "table index is NaN"); |
680 | 31.0k | } |
681 | 1.45M | if (ttisnil(value)) |
682 | 7.32k | return; /* do not insert nil values */ |
683 | 1.44M | mp = mainpositionTV(t, key); |
684 | 1.44M | if (!isempty(gval(mp)) || isdummy(t)) { /* main position is taken? */ |
685 | 594k | Node *othern; |
686 | 594k | Node *f = getfreepos(t); /* get a free place */ |
687 | 594k | if (f == NULL) { /* cannot find a free place? */ |
688 | 99.8k | rehash(L, t, key); /* grow table */ |
689 | | /* whatever called 'newkey' takes care of TM cache */ |
690 | 99.8k | luaH_set(L, t, key, value); /* insert key into grown table */ |
691 | 99.8k | return; |
692 | 99.8k | } |
693 | 494k | lua_assert(!isdummy(t)); |
694 | 494k | othern = mainpositionfromnode(t, mp); |
695 | 494k | if (othern != mp) { /* is colliding node out of its main position? */ |
696 | | /* yes; move colliding node into free position */ |
697 | 125k | while (othern + gnext(othern) != mp) /* find previous */ |
698 | 19.2k | othern += gnext(othern); |
699 | 106k | gnext(othern) = cast_int(f - othern); /* rechain to point to 'f' */ |
700 | 106k | *f = *mp; /* copy colliding node into free pos. (mp->next also goes) */ |
701 | 106k | if (gnext(mp) != 0) { |
702 | 16.7k | gnext(f) += cast_int(mp - f); /* correct 'next' */ |
703 | 16.7k | gnext(mp) = 0; /* now 'mp' is free */ |
704 | 16.7k | } |
705 | 106k | setempty(gval(mp)); |
706 | 106k | } |
707 | 387k | else { /* colliding node is in its own main position */ |
708 | | /* new node will go into free position */ |
709 | 387k | if (gnext(mp) != 0) |
710 | 82.8k | gnext(f) = cast_int((mp + gnext(mp)) - f); /* chain new position */ |
711 | 387k | else lua_assert(gnext(f) == 0); |
712 | 387k | gnext(mp) = cast_int(f - mp); |
713 | 387k | mp = f; |
714 | 387k | } |
715 | 494k | } |
716 | 1.34M | setnodekey(L, mp, key); |
717 | 1.34M | luaC_barrierback(L, obj2gco(t), key); |
718 | 1.34M | lua_assert(isempty(gval(mp))); |
719 | 1.34M | setobj2t(L, gval(mp), value); |
720 | 1.34M | } |
721 | | |
722 | | |
723 | | /* |
724 | | ** Search function for integers. If integer is inside 'alimit', get it |
725 | | ** directly from the array part. Otherwise, if 'alimit' is not equal to |
726 | | ** the real size of the array, key still can be in the array part. In |
727 | | ** this case, try to avoid a call to 'luaH_realasize' when key is just |
728 | | ** one more than the limit (so that it can be incremented without |
729 | | ** changing the real size of the array). |
730 | | */ |
731 | 414k | const TValue *luaH_getint (Table *t, lua_Integer key) { |
732 | 414k | if (l_castS2U(key) - 1u < t->alimit) /* 'key' in [1, t->alimit]? */ |
733 | 57.3k | return &t->array[key - 1]; |
734 | 357k | else if (!limitequalsasize(t) && /* key still may be in the array part? */ |
735 | 357k | (l_castS2U(key) == t->alimit + 1 || |
736 | 772 | l_castS2U(key) - 1u < luaH_realasize(t))) { |
737 | 16 | t->alimit = cast_uint(key); /* probably '#t' is here now */ |
738 | 16 | return &t->array[key - 1]; |
739 | 16 | } |
740 | 357k | else { |
741 | 357k | Node *n = hashint(t, key); |
742 | 440k | for (;;) { /* check whether 'key' is somewhere in the chain */ |
743 | 440k | if (keyisinteger(n) && keyival(n) == key) |
744 | 263k | return gval(n); /* that's it */ |
745 | 176k | else { |
746 | 176k | int nx = gnext(n); |
747 | 176k | if (nx == 0) break; |
748 | 82.9k | n += nx; |
749 | 82.9k | } |
750 | 440k | } |
751 | 93.6k | return &absentkey; |
752 | 357k | } |
753 | 414k | } |
754 | | |
755 | | |
756 | | /* |
757 | | ** search function for short strings |
758 | | */ |
759 | 5.63M | const TValue *luaH_getshortstr (Table *t, TString *key) { |
760 | 5.63M | Node *n = hashstr(t, key); |
761 | 5.63M | lua_assert(key->tt == LUA_VSHRSTR); |
762 | 7.02M | for (;;) { /* check whether 'key' is somewhere in the chain */ |
763 | 7.02M | if (keyisshrstr(n) && eqshrstr(keystrval(n), key)) |
764 | 3.97M | return gval(n); /* that's it */ |
765 | 3.04M | else { |
766 | 3.04M | int nx = gnext(n); |
767 | 3.04M | if (nx == 0) |
768 | 1.65M | return &absentkey; /* not found */ |
769 | 1.38M | n += nx; |
770 | 1.38M | } |
771 | 7.02M | } |
772 | 5.63M | } |
773 | | |
774 | | |
775 | 2.87M | const TValue *luaH_getstr (Table *t, TString *key) { |
776 | 2.87M | if (key->tt == LUA_VSHRSTR) |
777 | 2.83M | return luaH_getshortstr(t, key); |
778 | 34.2k | else { /* for long strings, use generic case */ |
779 | 34.2k | TValue ko; |
780 | 34.2k | setsvalue(cast(lua_State *, NULL), &ko, key); |
781 | 34.2k | return getgeneric(t, &ko, 0); |
782 | 34.2k | } |
783 | 2.87M | } |
784 | | |
785 | | |
786 | | /* |
787 | | ** main search function |
788 | | */ |
789 | 2.42M | const TValue *luaH_get (Table *t, const TValue *key) { |
790 | 2.42M | switch (ttypetag(key)) { |
791 | 1.96M | case LUA_VSHRSTR: return luaH_getshortstr(t, tsvalue(key)); |
792 | 233k | case LUA_VNUMINT: return luaH_getint(t, ivalue(key)); |
793 | 873 | case LUA_VNIL: return &absentkey; |
794 | 165k | case LUA_VNUMFLT: { |
795 | 165k | lua_Integer k; |
796 | 165k | if (luaV_flttointeger(fltvalue(key), &k, F2Ieq)) /* integral index? */ |
797 | 7.28k | return luaH_getint(t, k); /* use specialized version */ |
798 | | /* else... */ |
799 | 165k | } /* FALLTHROUGH */ |
800 | 213k | default: |
801 | 213k | return getgeneric(t, key, 0); |
802 | 2.42M | } |
803 | 2.42M | } |
804 | | |
805 | | |
806 | | /* |
807 | | ** Finish a raw "set table" operation, where 'slot' is where the value |
808 | | ** should have been (the result of a previous "get table"). |
809 | | ** Beware: when using this function you probably need to check a GC |
810 | | ** barrier and invalidate the TM cache. |
811 | | */ |
812 | | void luaH_finishset (lua_State *L, Table *t, const TValue *key, |
813 | 1.59M | const TValue *slot, TValue *value) { |
814 | 1.59M | if (isabstkey(slot)) |
815 | 1.42M | luaH_newkey(L, t, key, value); |
816 | 162k | else |
817 | 1.59M | setobj2t(L, cast(TValue *, slot), value); |
818 | 1.59M | } |
819 | | |
820 | | |
821 | | /* |
822 | | ** beware: when using this function you probably need to check a GC |
823 | | ** barrier and invalidate the TM cache. |
824 | | */ |
825 | 689k | void luaH_set (lua_State *L, Table *t, const TValue *key, TValue *value) { |
826 | 689k | const TValue *slot = luaH_get(t, key); |
827 | 689k | luaH_finishset(L, t, key, slot, value); |
828 | 689k | } |
829 | | |
830 | | |
831 | 37.3k | void luaH_setint (lua_State *L, Table *t, lua_Integer key, TValue *value) { |
832 | 37.3k | const TValue *p = luaH_getint(t, key); |
833 | 37.3k | if (isabstkey(p)) { |
834 | 26.6k | TValue k; |
835 | 26.6k | setivalue(&k, key); |
836 | 26.6k | luaH_newkey(L, t, &k, value); |
837 | 26.6k | } |
838 | 10.6k | else |
839 | 37.3k | setobj2t(L, cast(TValue *, p), value); |
840 | 37.3k | } |
841 | | |
842 | | |
843 | | /* |
844 | | ** Try to find a boundary in the hash part of table 't'. From the |
845 | | ** caller, we know that 'j' is zero or present and that 'j + 1' is |
846 | | ** present. We want to find a larger key that is absent from the |
847 | | ** table, so that we can do a binary search between the two keys to |
848 | | ** find a boundary. We keep doubling 'j' until we get an absent index. |
849 | | ** If the doubling would overflow, we try LUA_MAXINTEGER. If it is |
850 | | ** absent, we are ready for the binary search. ('j', being max integer, |
851 | | ** is larger or equal to 'i', but it cannot be equal because it is |
852 | | ** absent while 'i' is present; so 'j > i'.) Otherwise, 'j' is a |
853 | | ** boundary. ('j + 1' cannot be a present integer key because it is |
854 | | ** not a valid integer in Lua.) |
855 | | */ |
856 | 3.94k | static lua_Unsigned hash_search (Table *t, lua_Unsigned j) { |
857 | 3.94k | lua_Unsigned i; |
858 | 3.94k | if (j == 0) j++; /* the caller ensures 'j + 1' is present */ |
859 | 4.59k | do { |
860 | 4.59k | i = j; /* 'i' is a present index */ |
861 | 4.59k | if (j <= l_castS2U(LUA_MAXINTEGER) / 2) |
862 | 4.59k | j *= 2; |
863 | 0 | else { |
864 | 0 | j = LUA_MAXINTEGER; |
865 | 0 | if (isempty(luaH_getint(t, j))) /* t[j] not present? */ |
866 | 0 | break; /* 'j' now is an absent index */ |
867 | 0 | else /* weird case */ |
868 | 0 | return j; /* well, max integer is a boundary... */ |
869 | 0 | } |
870 | 4.59k | } while (!isempty(luaH_getint(t, j))); /* repeat until an absent t[j] */ |
871 | | /* i < j && t[i] present && t[j] absent */ |
872 | 11.4k | while (j - i > 1u) { /* do a binary search between them */ |
873 | 7.51k | lua_Unsigned m = (i + j) / 2; |
874 | 7.51k | if (isempty(luaH_getint(t, m))) j = m; |
875 | 3.60k | else i = m; |
876 | 7.51k | } |
877 | 3.94k | return i; |
878 | 3.94k | } |
879 | | |
880 | | |
881 | | static unsigned int binsearch (const TValue *array, unsigned int i, |
882 | 945 | unsigned int j) { |
883 | 2.12k | while (j - i > 1u) { /* binary search */ |
884 | 1.17k | unsigned int m = (i + j) / 2; |
885 | 1.17k | if (isempty(&array[m - 1])) j = m; |
886 | 445 | else i = m; |
887 | 1.17k | } |
888 | 945 | return i; |
889 | 945 | } |
890 | | |
891 | | |
892 | | /* |
893 | | ** Try to find a boundary in table 't'. (A 'boundary' is an integer index |
894 | | ** such that t[i] is present and t[i+1] is absent, or 0 if t[1] is absent |
895 | | ** and 'maxinteger' if t[maxinteger] is present.) |
896 | | ** (In the next explanation, we use Lua indices, that is, with base 1. |
897 | | ** The code itself uses base 0 when indexing the array part of the table.) |
898 | | ** The code starts with 'limit = t->alimit', a position in the array |
899 | | ** part that may be a boundary. |
900 | | ** |
901 | | ** (1) If 't[limit]' is empty, there must be a boundary before it. |
902 | | ** As a common case (e.g., after 't[#t]=nil'), check whether 'limit-1' |
903 | | ** is present. If so, it is a boundary. Otherwise, do a binary search |
904 | | ** between 0 and limit to find a boundary. In both cases, try to |
905 | | ** use this boundary as the new 'alimit', as a hint for the next call. |
906 | | ** |
907 | | ** (2) If 't[limit]' is not empty and the array has more elements |
908 | | ** after 'limit', try to find a boundary there. Again, try first |
909 | | ** the special case (which should be quite frequent) where 'limit+1' |
910 | | ** is empty, so that 'limit' is a boundary. Otherwise, check the |
911 | | ** last element of the array part. If it is empty, there must be a |
912 | | ** boundary between the old limit (present) and the last element |
913 | | ** (absent), which is found with a binary search. (This boundary always |
914 | | ** can be a new limit.) |
915 | | ** |
916 | | ** (3) The last case is when there are no elements in the array part |
917 | | ** (limit == 0) or its last element (the new limit) is present. |
918 | | ** In this case, must check the hash part. If there is no hash part |
919 | | ** or 'limit+1' is absent, 'limit' is a boundary. Otherwise, call |
920 | | ** 'hash_search' to find a boundary in the hash part of the table. |
921 | | ** (In those cases, the boundary is not inside the array part, and |
922 | | ** therefore cannot be used as a new limit.) |
923 | | */ |
924 | 12.7k | lua_Unsigned luaH_getn (Table *t) { |
925 | 12.7k | unsigned int limit = t->alimit; |
926 | 12.7k | if (limit > 0 && isempty(&t->array[limit - 1])) { /* (1)? */ |
927 | | /* there must be a boundary before 'limit' */ |
928 | 3.25k | if (limit >= 2 && !isempty(&t->array[limit - 2])) { |
929 | | /* 'limit - 1' is a boundary; can it be a new limit? */ |
930 | 2.30k | if (ispow2realasize(t) && !ispow2(limit - 1)) { |
931 | 1.34k | t->alimit = limit - 1; |
932 | 1.34k | setnorealasize(t); /* now 'alimit' is not the real size */ |
933 | 1.34k | } |
934 | 2.30k | return limit - 1; |
935 | 2.30k | } |
936 | 943 | else { /* must search for a boundary in [0, limit] */ |
937 | 943 | unsigned int boundary = binsearch(t->array, 0, limit); |
938 | | /* can this boundary represent the real size of the array? */ |
939 | 943 | if (ispow2realasize(t) && boundary > luaH_realasize(t) / 2) { |
940 | 31 | t->alimit = boundary; /* use it as the new limit */ |
941 | 31 | setnorealasize(t); |
942 | 31 | } |
943 | 943 | return boundary; |
944 | 943 | } |
945 | 3.25k | } |
946 | | /* 'limit' is zero or present in table */ |
947 | 9.48k | if (!limitequalsasize(t)) { /* (2)? */ |
948 | | /* 'limit' > 0 and array has more elements after 'limit' */ |
949 | 1.56k | if (isempty(&t->array[limit])) /* 'limit + 1' is empty? */ |
950 | 1.56k | return limit; /* this is the boundary */ |
951 | | /* else, try last element in the array */ |
952 | 0 | limit = luaH_realasize(t); |
953 | 0 | if (isempty(&t->array[limit - 1])) { /* empty? */ |
954 | | /* there must be a boundary in the array after old limit, |
955 | | and it must be a valid new limit */ |
956 | 0 | unsigned int boundary = binsearch(t->array, t->alimit, limit); |
957 | 0 | t->alimit = boundary; |
958 | 0 | return boundary; |
959 | 0 | } |
960 | | /* else, new limit is present in the table; check the hash part */ |
961 | 0 | } |
962 | | /* (3) 'limit' is the last element and either is zero or present in table */ |
963 | 7.91k | lua_assert(limit == luaH_realasize(t) && |
964 | 7.91k | (limit == 0 || !isempty(&t->array[limit - 1]))); |
965 | 7.91k | if (isdummy(t) || isempty(luaH_getint(t, cast(lua_Integer, limit + 1)))) |
966 | 7.60k | return limit; /* 'limit + 1' is absent */ |
967 | 319 | else /* 'limit + 1' is also present */ |
968 | 319 | return hash_search(t, limit); |
969 | 7.91k | } |
970 | | |
971 | | |
972 | | |
973 | | #if defined(LUA_DEBUG) |
974 | | |
975 | | /* export these functions for the test library */ |
976 | | |
977 | | Node *luaH_mainposition (const Table *t, const TValue *key) { |
978 | | return mainpositionTV(t, key); |
979 | | } |
980 | | |
981 | | #endif |