2006-02-01 Ludovic Courtès <ludovic.courtes@laas.fr>
[bpt/guile.git] / libguile / weaks.c
CommitLineData
f59a096e 1/* Copyright (C) 1995,1996,1998,2000,2001, 2003 Free Software Foundation, Inc.
0f2d19dd
JB
2 *
3 * This program is free software; you can redistribute it and/or modify
4 * it under the terms of the GNU General Public License as published by
5 * the Free Software Foundation; either version 2, or (at your option)
6 * any later version.
7 *
8 * This program is distributed in the hope that it will be useful,
9 * but WITHOUT ANY WARRANTY; without even the implied warranty of
10 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
11 * GNU General Public License for more details.
12 *
13 * You should have received a copy of the GNU General Public License
14 * along with this software; see the file COPYING. If not, write to
92205699
MV
15 * the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
16 * Boston, MA 02110-1301 USA
0f2d19dd
JB
17 *
18 * As a special exception, Free Software Foundation gives permission
19 * for additional uses of the text contained in its release of this library.
20 *
21 * The exception is that, if you link this library with other files
22 * to produce an executable, this does not by itself cause the
23 * resulting executable to be covered by the GNU General Public License.
24 * Your use of that executable is in no way restricted on account of
25 * linking this library code into it.
26 *
27 * This exception does not however invalidate any other reasons why
28 * the executable file might be covered by the GNU General Public License.
29 *
30 * This exception applies only to the code released by
31 * Free Software Foundation as part of this library. If you copy
32 * code from other releases distributed under the terms of the GPL into a copy of
33 * this library, as the General Public License permits, the exception does
34 * not apply to the code that you add in this way. To avoid misleading
35 * anyone as to the status of such modified files, you must delete
36 * this exception notice from such code.
37 *
38 * If you write modifications of your own for this library, it is your choice
39 * whether to permit this exception to apply to your modifications.
82892bed 40 * If you do not wish that, delete this exception notice. */
1bbd0b84 41
1bbd0b84 42
0f2d19dd 43\f
592996c9 44
06c1d900
MV
45#include <stdio.h>
46
a0599745
MD
47#include "libguile/_scm.h"
48#include "libguile/vectors.h"
c96d76b8 49#include "libguile/lang.h"
f59a096e 50#include "libguile/hashtab.h"
0f2d19dd 51
a0599745
MD
52#include "libguile/validate.h"
53#include "libguile/weaks.h"
0f2d19dd 54
592996c9 55\f
0f2d19dd 56
c35738c1
MD
57/* 1. The current hash table implementation in hashtab.c uses weak alist
58 * vectors (formerly called weak hash tables) internally.
59 *
60 * 2. All hash table operations still work on alist vectors.
61 *
62 * 3. The weak vector and alist vector Scheme API is accessed through
63 * the module (ice-9 weak-vector).
64 */
65
66
0f2d19dd
JB
67/* {Weak Vectors}
68 */
69
70
3b3b36dd 71SCM_DEFINE (scm_make_weak_vector, "make-weak-vector", 1, 1, 0,
1e6808ea 72 (SCM size, SCM fill),
b380b885 73 "Return a weak vector with @var{size} elements. If the optional\n"
1e6808ea
MG
74 "argument @var{fill} is given, all entries in the vector will be\n"
75 "set to @var{fill}. The default value for @var{fill} is the\n"
76 "empty list.")
1bbd0b84 77#define FUNC_NAME s_scm_make_weak_vector
0f2d19dd 78{
6e708ef2 79 return scm_i_allocate_weak_vector (0, size, fill);
0f2d19dd 80}
1bbd0b84 81#undef FUNC_NAME
0f2d19dd
JB
82
83
1bbd0b84 84SCM_REGISTER_PROC(s_list_to_weak_vector, "list->weak-vector", 1, 0, 0, scm_weak_vector);
1cc91f1b 85
3b3b36dd 86SCM_DEFINE (scm_weak_vector, "weak-vector", 0, 0, 1,
1bbd0b84 87 (SCM l),
8f85c0c6 88 "@deffnx {Scheme Procedure} list->weak-vector l\n"
1e6808ea
MG
89 "Construct a weak vector from a list: @code{weak-vector} uses\n"
90 "the list of its arguments while @code{list->weak-vector} uses\n"
91 "its only argument @var{l} (a list) to construct a weak vector\n"
92 "the same way @code{list->vector} would.")
1bbd0b84 93#define FUNC_NAME s_scm_weak_vector
0f2d19dd 94{
6e708ef2
MV
95 scm_t_array_handle handle;
96 SCM res, *data;
c014a02e 97 long i;
0f2d19dd
JB
98
99 i = scm_ilength (l);
1bbd0b84 100 SCM_ASSERT (i >= 0, l, SCM_ARG1, FUNC_NAME);
6e708ef2 101
e11e83f3 102 res = scm_make_weak_vector (scm_from_int (i), SCM_UNSPECIFIED);
6e708ef2 103 data = scm_vector_writable_elements (res, &handle, NULL, NULL);
22a52da1 104
6e708ef2 105 while (scm_is_pair (l) && i > 0)
22a52da1
DH
106 {
107 *data++ = SCM_CAR (l);
108 l = SCM_CDR (l);
6e708ef2 109 i--;
22a52da1
DH
110 }
111
c8857a4d
MV
112 scm_array_handle_release (&handle);
113
0f2d19dd
JB
114 return res;
115}
1bbd0b84 116#undef FUNC_NAME
0f2d19dd
JB
117
118
3b3b36dd 119SCM_DEFINE (scm_weak_vector_p, "weak-vector?", 1, 0, 0,
1e6808ea 120 (SCM obj),
5352393c
MG
121 "Return @code{#t} if @var{obj} is a weak vector. Note that all\n"
122 "weak hashes are also weak vectors.")
1bbd0b84 123#define FUNC_NAME s_scm_weak_vector_p
0f2d19dd 124{
6e708ef2 125 return scm_from_bool (SCM_I_WVECTP (obj) && !SCM_IS_WHVEC (obj));
0f2d19dd 126}
1bbd0b84 127#undef FUNC_NAME
0f2d19dd 128
0f2d19dd
JB
129\f
130
c35738c1 131SCM_DEFINE (scm_make_weak_key_alist_vector, "make-weak-key-alist-vector", 0, 1, 0,
1e6808ea 132 (SCM size),
c35738c1
MD
133 "@deffnx {Scheme Procedure} make-weak-value-alist-vector size\n"
134 "@deffnx {Scheme Procedure} make-doubly-weak-alist-vector size\n"
1e6808ea
MG
135 "Return a weak hash table with @var{size} buckets. As with any\n"
136 "hash table, choosing a good size for the table requires some\n"
137 "caution.\n"
138 "\n"
139 "You can modify weak hash tables in exactly the same way you\n"
140 "would modify regular hash tables. (@pxref{Hash Tables})")
c35738c1 141#define FUNC_NAME s_scm_make_weak_key_alist_vector
0f2d19dd 142{
c35738c1 143 return scm_i_allocate_weak_vector
6e708ef2 144 (1, SCM_UNBNDP (size) ? scm_from_int (31) : size, SCM_EOL);
0f2d19dd 145}
1bbd0b84 146#undef FUNC_NAME
0f2d19dd
JB
147
148
c35738c1 149SCM_DEFINE (scm_make_weak_value_alist_vector, "make-weak-value-alist-vector", 0, 1, 0,
1e6808ea 150 (SCM size),
e3239868
DH
151 "Return a hash table with weak values with @var{size} buckets.\n"
152 "(@pxref{Hash Tables})")
c35738c1 153#define FUNC_NAME s_scm_make_weak_value_alist_vector
0f2d19dd 154{
c35738c1 155 return scm_i_allocate_weak_vector
6e708ef2 156 (2, SCM_UNBNDP (size) ? scm_from_int (31) : size, SCM_EOL);
0f2d19dd 157}
1bbd0b84 158#undef FUNC_NAME
0f2d19dd
JB
159
160
c35738c1 161SCM_DEFINE (scm_make_doubly_weak_alist_vector, "make-doubly-weak-alist-vector", 1, 0, 0,
1e6808ea 162 (SCM size),
e3239868
DH
163 "Return a hash table with weak keys and values with @var{size}\n"
164 "buckets. (@pxref{Hash Tables})")
c35738c1 165#define FUNC_NAME s_scm_make_doubly_weak_alist_vector
0f2d19dd 166{
c35738c1 167 return scm_i_allocate_weak_vector
6e708ef2 168 (3, SCM_UNBNDP (size) ? scm_from_int (31) : size, SCM_EOL);
0f2d19dd 169}
1bbd0b84 170#undef FUNC_NAME
0f2d19dd 171
592996c9 172
c35738c1 173SCM_DEFINE (scm_weak_key_alist_vector_p, "weak-key-alist-vector?", 1, 0, 0,
1e6808ea 174 (SCM obj),
c35738c1
MD
175 "@deffnx {Scheme Procedure} weak-value-alist-vector? obj\n"
176 "@deffnx {Scheme Procedure} doubly-weak-alist-vector? obj\n"
5352393c
MG
177 "Return @code{#t} if @var{obj} is the specified weak hash\n"
178 "table. Note that a doubly weak hash table is neither a weak key\n"
179 "nor a weak value hash table.")
c35738c1 180#define FUNC_NAME s_scm_weak_key_alist_vector_p
0f2d19dd 181{
6e708ef2 182 return scm_from_bool (SCM_I_WVECTP (obj) && SCM_IS_WHVEC (obj));
0f2d19dd 183}
1bbd0b84 184#undef FUNC_NAME
0f2d19dd
JB
185
186
c35738c1 187SCM_DEFINE (scm_weak_value_alist_vector_p, "weak-value-alist-vector?", 1, 0, 0,
1e6808ea
MG
188 (SCM obj),
189 "Return @code{#t} if @var{obj} is a weak value hash table.")
c35738c1 190#define FUNC_NAME s_scm_weak_value_alist_vector_p
0f2d19dd 191{
6e708ef2 192 return scm_from_bool (SCM_I_WVECTP (obj) && SCM_IS_WHVEC_V (obj));
0f2d19dd 193}
1bbd0b84 194#undef FUNC_NAME
0f2d19dd
JB
195
196
c35738c1 197SCM_DEFINE (scm_doubly_weak_alist_vector_p, "doubly-weak-alist-vector?", 1, 0, 0,
1e6808ea
MG
198 (SCM obj),
199 "Return @code{#t} if @var{obj} is a doubly weak hash table.")
c35738c1 200#define FUNC_NAME s_scm_doubly_weak_alist_vector_p
0f2d19dd 201{
6e708ef2 202 return scm_from_bool (SCM_I_WVECTP (obj) && SCM_IS_WHVEC_B (obj));
0f2d19dd 203}
1bbd0b84 204#undef FUNC_NAME
0f2d19dd 205
06c1d900 206#define UNMARKED_CELL_P(x) (SCM_NIMP(x) && !SCM_GC_MARK_P (x))
592996c9 207
06c1d900 208static SCM weak_vectors;
d662820a 209
06c1d900
MV
210void
211scm_i_init_weak_vectors_for_gc ()
212{
213 weak_vectors = SCM_EOL;
d662820a
MD
214}
215
06c1d900
MV
216void
217scm_i_mark_weak_vector (SCM w)
218{
219 SCM_I_SET_WVECT_GC_CHAIN (w, weak_vectors);
220 weak_vectors = w;
221}
592996c9 222
06c1d900
MV
223static int
224scm_i_mark_weak_vector_non_weaks (SCM w)
d662820a 225{
06c1d900 226 int again = 0;
d662820a 227
06c1d900 228 if (SCM_IS_WHVEC_ANY (w))
d662820a 229 {
06c1d900
MV
230 SCM *ptr;
231 long n = SCM_I_WVECT_LENGTH (w);
232 long j;
233 int weak_keys = SCM_IS_WHVEC (w) || SCM_IS_WHVEC_B (w);
234 int weak_values = SCM_IS_WHVEC_V (w) || SCM_IS_WHVEC_B (w);
235
236 ptr = SCM_I_WVECT_GC_WVELTS (w);
237
238 for (j = 0; j < n; ++j)
d662820a 239 {
06c1d900
MV
240 SCM alist, slow_alist;
241 int slow_toggle = 0;
242
243 /* We do not set the mark bits of the alist spine cells here
244 since we do not want to ever create the situation where a
245 marked cell references an unmarked cell (except in
246 scm_gc_mark, where the referenced cells will be marked
247 immediately). Thus, we can not use mark bits to stop us
248 from looping indefinitely over a cyclic alist. Instead,
249 we use the standard tortoise and hare trick to catch
250 cycles. The fast walker does the work, and stops when it
251 catches the slow walker to ensure that the whole cycle
252 has been worked on.
253 */
254
255 alist = slow_alist = ptr[j];
256
257 while (scm_is_pair (alist))
d662820a 258 {
06c1d900 259 SCM elt = SCM_CAR (alist);
d662820a 260
06c1d900 261 if (UNMARKED_CELL_P (elt))
d662820a 262 {
06c1d900
MV
263 if (scm_is_pair (elt))
264 {
265 SCM key = SCM_CAR (elt);
266 SCM value = SCM_CDR (elt);
267
268 if (!((weak_keys && UNMARKED_CELL_P (key))
269 || (weak_values && UNMARKED_CELL_P (value))))
270 {
271 /* The item should be kept. We need to mark it
272 recursively.
273 */
274 scm_gc_mark (elt);
275 again = 1;
276 }
277 }
278 else
279 {
280 /* A non-pair cell element. This should not
281 appear in a real alist, but when it does, we
282 need to keep it.
283 */
284 scm_gc_mark (elt);
285 again = 1;
286 }
287 }
288
289 alist = SCM_CDR (alist);
290
291 if (slow_toggle && scm_is_pair (slow_alist))
292 {
293 slow_alist = SCM_CDR (slow_alist);
294 slow_toggle = !slow_toggle;
295 if (scm_is_eq (slow_alist, alist))
296 break;
d662820a
MD
297 }
298 }
06c1d900
MV
299 if (!scm_is_pair (alist))
300 scm_gc_mark (alist);
d662820a
MD
301 }
302 }
303
06c1d900 304 return again;
d662820a
MD
305}
306
06c1d900
MV
307int
308scm_i_mark_weak_vectors_non_weaks ()
309{
310 int again = 0;
311 SCM w = weak_vectors;
312 while (!scm_is_null (w))
313 {
314 if (scm_i_mark_weak_vector_non_weaks (w))
315 again = 1;
316 w = SCM_I_WVECT_GC_CHAIN (w);
317 }
318 return again;
319}
592996c9 320
06c1d900
MV
321static void
322scm_i_remove_weaks (SCM w)
d662820a 323{
06c1d900
MV
324 SCM *ptr = SCM_I_WVECT_GC_WVELTS (w);
325 size_t n = SCM_I_WVECT_LENGTH (w);
326 size_t i;
327
328 if (!SCM_IS_WHVEC_ANY (w))
d662820a 329 {
06c1d900
MV
330 for (i = 0; i < n; ++i)
331 if (UNMARKED_CELL_P (ptr[i]))
332 ptr[i] = SCM_BOOL_F;
333 }
334 else
335 {
336 size_t delta = 0;
d662820a 337
06c1d900 338 for (i = 0; i < n; ++i)
d662820a 339 {
06c1d900 340 SCM alist, *fixup;
d662820a 341
06c1d900
MV
342 fixup = ptr + i;
343 alist = *fixup;
344 while (scm_is_pair (alist) && !SCM_GC_MARK_P (alist))
d662820a 345 {
06c1d900 346 if (UNMARKED_CELL_P (SCM_CAR (alist)))
d662820a 347 {
06c1d900
MV
348 *fixup = SCM_CDR (alist);
349 delta++;
350 }
351 else
352 {
353 SCM_SET_GC_MARK (alist);
354 fixup = SCM_CDRLOC (alist);
d662820a 355 }
06c1d900 356 alist = *fixup;
d662820a
MD
357 }
358 }
06c1d900
MV
359#if 0
360 if (delta)
361 fprintf (stderr, "vector %p, delta %d\n", w, delta);
362#endif
363 SCM_I_SET_WVECT_DELTA (w, delta);
d662820a 364 }
d662820a
MD
365}
366
d662820a 367void
06c1d900 368scm_i_remove_weaks_from_weak_vectors ()
d662820a 369{
06c1d900
MV
370 SCM w = weak_vectors;
371 while (!scm_is_null (w))
372 {
373 scm_i_remove_weaks (w);
374 w = SCM_I_WVECT_GC_CHAIN (w);
375 }
d662820a
MD
376}
377
06c1d900 378\f
592996c9 379
c35738c1
MD
380SCM
381scm_init_weaks_builtins ()
382{
383#include "libguile/weaks.x"
384 return SCM_UNSPECIFIED;
385}
386
0f2d19dd
JB
387void
388scm_init_weaks ()
0f2d19dd 389{
c35738c1
MD
390 scm_c_define_gsubr ("%init-weaks-builtins", 0, 0, 0,
391 scm_init_weaks_builtins);
0f2d19dd
JB
392}
393
89e00824
ML
394
395/*
396 Local Variables:
397 c-file-style: "gnu"
398 End:
399*/