all repos — mgba @ 3b353ac62190a00765812938e86e04b753196736

mGBA Game Boy Advance Emulator

src/third-party/zlib/examples/enough.c (view raw)

  1/* enough.c -- determine the maximum size of inflate's Huffman code tables over
  2 * all possible valid and complete Huffman codes, subject to a length limit.
  3 * Copyright (C) 2007, 2008, 2012 Mark Adler
  4 * Version 1.4  18 August 2012  Mark Adler
  5 */
  6
  7/* Version history:
  8   1.0   3 Jan 2007  First version (derived from codecount.c version 1.4)
  9   1.1   4 Jan 2007  Use faster incremental table usage computation
 10                     Prune examine() search on previously visited states
 11   1.2   5 Jan 2007  Comments clean up
 12                     As inflate does, decrease root for short codes
 13                     Refuse cases where inflate would increase root
 14   1.3  17 Feb 2008  Add argument for initial root table size
 15                     Fix bug for initial root table size == max - 1
 16                     Use a macro to compute the history index
 17   1.4  18 Aug 2012  Avoid shifts more than bits in type (caused endless loop!)
 18                     Clean up comparisons of different types
 19                     Clean up code indentation
 20 */
 21
 22/*
 23   Examine all possible Huffman codes for a given number of symbols and a
 24   maximum code length in bits to determine the maximum table size for zilb's
 25   inflate.  Only complete Huffman codes are counted.
 26
 27   Two codes are considered distinct if the vectors of the number of codes per
 28   length are not identical.  So permutations of the symbol assignments result
 29   in the same code for the counting, as do permutations of the assignments of
 30   the bit values to the codes (i.e. only canonical codes are counted).
 31
 32   We build a code from shorter to longer lengths, determining how many symbols
 33   are coded at each length.  At each step, we have how many symbols remain to
 34   be coded, what the last code length used was, and how many bit patterns of
 35   that length remain unused. Then we add one to the code length and double the
 36   number of unused patterns to graduate to the next code length.  We then
 37   assign all portions of the remaining symbols to that code length that
 38   preserve the properties of a correct and eventually complete code.  Those
 39   properties are: we cannot use more bit patterns than are available; and when
 40   all the symbols are used, there are exactly zero possible bit patterns
 41   remaining.
 42
 43   The inflate Huffman decoding algorithm uses two-level lookup tables for
 44   speed.  There is a single first-level table to decode codes up to root bits
 45   in length (root == 9 in the current inflate implementation).  The table
 46   has 1 << root entries and is indexed by the next root bits of input.  Codes
 47   shorter than root bits have replicated table entries, so that the correct
 48   entry is pointed to regardless of the bits that follow the short code.  If
 49   the code is longer than root bits, then the table entry points to a second-
 50   level table.  The size of that table is determined by the longest code with
 51   that root-bit prefix.  If that longest code has length len, then the table
 52   has size 1 << (len - root), to index the remaining bits in that set of
 53   codes.  Each subsequent root-bit prefix then has its own sub-table.  The
 54   total number of table entries required by the code is calculated
 55   incrementally as the number of codes at each bit length is populated.  When
 56   all of the codes are shorter than root bits, then root is reduced to the
 57   longest code length, resulting in a single, smaller, one-level table.
 58
 59   The inflate algorithm also provides for small values of root (relative to
 60   the log2 of the number of symbols), where the shortest code has more bits
 61   than root.  In that case, root is increased to the length of the shortest
 62   code.  This program, by design, does not handle that case, so it is verified
 63   that the number of symbols is less than 2^(root + 1).
 64
 65   In order to speed up the examination (by about ten orders of magnitude for
 66   the default arguments), the intermediate states in the build-up of a code
 67   are remembered and previously visited branches are pruned.  The memory
 68   required for this will increase rapidly with the total number of symbols and
 69   the maximum code length in bits.  However this is a very small price to pay
 70   for the vast speedup.
 71
 72   First, all of the possible Huffman codes are counted, and reachable
 73   intermediate states are noted by a non-zero count in a saved-results array.
 74   Second, the intermediate states that lead to (root + 1) bit or longer codes
 75   are used to look at all sub-codes from those junctures for their inflate
 76   memory usage.  (The amount of memory used is not affected by the number of
 77   codes of root bits or less in length.)  Third, the visited states in the
 78   construction of those sub-codes and the associated calculation of the table
 79   size is recalled in order to avoid recalculating from the same juncture.
 80   Beginning the code examination at (root + 1) bit codes, which is enabled by
 81   identifying the reachable nodes, accounts for about six of the orders of
 82   magnitude of improvement for the default arguments.  About another four
 83   orders of magnitude come from not revisiting previous states.  Out of
 84   approximately 2x10^16 possible Huffman codes, only about 2x10^6 sub-codes
 85   need to be examined to cover all of the possible table memory usage cases
 86   for the default arguments of 286 symbols limited to 15-bit codes.
 87
 88   Note that an unsigned long long type is used for counting.  It is quite easy
 89   to exceed the capacity of an eight-byte integer with a large number of
 90   symbols and a large maximum code length, so multiple-precision arithmetic
 91   would need to replace the unsigned long long arithmetic in that case.  This
 92   program will abort if an overflow occurs.  The big_t type identifies where
 93   the counting takes place.
 94
 95   An unsigned long long type is also used for calculating the number of
 96   possible codes remaining at the maximum length.  This limits the maximum
 97   code length to the number of bits in a long long minus the number of bits
 98   needed to represent the symbols in a flat code.  The code_t type identifies
 99   where the bit pattern counting takes place.
100 */
101
102#include <stdio.h>
103#include <stdlib.h>
104#include <string.h>
105#include <assert.h>
106
107#define local static
108
109/* special data types */
110typedef unsigned long long big_t;   /* type for code counting */
111typedef unsigned long long code_t;  /* type for bit pattern counting */
112struct tab {                        /* type for been here check */
113    size_t len;         /* length of bit vector in char's */
114    char *vec;          /* allocated bit vector */
115};
116
117/* The array for saving results, num[], is indexed with this triplet:
118
119      syms: number of symbols remaining to code
120      left: number of available bit patterns at length len
121      len: number of bits in the codes currently being assigned
122
123   Those indices are constrained thusly when saving results:
124
125      syms: 3..totsym (totsym == total symbols to code)
126      left: 2..syms - 1, but only the evens (so syms == 8 -> 2, 4, 6)
127      len: 1..max - 1 (max == maximum code length in bits)
128
129   syms == 2 is not saved since that immediately leads to a single code.  left
130   must be even, since it represents the number of available bit patterns at
131   the current length, which is double the number at the previous length.
132   left ends at syms-1 since left == syms immediately results in a single code.
133   (left > sym is not allowed since that would result in an incomplete code.)
134   len is less than max, since the code completes immediately when len == max.
135
136   The offset into the array is calculated for the three indices with the
137   first one (syms) being outermost, and the last one (len) being innermost.
138   We build the array with length max-1 lists for the len index, with syms-3
139   of those for each symbol.  There are totsym-2 of those, with each one
140   varying in length as a function of sym.  See the calculation of index in
141   count() for the index, and the calculation of size in main() for the size
142   of the array.
143
144   For the deflate example of 286 symbols limited to 15-bit codes, the array
145   has 284,284 entries, taking up 2.17 MB for an 8-byte big_t.  More than
146   half of the space allocated for saved results is actually used -- not all
147   possible triplets are reached in the generation of valid Huffman codes.
148 */
149
150/* The array for tracking visited states, done[], is itself indexed identically
151   to the num[] array as described above for the (syms, left, len) triplet.
152   Each element in the array is further indexed by the (mem, rem) doublet,
153   where mem is the amount of inflate table space used so far, and rem is the
154   remaining unused entries in the current inflate sub-table.  Each indexed
155   element is simply one bit indicating whether the state has been visited or
156   not.  Since the ranges for mem and rem are not known a priori, each bit
157   vector is of a variable size, and grows as needed to accommodate the visited
158   states.  mem and rem are used to calculate a single index in a triangular
159   array.  Since the range of mem is expected in the default case to be about
160   ten times larger than the range of rem, the array is skewed to reduce the
161   memory usage, with eight times the range for mem than for rem.  See the
162   calculations for offset and bit in beenhere() for the details.
163
164   For the deflate example of 286 symbols limited to 15-bit codes, the bit
165   vectors grow to total approximately 21 MB, in addition to the 4.3 MB done[]
166   array itself.
167 */
168
169/* Globals to avoid propagating constants or constant pointers recursively */
170local int max;          /* maximum allowed bit length for the codes */
171local int root;         /* size of base code table in bits */
172local int large;        /* largest code table so far */
173local size_t size;      /* number of elements in num and done */
174local int *code;        /* number of symbols assigned to each bit length */
175local big_t *num;       /* saved results array for code counting */
176local struct tab *done; /* states already evaluated array */
177
178/* Index function for num[] and done[] */
179#define INDEX(i,j,k) (((size_t)((i-1)>>1)*((i-2)>>1)+(j>>1)-1)*(max-1)+k-1)
180
181/* Free allocated space.  Uses globals code, num, and done. */
182local void cleanup(void)
183{
184    size_t n;
185
186    if (done != NULL) {
187        for (n = 0; n < size; n++)
188            if (done[n].len)
189                free(done[n].vec);
190        free(done);
191    }
192    if (num != NULL)
193        free(num);
194    if (code != NULL)
195        free(code);
196}
197
198/* Return the number of possible Huffman codes using bit patterns of lengths
199   len through max inclusive, coding syms symbols, with left bit patterns of
200   length len unused -- return -1 if there is an overflow in the counting.
201   Keep a record of previous results in num to prevent repeating the same
202   calculation.  Uses the globals max and num. */
203local big_t count(int syms, int len, int left)
204{
205    big_t sum;          /* number of possible codes from this juncture */
206    big_t got;          /* value returned from count() */
207    int least;          /* least number of syms to use at this juncture */
208    int most;           /* most number of syms to use at this juncture */
209    int use;            /* number of bit patterns to use in next call */
210    size_t index;       /* index of this case in *num */
211
212    /* see if only one possible code */
213    if (syms == left)
214        return 1;
215
216    /* note and verify the expected state */
217    assert(syms > left && left > 0 && len < max);
218
219    /* see if we've done this one already */
220    index = INDEX(syms, left, len);
221    got = num[index];
222    if (got)
223        return got;         /* we have -- return the saved result */
224
225    /* we need to use at least this many bit patterns so that the code won't be
226       incomplete at the next length (more bit patterns than symbols) */
227    least = (left << 1) - syms;
228    if (least < 0)
229        least = 0;
230
231    /* we can use at most this many bit patterns, lest there not be enough
232       available for the remaining symbols at the maximum length (if there were
233       no limit to the code length, this would become: most = left - 1) */
234    most = (((code_t)left << (max - len)) - syms) /
235            (((code_t)1 << (max - len)) - 1);
236
237    /* count all possible codes from this juncture and add them up */
238    sum = 0;
239    for (use = least; use <= most; use++) {
240        got = count(syms - use, len + 1, (left - use) << 1);
241        sum += got;
242        if (got == (big_t)0 - 1 || sum < got)   /* overflow */
243            return (big_t)0 - 1;
244    }
245
246    /* verify that all recursive calls are productive */
247    assert(sum != 0);
248
249    /* save the result and return it */
250    num[index] = sum;
251    return sum;
252}
253
254/* Return true if we've been here before, set to true if not.  Set a bit in a
255   bit vector to indicate visiting this state.  Each (syms,len,left) state
256   has a variable size bit vector indexed by (mem,rem).  The bit vector is
257   lengthened if needed to allow setting the (mem,rem) bit. */
258local int beenhere(int syms, int len, int left, int mem, int rem)
259{
260    size_t index;       /* index for this state's bit vector */
261    size_t offset;      /* offset in this state's bit vector */
262    int bit;            /* mask for this state's bit */
263    size_t length;      /* length of the bit vector in bytes */
264    char *vector;       /* new or enlarged bit vector */
265
266    /* point to vector for (syms,left,len), bit in vector for (mem,rem) */
267    index = INDEX(syms, left, len);
268    mem -= 1 << root;
269    offset = (mem >> 3) + rem;
270    offset = ((offset * (offset + 1)) >> 1) + rem;
271    bit = 1 << (mem & 7);
272
273    /* see if we've been here */
274    length = done[index].len;
275    if (offset < length && (done[index].vec[offset] & bit) != 0)
276        return 1;       /* done this! */
277
278    /* we haven't been here before -- set the bit to show we have now */
279
280    /* see if we need to lengthen the vector in order to set the bit */
281    if (length <= offset) {
282        /* if we have one already, enlarge it, zero out the appended space */
283        if (length) {
284            do {
285                length <<= 1;
286            } while (length <= offset);
287            vector = realloc(done[index].vec, length);
288            if (vector != NULL)
289                memset(vector + done[index].len, 0, length - done[index].len);
290        }
291
292        /* otherwise we need to make a new vector and zero it out */
293        else {
294            length = 1 << (len - root);
295            while (length <= offset)
296                length <<= 1;
297            vector = calloc(length, sizeof(char));
298        }
299
300        /* in either case, bail if we can't get the memory */
301        if (vector == NULL) {
302            fputs("abort: unable to allocate enough memory\n", stderr);
303            cleanup();
304            exit(1);
305        }
306
307        /* install the new vector */
308        done[index].len = length;
309        done[index].vec = vector;
310    }
311
312    /* set the bit */
313    done[index].vec[offset] |= bit;
314    return 0;
315}
316
317/* Examine all possible codes from the given node (syms, len, left).  Compute
318   the amount of memory required to build inflate's decoding tables, where the
319   number of code structures used so far is mem, and the number remaining in
320   the current sub-table is rem.  Uses the globals max, code, root, large, and
321   done. */
322local void examine(int syms, int len, int left, int mem, int rem)
323{
324    int least;          /* least number of syms to use at this juncture */
325    int most;           /* most number of syms to use at this juncture */
326    int use;            /* number of bit patterns to use in next call */
327
328    /* see if we have a complete code */
329    if (syms == left) {
330        /* set the last code entry */
331        code[len] = left;
332
333        /* complete computation of memory used by this code */
334        while (rem < left) {
335            left -= rem;
336            rem = 1 << (len - root);
337            mem += rem;
338        }
339        assert(rem == left);
340
341        /* if this is a new maximum, show the entries used and the sub-code */
342        if (mem > large) {
343            large = mem;
344            printf("max %d: ", mem);
345            for (use = root + 1; use <= max; use++)
346                if (code[use])
347                    printf("%d[%d] ", code[use], use);
348            putchar('\n');
349            fflush(stdout);
350        }
351
352        /* remove entries as we drop back down in the recursion */
353        code[len] = 0;
354        return;
355    }
356
357    /* prune the tree if we can */
358    if (beenhere(syms, len, left, mem, rem))
359        return;
360
361    /* we need to use at least this many bit patterns so that the code won't be
362       incomplete at the next length (more bit patterns than symbols) */
363    least = (left << 1) - syms;
364    if (least < 0)
365        least = 0;
366
367    /* we can use at most this many bit patterns, lest there not be enough
368       available for the remaining symbols at the maximum length (if there were
369       no limit to the code length, this would become: most = left - 1) */
370    most = (((code_t)left << (max - len)) - syms) /
371            (((code_t)1 << (max - len)) - 1);
372
373    /* occupy least table spaces, creating new sub-tables as needed */
374    use = least;
375    while (rem < use) {
376        use -= rem;
377        rem = 1 << (len - root);
378        mem += rem;
379    }
380    rem -= use;
381
382    /* examine codes from here, updating table space as we go */
383    for (use = least; use <= most; use++) {
384        code[len] = use;
385        examine(syms - use, len + 1, (left - use) << 1,
386                mem + (rem ? 1 << (len - root) : 0), rem << 1);
387        if (rem == 0) {
388            rem = 1 << (len - root);
389            mem += rem;
390        }
391        rem--;
392    }
393
394    /* remove entries as we drop back down in the recursion */
395    code[len] = 0;
396}
397
398/* Look at all sub-codes starting with root + 1 bits.  Look at only the valid
399   intermediate code states (syms, left, len).  For each completed code,
400   calculate the amount of memory required by inflate to build the decoding
401   tables. Find the maximum amount of memory required and show the code that
402   requires that maximum.  Uses the globals max, root, and num. */
403local void enough(int syms)
404{
405    int n;              /* number of remaing symbols for this node */
406    int left;           /* number of unused bit patterns at this length */
407    size_t index;       /* index of this case in *num */
408
409    /* clear code */
410    for (n = 0; n <= max; n++)
411        code[n] = 0;
412
413    /* look at all (root + 1) bit and longer codes */
414    large = 1 << root;              /* base table */
415    if (root < max)                 /* otherwise, there's only a base table */
416        for (n = 3; n <= syms; n++)
417            for (left = 2; left < n; left += 2)
418            {
419                /* look at all reachable (root + 1) bit nodes, and the
420                   resulting codes (complete at root + 2 or more) */
421                index = INDEX(n, left, root + 1);
422                if (root + 1 < max && num[index])       /* reachable node */
423                    examine(n, root + 1, left, 1 << root, 0);
424
425                /* also look at root bit codes with completions at root + 1
426                   bits (not saved in num, since complete), just in case */
427                if (num[index - 1] && n <= left << 1)
428                    examine((n - left) << 1, root + 1, (n - left) << 1,
429                            1 << root, 0);
430            }
431
432    /* done */
433    printf("done: maximum of %d table entries\n", large);
434}
435
436/*
437   Examine and show the total number of possible Huffman codes for a given
438   maximum number of symbols, initial root table size, and maximum code length
439   in bits -- those are the command arguments in that order.  The default
440   values are 286, 9, and 15 respectively, for the deflate literal/length code.
441   The possible codes are counted for each number of coded symbols from two to
442   the maximum.  The counts for each of those and the total number of codes are
443   shown.  The maximum number of inflate table entires is then calculated
444   across all possible codes.  Each new maximum number of table entries and the
445   associated sub-code (starting at root + 1 == 10 bits) is shown.
446
447   To count and examine Huffman codes that are not length-limited, provide a
448   maximum length equal to the number of symbols minus one.
449
450   For the deflate literal/length code, use "enough".  For the deflate distance
451   code, use "enough 30 6".
452
453   This uses the %llu printf format to print big_t numbers, which assumes that
454   big_t is an unsigned long long.  If the big_t type is changed (for example
455   to a multiple precision type), the method of printing will also need to be
456   updated.
457 */
458int main(int argc, char **argv)
459{
460    int syms;           /* total number of symbols to code */
461    int n;              /* number of symbols to code for this run */
462    big_t got;          /* return value of count() */
463    big_t sum;          /* accumulated number of codes over n */
464    code_t word;        /* for counting bits in code_t */
465
466    /* set up globals for cleanup() */
467    code = NULL;
468    num = NULL;
469    done = NULL;
470
471    /* get arguments -- default to the deflate literal/length code */
472    syms = 286;
473    root = 9;
474    max = 15;
475    if (argc > 1) {
476        syms = atoi(argv[1]);
477        if (argc > 2) {
478            root = atoi(argv[2]);
479            if (argc > 3)
480                max = atoi(argv[3]);
481        }
482    }
483    if (argc > 4 || syms < 2 || root < 1 || max < 1) {
484        fputs("invalid arguments, need: [sym >= 2 [root >= 1 [max >= 1]]]\n",
485              stderr);
486        return 1;
487    }
488
489    /* if not restricting the code length, the longest is syms - 1 */
490    if (max > syms - 1)
491        max = syms - 1;
492
493    /* determine the number of bits in a code_t */
494    for (n = 0, word = 1; word; n++, word <<= 1)
495        ;
496
497    /* make sure that the calculation of most will not overflow */
498    if (max > n || (code_t)(syms - 2) >= (((code_t)0 - 1) >> (max - 1))) {
499        fputs("abort: code length too long for internal types\n", stderr);
500        return 1;
501    }
502
503    /* reject impossible code requests */
504    if ((code_t)(syms - 1) > ((code_t)1 << max) - 1) {
505        fprintf(stderr, "%d symbols cannot be coded in %d bits\n",
506                syms, max);
507        return 1;
508    }
509
510    /* allocate code vector */
511    code = calloc(max + 1, sizeof(int));
512    if (code == NULL) {
513        fputs("abort: unable to allocate enough memory\n", stderr);
514        return 1;
515    }
516
517    /* determine size of saved results array, checking for overflows,
518       allocate and clear the array (set all to zero with calloc()) */
519    if (syms == 2)              /* iff max == 1 */
520        num = NULL;             /* won't be saving any results */
521    else {
522        size = syms >> 1;
523        if (size > ((size_t)0 - 1) / (n = (syms - 1) >> 1) ||
524                (size *= n, size > ((size_t)0 - 1) / (n = max - 1)) ||
525                (size *= n, size > ((size_t)0 - 1) / sizeof(big_t)) ||
526                (num = calloc(size, sizeof(big_t))) == NULL) {
527            fputs("abort: unable to allocate enough memory\n", stderr);
528            cleanup();
529            return 1;
530        }
531    }
532
533    /* count possible codes for all numbers of symbols, add up counts */
534    sum = 0;
535    for (n = 2; n <= syms; n++) {
536        got = count(n, 1, 2);
537        sum += got;
538        if (got == (big_t)0 - 1 || sum < got) {     /* overflow */
539            fputs("abort: can't count that high!\n", stderr);
540            cleanup();
541            return 1;
542        }
543        printf("%llu %d-codes\n", got, n);
544    }
545    printf("%llu total codes for 2 to %d symbols", sum, syms);
546    if (max < syms - 1)
547        printf(" (%d-bit length limit)\n", max);
548    else
549        puts(" (no length limit)");
550
551    /* allocate and clear done array for beenhere() */
552    if (syms == 2)
553        done = NULL;
554    else if (size > ((size_t)0 - 1) / sizeof(struct tab) ||
555             (done = calloc(size, sizeof(struct tab))) == NULL) {
556        fputs("abort: unable to allocate enough memory\n", stderr);
557        cleanup();
558        return 1;
559    }
560
561    /* find and show maximum inflate table usage */
562    if (root > max)                 /* reduce root to max length */
563        root = max;
564    if ((code_t)syms < ((code_t)1 << (root + 1)))
565        enough(syms);
566    else
567        puts("cannot handle minimum code lengths > root");
568
569    /* done */
570    cleanup();
571    return 0;
572}