MicroAPRS/bertos/struct/hashtable.c

288 lines
9.5 KiB
C
Raw Normal View History

2014-04-03 14:21:37 -06:00
/**
* \file
* <!--
* This file is part of BeRTOS.
*
* Bertos is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 2 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
* Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
*
* As a special exception, you may use this file as part of a free software
* library without restriction. Specifically, if other files instantiate
* templates or use macros or inline functions from this file, or you compile
* this file and link it with other files to produce an executable, this
* file does not by itself cause the resulting executable to be covered by
* the GNU General Public License. This exception does not however
* invalidate any other reasons why the executable file might be covered by
* the GNU General Public License.
*
* Copyright 2004, 2008 Develer S.r.l. (http://www.develer.com/)
* Copyright 2004 Giovanni Bajo
* -->
*
* \brief Portable hash table implementation
*
* Some rationales of our choices in implementation:
*
* \li For embedded systems, it is vital to allocate the table in static memory. To do
* so, it is necessary to expose the \c HashNode and \c HashTable structures in the header file.
* Nevertheless, they should be used as opaque types (that is, the users should not
* access the structure fields directly).
*
* \li To statically allocate the structures, a macro is provided. With this macro, we
* are hiding completely \c HashNode to the user (who only manipulates \c HashTable). Without
* the macro, the user would have had to define both the \c HashNode and the \c HashTable
* manually, and pass both of them to \c ht_init() (which would have created the link between
* the two). Instead, the link is created with a literal initialization.
*
* \li The hash table is created as power of two to remove the divisions from the code.
* Of course, hash functions work at their best when the table size is a prime number.
* When calculating the modulus to convert the hash value to an index, the actual operation
* becomes a bitwise AND: this is fast, but truncates the value losing bits. Thus, the higher
* bits are first "merged" with the lower bits through some XOR operations (see the last line of
* \c calc_hash()).
*
* \li To minimize the memory occupation, there is no flag to set for the empty node. An
* empty node is recognized by its data pointer set to NULL. It is then invalid to store
* NULL as data pointer in the table.
*
* \li The visiting interface through iterators is implemented with pass-by-value semantic.
* While this is overkill for medium-to-stupid compilers, it is the best designed from an
* user point of view. Moreover, being totally inlined (defined completely in the header),
* even a stupid compiler should be able to perform basic optimizations on it.
* We thought about using a pass-by-pointer semantic but it was much more awful to use, and
* the compiler is then forced to spill everything to the stack (unless it is *very* smart).
*
* \li The current implementation allows to either store the key internally (that is, copy
* the key within the hash table) or keep it external (that is, a hook is used to extract
* the key from the data in the node). The former is more memory-hungry of course, as it
* allocated static space to store the key copies. The overhead to keep both methods at
* the same time is minimal:
* <ul>
* <li>There is a run-time check in node_get_key which is execute per each node visited.</li>
* <li>Theoretically, there is no memory overhead. In practice, there were no
* flags in \c struct HashTable till now, so we had to add a first bit flag, but the
* overhead will disappear if a second flag is added for a different reason later.</li>
* <li>There is a little interface overhead, since we have two different versions of
* \c ht_insert(), one with the key passed as parameter and one without, but in
* the common case (external keys) both can be used.</li>
* </ul>
*
* \author Giovanni Bajo <rasky@develer.com>
*/
#include "hashtable.h"
#include "cfg/cfg_hashtable.h"
#include <cfg/debug.h>
#include <cfg/compiler.h>
#include <cfg/macros.h> //ROTL(), ROTR();
#include <string.h>
typedef const void** HashNodePtr;
#define NODE_EMPTY(node) (!*(node))
#define HT_HAS_INTERNAL_KEY(ht) (CONFIG_HT_OPTIONAL_INTERNAL_KEY && ht->flags.key_internal)
/** For hash tables with internal keys, compute the pointer to the internal key for a given \a node. */
INLINE uint8_t *key_internal_get_ptr(struct HashTable *ht, HashNodePtr node)
{
uint8_t* key_buf = ht->key_data.mem;
size_t index;
// Compute the index of the node and use it to move within the whole key buffer
index = node - &ht->mem[0];
ASSERT(index < (size_t)(1 << ht->max_elts_log2));
key_buf += index * (INTERNAL_KEY_MAX_LENGTH + 1);
return key_buf;
}
INLINE void node_get_key(struct HashTable* ht, HashNodePtr node, const void** key, uint8_t* key_length)
{
if (HT_HAS_INTERNAL_KEY(ht))
{
uint8_t* k = key_internal_get_ptr(ht, node);
// Key has its length stored in the first byte
*key_length = *k++;
*key = k;
}
else
*key = ht->key_data.hook(*node, key_length);
}
INLINE bool node_key_match(struct HashTable* ht, HashNodePtr node, const void* key, uint8_t key_length)
{
const void* key2;
uint8_t key2_length;
node_get_key(ht, node, &key2, &key2_length);
return (key_length == key2_length && memcmp(key, key2, key_length) == 0);
}
static uint16_t calc_hash(const void* _key, uint8_t key_length)
{
const char* key = (const char*)_key;
uint16_t hash = key_length;
int i;
int len = (int)key_length;
for (i = 0; i < len; ++i)
hash = ROTL(hash, 4) ^ key[i];
return hash ^ (hash >> 6) ^ (hash >> 13);
}
static HashNodePtr perform_lookup(struct HashTable* ht,
const void* key, uint8_t key_length)
{
uint16_t hash = calc_hash(key, key_length);
uint16_t mask = ((1 << ht->max_elts_log2) - 1);
uint16_t index = hash & mask;
uint16_t first_index = index;
uint16_t step;
HashNodePtr node;
// Fast-path optimization: we check immediately if the current node
// is the one we were looking for, so we save the computation of the
// increment step in the common case.
node = &ht->mem[index];
if (NODE_EMPTY(node)
|| node_key_match(ht, node, key, key_length))
return node;
// Increment while going through the hash table in case of collision.
// This implements the double-hash technique: we use the higher part
// of the hash as a step increment instead of just going to the next
// element, to minimize the collisions.
// Notice that the number must be odd to be sure that the whole table
// is traversed. Actually MCD(table_size, step) must be 1, but
// table_size is always a power of 2, so we just ensure that step is
// never a multiple of 2.
step = (ROTR(hash, ht->max_elts_log2) & mask) | 1;
do
{
index += step;
index &= mask;
node = &ht->mem[index];
if (NODE_EMPTY(node)
|| node_key_match(ht, node, key, key_length))
return node;
// The check is done after the key compare. This actually causes
// one more compare in the case the table is full (since the first
// element was compared at the very start, and then at the end),
// but it makes faster the common path where we enter this loop
// for the first time, and index will not match first_index for
// sure.
} while (index != first_index);
return NULL;
}
void ht_init(struct HashTable* ht)
{
memset(ht->mem, 0, sizeof(ht->mem[0]) * (1 << ht->max_elts_log2));
}
static bool insert(struct HashTable* ht, const void* key, uint8_t key_length, const void* data)
{
HashNodePtr node;
if (!data)
return false;
if (HT_HAS_INTERNAL_KEY(ht))
key_length = MIN(key_length, (uint8_t)INTERNAL_KEY_MAX_LENGTH);
node = perform_lookup(ht, key, key_length);
if (!node)
return false;
if (HT_HAS_INTERNAL_KEY(ht))
{
uint8_t* k = key_internal_get_ptr(ht, node);
*k++ = key_length;
memcpy(k, key, key_length);
}
*node = data;
return true;
}
bool ht_insert_with_key(struct HashTable* ht, const void* key, uint8_t key_length, const void* data)
{
#ifdef _DEBUG
if (!HT_HAS_INTERNAL_KEY(ht))
{
// Construct a fake node and use it to match the key
HashNodePtr node = &data;
if (!node_key_match(ht, node, key, key_length))
{
ASSERT2(0, "parameter key is different from the external key");
return false;
}
}
#endif
return insert(ht, key, key_length, data);
}
bool ht_insert(struct HashTable* ht, const void* data)
{
const void* key;
uint8_t key_length;
#ifdef _DEBUG
if (HT_HAS_INTERNAL_KEY(ht))
{
ASSERT("parameter cannot be a hash table with internal keys - use ht_insert_with_key()"
&& 0);
return false;
}
#endif
key = ht->key_data.hook(data, &key_length);
return insert(ht, key, key_length, data);
}
const void* ht_find(struct HashTable* ht, const void* key, uint8_t key_length)
{
HashNodePtr node;
if (HT_HAS_INTERNAL_KEY(ht))
key_length = MIN(key_length, (uint8_t)INTERNAL_KEY_MAX_LENGTH);
node = perform_lookup(ht, key, key_length);
if (!node || NODE_EMPTY(node))
return NULL;
return *node;
}