pcompress/utils/phash/perfect.c
Moinak Ghosh 991482403b Add extension based file type detection and setting segment data type.
Use Bob Jenkins Minimal Perfect Hash to check for known extensions.
Use semaphore signaling and direct buffer copy for extraction.
Miscellaneous fixes.
2013-11-07 21:48:54 +05:30

1387 lines
42 KiB
C

/*
* This file is a part of Pcompress, a chunked parallel multi-
* algorithm lossless compression and decompression program.
*
* Copyright (C) 2012-2013 Moinak Ghosh. All rights reserved.
* Use is subject to license terms.
*
* This program is free software; you can redistribute it and/or
* modify it under the terms of the GNU Lesser General Public
* License as published by the Free Software Foundation; either
* version 3 of the License, or (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
* Lesser General Public License for more details.
*
* You should have received a copy of the GNU Lesser General Public
* License along with this program.
* If not, see <http://www.gnu.org/licenses/>.
*
* moinakg@belenix.org, http://moinakg.wordpress.com/
*
*/
/*
------------------------------------------------------------------------------
perfect.c: code to generate code for a hash for perfect hashing.
(c) Bob Jenkins, September 1996, December 1999
You may use this code in any way you wish, and it is free. No warranty.
I hereby place this in the public domain.
Source is http://burtleburtle.net/bob/c/perfect.c
This generates a minimal perfect hash function. That means, given a
set of n keys, this determines a hash function that maps each of
those keys into a value in 0..n-1 with no collisions.
The perfect hash function first uses a normal hash function on the key
to determine (a,b) such that the pair (a,b) is distinct for all
keys, then it computes a^scramble[tab[b]] to get the final perfect hash.
tab[] is an array of 1-byte values and scramble[] is a 256-term array of
2-byte or 4-byte values. If there are n keys, the length of tab[] is a
power of two between n/3 and n.
I found the idea of computing distinct (a,b) values in "Practical minimal
perfect hash functions for large databases", Fox, Heath, Chen, and Daoud,
Communications of the ACM, January 1992. They found the idea in Chichelli
(CACM Jan 1980). Beyond that, our methods differ.
The key is hashed to a pair (a,b) where a in 0..*alen*-1 and b in
0..*blen*-1. A fast hash function determines both a and b
simultaneously. Any decent hash function is likely to produce
hashes so that (a,b) is distinct for all pairs. I try the hash
using different values of *salt* until all pairs are distinct.
The final hash is (a XOR scramble[tab[b]]). *scramble* is a
predetermined mapping of 0..255 into 0..smax-1. *tab* is an
array that we fill in in such a way as to make the hash perfect.
First we fill in all values of *tab* that are used by more than one
key. We try all possible values for each position until one works.
This leaves m unmapped keys and m values that something could hash to.
If you treat unmapped keys as lefthand nodes and unused hash values
as righthand nodes, and draw a line connecting each key to each hash
value it could map to, you get a bipartite graph. We attempt to
find a perfect matching in this graph. If we succeed, we have
determined a perfect hash for the whole set of keys.
*scramble* is used because (a^tab[i]) clusters keys around *a*.
------------------------------------------------------------------------------
*/
#include <stdlib.h>
#include <string.h>
#ifndef STANDARD
#include "standard.h"
#endif
#ifndef LOOKUPA
#include "lookupa.h"
#endif
#ifndef RECYCLE
#include "recycle.h"
#endif
#ifndef PERFECT
#include "perfect.h"
#endif
/*
------------------------------------------------------------------------------
Find the mapping that will produce a perfect hash
------------------------------------------------------------------------------
*/
/* return the ceiling of the log (base 2) of val */
ub4
mylog2(ub4 val)
{
ub4 i;
for (i=0; ((ub4)1<<i) < val; ++i)
;
return i;
}
/* compute p(x), where p is a permutation of 0..(1<<nbits)-1 */
/* permute(0)=0. This is intended and useful. */
/* x: a value in some range */
/* nbits: number of bits in range */
static ub4
permute(ub4 x, ub4 nbits)
{
int i;
int mask = ((ub4)1<<nbits)-1; /* all ones */
int const2 = 1+nbits/2;
int const3 = 1+nbits/3;
int const4 = 1+nbits/4;
int const5 = 1+nbits/5;
for (i=0; i<20; ++i)
{
x = (x+(x<<const2)) & mask;
x = (x^(x>>const3));
x = (x+(x<<const4)) & mask;
x = (x^(x>>const5));
}
return x;
}
/* initialize scramble[] with distinct random values in 0..smax-1 */
/* scramble: hash is a^scramble[tab[b]] */
/* smax: scramble values should be in 0..smax-1 */
static void
scrambleinit(ub4 *scramble, ub4 smax)
{
ub4 i;
/* fill scramble[] with distinct random integers in 0..smax-1 */
for (i=0; i<SCRAMBLE_LEN; ++i)
{
scramble[i] = permute(i, mylog2(smax));
}
}
/*
* Check if key1 and key2 are the same.
* We already checked (a,b) are the same.
*/
static void
checkdup(key *key1, key *key2, hashform *form)
{
switch(form->hashtype)
{
case STRING_HT:
if ((key1->len_k == key2->len_k) &&
!memcmp(key1->name_k, key2->name_k, (size_t)key1->len_k))
{
fprintf(stderr, "perfect.c: Duplicates keys! %.*s\n",
key1->len_k, key1->name_k);
exit(SUCCESS);
}
break;
case INT_HT:
if (key1->hash_k == key2->hash_k)
{
fprintf(stderr, "perfect.c: Duplicate keys! %.8x\n", key1->hash_k);
exit(SUCCESS);
}
break;
case AB_HT:
fprintf(stderr, "perfect.c: Duplicate keys! %.8x %.8x\n",
key1->a_k, key1->b_k);
exit(SUCCESS);
break;
default:
fprintf(stderr, "perfect.c: Illegal hash type %u\n", (ub4)form->hashtype);
exit(SUCCESS);
break;
}
}
/*
* put keys in tabb according to key->b_k
* check if the initial hash might work
*/
/* tabb: output, list of keys with b for (a,b) */
/* blen: length of tabb */
/* keys: list of keys already hashed */
/* form: user directives */
/* complete: TRUE means to complete init despite collisions */
static int
inittab(bstuff *tabb, ub4 blen, key *keys, hashform *form, int complete)
{
int nocollision = TRUE;
key *mykey;
memset((void *)tabb, 0, (size_t)(sizeof(bstuff)*blen));
/* Two keys with the same (a,b) guarantees a collision */
for (mykey=keys; mykey; mykey=mykey->next_k)
{
key *otherkey;
for (otherkey=tabb[mykey->b_k].list_b;
otherkey;
otherkey=otherkey->nextb_k)
{
if (mykey->a_k == otherkey->a_k)
{
nocollision = FALSE;
checkdup(mykey, otherkey, form);
if (!complete)
return FALSE;
}
}
++tabb[mykey->b_k].listlen_b;
mykey->nextb_k = tabb[mykey->b_k].list_b;
tabb[mykey->b_k].list_b = mykey;
}
/* no two keys have the same (a,b) pair */
return nocollision;
}
/* Do the initial hash for normal mode (use lookup and checksum) */
/* keys: list of all keys */
/* alen: (a,b) has a in 0..alen-1, a power of 2 */
/* blen: (a,b) has b in 0..blen-1, a power of 2 */
/* smax: maximum range of computable hash values */
/* salt: used to initialize the hash function */
/* final: output, code for the final hash */
static void
initnorm(key *keys, ub4 alen, ub4 blen, ub4 smax, ub4 salt, gencode *final)
{
key *mykey;
if (mylog2(alen)+mylog2(blen) > UB4BITS)
{
ub4 initlev = salt*0x9e3779b9; /* the golden ratio; an arbitrary value */
for (mykey=keys; mykey; mykey=mykey->next_k)
{
ub4 i, state[CHECKSTATE];
for (i=0; i<CHECKSTATE; ++i) state[i] = initlev;
checksum( mykey->name_k, mykey->len_k, state);
mykey->a_k = state[0]&(alen-1);
mykey->b_k = state[1]&(blen-1);
}
final->used = 4;
sprintf(final->line[0],
" ub4 i,state[CHECKSTATE],rsl;\n");
sprintf(final->line[1],
" for (i=0; i<CHECKSTATE; ++i) state[i]=0x%x;\n",initlev);
sprintf(final->line[2],
" checksum(key, len, state);\n");
sprintf(final->line[3],
" rsl = ((state[0]&0x%x)^scramble[tab[state[1]&0x%x]]);\n",
alen-1, blen-1);
}
else
{
ub4 loga = mylog2(alen); /* log based 2 of blen */
ub4 initlev = salt*0x9e3779b9; /* the golden ratio; an arbitrary value */
for (mykey=keys; mykey; mykey=mykey->next_k)
{
ub4 hash = lookup(mykey->name_k, mykey->len_k, initlev);
mykey->a_k = (loga > 0) ? hash>>(UB4BITS-loga) : 0;
mykey->b_k = (blen > 1) ? hash&(blen-1) : 0;
}
final->used = 2;
sprintf(final->line[0],
" ub4 rsl, val = lookup(key, len, 0x%x);\n", initlev);
if (smax <= 1)
{
sprintf(final->line[1], " rsl = 0;\n");
}
else if (mylog2(alen) == 0)
{
sprintf(final->line[1], " rsl = tab[val&0x%x];\n", blen-1);
}
else if (blen < USE_SCRAMBLE)
{
sprintf(final->line[1], " rsl = ((val>>%u)^tab[val&0x%x]);\n",
UB4BITS-mylog2(alen), blen-1);
}
else
{
sprintf(final->line[1], " rsl = ((val>>%u)^scramble[tab[val&0x%x]]);\n",
UB4BITS-mylog2(alen), blen-1);
}
}
}
/* Do initial hash for inline mode */
/* keys: list of all keys */
/* alen: (a,b) has a in 0..alen-1, a power of 2 */
/* blen: (a,b) has b in 0..blen-1, a power of 2 */
/* smax: range of computable hash values */
/* salt: used to initialize the hash function */
/* final: generated code for final hash */
static void
initinl(key *keys, ub4 alen, ub4 blen, ub4 smax, ub4 salt, gencode *final)
{
key *mykey;
ub4 amask = alen-1;
ub4 blog = mylog2(blen);
ub4 initval = salt*0x9e3779b9; /* the golden ratio; an arbitrary value */
/* It's more important to have b uniform than a, so b is the low bits */
for (mykey = keys; mykey != (key *)0; mykey = mykey->next_k)
{
ub4 hash = initval;
ub4 i;
for (i=0; i<mykey->len_k; ++i)
{
hash = (mykey->name_k[i] ^ hash) + ((hash<<(UB4BITS-6))+(hash>>6));
}
mykey->hash_k = hash;
mykey->a_k = (alen > 1) ? (hash & amask) : 0;
mykey->b_k = (blen > 1) ? (hash >> (UB4BITS-blog)) : 0;
}
final->used = 1;
if (smax <= 1)
{
sprintf(final->line[0], " ub4 rsl = 0;\n");
}
else if (blen < USE_SCRAMBLE)
{
sprintf(final->line[0], " ub4 rsl = ((val & 0x%x) ^ tab[val >> %u]);\n",
amask, UB4BITS-blog);
}
else
{
sprintf(final->line[0], " ub4 rsl = ((val & 0x%x) ^ scramble[tab[val >> %u]]);\n",
amask, UB4BITS-blog);
}
}
/*
* Run a hash function on the key to get a and b
* Returns:
* 0: didn't find distinct (a,b) for all keys
* 1: found distinct (a,b) for all keys, put keys in tabb[]
* 2: found a perfect hash, no need to do any more work
*/
/* keys: list of all keys */
/* nkeys: total number of keys */
/* tabb: stuff indexed by b */
/* alen: (a,b) has a in 0..alen-1, a power of 2 */
/* blen: (a,b) has b in 0..blen-1, a power of 2 */
/* smax: range of computable hash values */
/* salt: used to initialize the hash function */
/* form: user directives */
/* final: code for final hash */
static ub4
initkey(key *keys, ub4 nkeys, bstuff *tabb, ub4 alen, ub4 blen, ub4 smax,
ub4 salt, hashform *form, gencode *final)
{
ub4 finished;
/* Do the initial hash of the keys */
switch(form->mode)
{
case NORMAL_HM:
initnorm(keys, alen, blen, smax, salt, final);
break;
case INLINE_HM:
initinl(keys, alen, blen, smax, salt, final);
break;
case HEX_HM:
case DECIMAL_HM:
finished = inithex(keys, nkeys, alen, blen, smax, salt, final, form);
if (finished) return 2;
break;
default:
fprintf(stderr, "fatal error: illegal mode\n");
exit(1);
}
if (nkeys <= 1)
{
final->used = 1;
sprintf(final->line[0], " ub4 rsl = 0;\n");
return 2;
}
return inittab(tabb, blen, keys, form, FALSE);
}
/* Print an error message and exit if there are duplicates */
/* tabb: array of lists of keys with the same b */
/* blen: length of tabb, a power of 2 */
/* form: user directives */
static void
duplicates(bstuff *tabb, ub4 blen, key *keys, hashform *form)
{
ub4 i;
key *key1;
key *key2;
(void)inittab(tabb, blen, keys, form, TRUE);
/* for each b, do nested loops through key list looking for duplicates */
for (i=0; i<blen; ++i)
for (key1=tabb[i].list_b; key1; key1=key1->nextb_k)
for (key2=key1->nextb_k; key2; key2=key2->nextb_k)
checkdup(key1, key2, form);
}
/* Try to apply an augmenting list */
/* rollback: FALSE applies augmenting path, TRUE rolls back */
static int
apply(bstuff *tabb, hstuff *tabh, qstuff *tabq, ub4 blen, ub4 *scramble, ub4 tail, int rollback)
{
ub4 hash;
key *mykey;
bstuff *pb;
ub4 child;
ub4 parent;
ub4 stabb; /* scramble[tab[b]] */
/* walk from child to parent */
for (child=tail-1; child; child=parent)
{
parent = tabq[child].parent_q; /* find child's parent */
pb = tabq[parent].b_q; /* find parent's list of siblings */
/* erase old hash values */
stabb = scramble[pb->val_b];
for (mykey=pb->list_b; mykey; mykey=mykey->nextb_k)
{
hash = mykey->a_k^stabb;
if (mykey == tabh[hash].key_h)
{ /* erase hash for all of child's siblings */
tabh[hash].key_h = (key *)0;
}
}
/* change pb->val_b, which will change the hashes of all parent siblings */
pb->val_b = (rollback ? tabq[child].oldval_q : tabq[child].newval_q);
/* set new hash values */
stabb = scramble[pb->val_b];
for (mykey=pb->list_b; mykey; mykey=mykey->nextb_k)
{
hash = mykey->a_k^stabb;
if (rollback)
{
if (parent == 0) continue; /* root never had a hash */
}
else if (tabh[hash].key_h)
{
/* very rare: roll back any changes */
(void)apply(tabb, tabh, tabq, blen, scramble, tail, TRUE);
return FALSE; /* failure, collision */
}
tabh[hash].key_h = mykey;
}
}
return TRUE;
}
/*
-------------------------------------------------------------------------------
augment(): Add item to the mapping.
Construct a spanning tree of *b*s with *item* as root, where each
parent can have all its hashes changed (by some new val_b) with
at most one collision, and each child is the b of that collision.
I got this from Tarjan's "Data Structures and Network Algorithms". The
path from *item* to a *b* that can be remapped with no collision is
an "augmenting path". Change values of tab[b] along the path so that
the unmapped key gets mapped and the unused hash value gets used.
Assuming 1 key per b, if m out of n hash values are still unused,
you should expect the transitive closure to cover n/m nodes before
an unused node is found. Sum(i=1..n)(n/i) is about nlogn, so expect
this approach to take about nlogn time to map all single-key b's.
-------------------------------------------------------------------------------
*/
/* tabb: stuff indexed by b */
/* tabh: which key is associated with which hash, indexed by hash */
/* tabq: queue of *b* values, this is the spanning tree */
/* blen: length of tabb */
/* scramble: final hash is a^scramble[tab[b]] */
/* smax: highest value in scramble */
/* item: &tabb[b] for the b to be mapped */
/* nkeys: final hash must be in 0..nkeys-1 */
/* highwater: a value higher than any now in tabb[].water_b */
/* form: TRUE if we should do a minimal perfect hash */
static int
augment(bstuff *tabb, hstuff *tabh, qstuff *tabq, ub4 blen, ub4 *scramble,
ub4 smax, bstuff *item, ub4 nkeys, ub4 highwater, hashform *form)
{
ub4 q; /* current position walking through the queue */
ub4 tail; /* tail of the queue. 0 is the head of the queue. */
ub4 limit=((blen < USE_SCRAMBLE) ? smax : UB1MAXVAL+1);
ub4 highhash = ((form->perfect == MINIMAL_HP) ? nkeys : smax);
int trans = (form->speed == SLOW_HS || form->perfect == MINIMAL_HP);
/* initialize the root of the spanning tree */
tabq[0].b_q = item;
tail = 1;
/* construct the spanning tree by walking the queue, add children to tail */
for (q=0; q<tail; ++q)
{
bstuff *myb = tabq[q].b_q; /* the b for this node */
ub4 i; /* possible value for myb->val_b */
if (!trans && (q == 1))
break; /* don't do transitive closure */
for (i=0; i<limit; ++i)
{
bstuff *childb = (bstuff *)0; /* the b that this i maps to */
key *mykey; /* for walking through myb's keys */
for (mykey = myb->list_b; mykey; mykey=mykey->nextb_k)
{
key *childkey;
ub4 hash = mykey->a_k^scramble[i];
if (hash >= highhash) break; /* out of bounds */
childkey = tabh[hash].key_h;
if (childkey)
{
bstuff *hitb = &tabb[childkey->b_k];
if (childb)
{
if (childb != hitb) break; /* hit at most one child b */
}
else
{
childb = hitb; /* remember this as childb */
if (childb->water_b == highwater) break; /* already explored */
}
}
}
if (mykey) continue; /* myb with i has multiple collisions */
/* add childb to the queue of reachable things */
if (childb) childb->water_b = highwater;
tabq[tail].b_q = childb;
tabq[tail].newval_q = i; /* how to make parent (myb) use this hash */
tabq[tail].oldval_q = myb->val_b; /* need this for rollback */
tabq[tail].parent_q = q;
++tail;
if (!childb)
{ /* found an *i* with no collisions? */
/* try to apply the augmenting path */
if (apply(tabb, tabh, tabq, blen, scramble, tail, FALSE))
return TRUE; /* success, item was added to the perfect hash */
--tail; /* don't know how to handle such a child! */
}
}
}
return FALSE;
}
/* find a mapping that makes this a perfect hash */
static int
perfect(bstuff *tabb, hstuff *tabh, qstuff *tabq, ub4 blen,
ub4 smax, ub4 *scramble, ub4 nkeys, hashform *form)
{
ub4 maxkeys; /* maximum number of keys for any b */
ub4 i, j;
/* clear any state from previous attempts */
memset((void *)tabh, 0,
(size_t)(sizeof(hstuff)*
((form->perfect == MINIMAL_HP) ? nkeys : smax)));
memset((void *)tabq, 0, (size_t)(sizeof(qstuff)*(blen+1)));
for (maxkeys=0,i=0; i<blen; ++i)
if (tabb[i].listlen_b > maxkeys)
maxkeys = tabb[i].listlen_b;
/* In descending order by number of keys, map all *b*s */
for (j=maxkeys; j>0; --j)
for (i=0; i<blen; ++i)
if (tabb[i].listlen_b == j)
if (!augment(tabb, tabh, tabq, blen, scramble, smax, &tabb[i], nkeys,
i+1, form))
{
printf("fail to map group of size %u for tab size %u\n", j, blen);
return FALSE;
}
/* Success! We found a perfect hash of all keys into 0..nkeys-1. */
return TRUE;
}
/*
* Simple case: user gave (a,b). No more mixing, no guessing alen or blen.
* This assumes a,b reside in (key->a_k, key->b_k), and final->form == AB_HK.
*/
/* tabb: output, tab[] of the perfect hash, length *blen */
/* alen: output, 0..alen-1 is range for a of (a,b) */
/* blen: output, 0..blen-1 is range for b of (a,b) */
/* salt: output, initializes initial hash */
/* final: code for final hash */
/* scramble: input, hash = a^scramble[tab[b]] */
/* smax: input, scramble[i] in 0..smax-1 */
/* keys: input, keys to hash */
/* nkeys: input, number of keys being hashed */
/* form: user directives */
static void
hash_ab(bstuff **tabb, ub4 *alen, ub4 *blen, ub4 *salt, gencode *final,
ub4 *scramble, ub4 *smax, key *keys, ub4 nkeys, hashform *form)
{
hstuff *tabh;
qstuff *tabq;
key *mykey;
ub4 i;
int used_tab;
/* initially make smax the first power of two bigger than nkeys */
*smax = ((ub4)1<<mylog2(nkeys));
scrambleinit(scramble, *smax);
/* set *alen and *blen based on max A and B from user */
*alen = 1;
*blen = 1;
for (mykey = keys; mykey != (key *)0; mykey = mykey->next_k)
{
while (*alen <= mykey->a_k) *alen *= 2;
while (*blen <= mykey->b_k) *blen *= 2;
}
if (*alen > 2**smax)
{
fprintf(stderr,
"perfect.c: Can't deal with (A,B) having A bigger than twice \n");
fprintf(stderr,
" the smallest power of two greater or equal to any legal hash.\n");
exit(SUCCESS);
}
/* allocate working memory */
*tabb = (bstuff *)malloc((size_t)(sizeof(bstuff)*(*blen)));
tabq = (qstuff *)remalloc(sizeof(qstuff)*(*blen+1), "perfect.c, tabq");
tabh = (hstuff *)remalloc(sizeof(hstuff)*(form->perfect == MINIMAL_HP ?
nkeys : *smax),
"perfect.c, tabh");
/* check that (a,b) are distinct and put them in tabb indexed by b */
(void)inittab(*tabb, *blen, keys, form, FALSE);
/* try with smax */
if (!perfect(*tabb, tabh, tabq, *blen, *smax, scramble, nkeys, form))
{
if (form->perfect == MINIMAL_HP)
{
printf("fatal error: Cannot find perfect hash for user (A,B) pairs\n");
exit(SUCCESS);
}
else
{
/* try with 2*smax */
free((void *)tabh);
*smax = *smax * 2;
scrambleinit(scramble, *smax);
tabh = (hstuff *)remalloc(sizeof(hstuff)*(form->perfect == MINIMAL_HP ?
nkeys : *smax),
"perfect.c, tabh");
if (!perfect(*tabb, tabh, tabq, *blen, *smax, scramble, nkeys, form))
{
printf("fatal error: Cannot find perfect hash for user (A,B) pairs\n");
exit(SUCCESS);
}
}
}
/* check if tab[] was really needed */
for (i=0; i<*blen; ++i)
{
if ((*tabb)[i].val_b != 0) break; /* assumes permute(0) == 0 */
}
used_tab = (i < *blen);
/* write the code for the perfect hash */
*salt = 1;
final->used = 1;
if (!used_tab)
{
sprintf(final->line[0], " ub4 rsl = a;\n");
}
else if (*blen < USE_SCRAMBLE)
{
sprintf(final->line[0], " ub4 rsl = (a ^ tab[b]);\n");
}
else
{
sprintf(final->line[0], " ub4 rsl = (a ^ scramble[tab[b]]);\n");
}
printf("success, found a perfect hash\n");
free((void *)tabq);
free((void *)tabh);
}
/* guess initial values for alen and blen */
/* alen: output, initial alen */
/* blen: output, initial blen */
/* smax: input, power of two greater or equal to max hash value */
/* nkeys: number of keys being hashed */
/* form: user directives */
static void
initalen(ub4 *alen, ub4 *blen, ub4 *smax, ub4 nkeys, hashform *form)
{
/*
* Find initial *alen, *blen
* Initial alen and blen values were found empirically. Some factors:
*
* If smax<256 there is no scramble, so tab[b] needs to cover 0..smax-1.
*
* alen and blen must be powers of 2 because the values in 0..alen-1 and
* 0..blen-1 are produced by applying a bitmask to the initial hash function.
*
* alen must be less than smax, in fact less than nkeys, because otherwise
* there would often be no i such that a^scramble[i] is in 0..nkeys-1 for
* all the *a*s associated with a given *b*, so there would be no legal
* value to assign to tab[b]. This only matters when we're doing a minimal
* perfect hash.
*
* It takes around 800 trials to find distinct (a,b) with nkey=smax*(5/8)
* and alen*blen = smax*smax/32.
*
* Values of blen less than smax/4 never work, and smax/2 always works.
*
* We want blen as small as possible because it is the number of bytes in
* the huge array we must create for the perfect hash.
*
* When nkey <= smax*(5/8), blen=smax/4 works much more often with
* alen=smax/8 than with alen=smax/4. Above smax*(5/8), blen=smax/4
* doesn't seem to care whether alen=smax/8 or alen=smax/4. I think it
* has something to do with 5/8 = 1/8 * 5. For example examine 80000,
* 85000, and 90000 keys with different values of alen. This only matters
* if we're doing a minimal perfect hash.
*
* When alen*blen <= 1<<UB4BITS, the initial hash must produce one integer.
* Bigger than that it must produce two integers, which increases the
* cost of the hash per character hashed.
*/
if (form->perfect == NORMAL_HP)
{
if ((form->speed == FAST_HS) && (nkeys > *smax*0.8))
{
*smax = *smax * 2;
}
*alen = ((form->hashtype==INT_HT) && *smax>131072) ?
((ub4)1<<(UB4BITS-mylog2(*blen))) : /* distinct keys => distinct (A,B) */
*smax; /* no reason to restrict alen to smax/2 */
if ((form->hashtype == INT_HT) && *smax < 32)
*blen = *smax; /* go for function speed not space */
else if (*smax/4 <= (1<<14))
*blen = ((nkeys <= *smax*0.56) ? *smax/32 :
(nkeys <= *smax*0.74) ? *smax/16 : *smax/8);
else
*blen = ((nkeys <= *smax*0.6) ? *smax/16 :
(nkeys <= *smax*0.8) ? *smax/8 : *smax/4);
if ((form->speed == FAST_HS) && (*blen < *smax/8))
*blen = *smax/8;
if (*alen < 1) *alen = 1;
if (*blen < 1) *blen = 1;
}
else
{
switch(mylog2(*smax))
{
case 0:
*alen = 1;
*blen = 1;
case 1: case 2: case 3: case 4: case 5: case 6: case 7: case 8:
*alen = (form->perfect == NORMAL_HP) ? *smax : *smax/2;
*blen = *smax/2;
break;
case 9:
case 10:
case 11:
case 12:
case 13:
case 14:
case 15:
case 16:
case 17:
if (form->speed == FAST_HS)
{
*alen = *smax/2;
*blen = *smax/4;
}
else if (*smax/4 < USE_SCRAMBLE)
{
*alen = ((nkeys <= *smax*0.52) ? *smax/8 : *smax/4);
*blen = ((nkeys <= *smax*0.52) ? *smax/8 : *smax/4);
}
else
{
*alen = ((nkeys <= *smax*(5.0/8.0)) ? *smax/8 :
(nkeys <= *smax*(3.0/4.0)) ? *smax/4 : *smax/2);
*blen = *smax/4; /* always give the small size a shot */
}
break;
case 18:
if (form->speed == FAST_HS)
{
*alen = *smax/2;
*blen = *smax/2;
}
else
{
*alen = *smax/8; /* never require the multiword hash */
*blen = (nkeys <= *smax*(5.0/8.0)) ? *smax/4 : *smax/2;
}
break;
case 19:
case 20:
*alen = (nkeys <= *smax*(5.0/8.0)) ? *smax/8 : *smax/2;
*blen = (nkeys <= *smax*(5.0/8.0)) ? *smax/4 : *smax/2;
break;
default:
*alen = *smax/2; /* just find a hash as quick as possible */
*blen = *smax/2; /* we'll be thrashing virtual memory at this size */
break;
}
}
}
/*
** Try to find a perfect hash function.
** Return the successful initializer for the initial hash.
** Return 0 if no perfect hash could be found.
*/
/* tabb: output, tab[] of the perfect hash, length *blen */
/* alen: output, 0..alen-1 is range for a of (a,b) */
/* blen: output, 0..blen-1 is range for b of (a,b) */
/* salt: output, initializes initial hash */
/* final: code for final hash */
/* scramble: input, hash = a^scramble[tab[b]] */
/* smax: input, scramble[i] in 0..smax-1 */
/* keys: input, keys to hash */
/* nkeys: input, number of keys being hashed */
/* form: user directives */
void
findhash(bstuff **tabb, ub4 *alen, ub4 *blen, ub4 *salt, gencode *final,
ub4 *scramble, ub4 *smax, key *keys, ub4 nkeys, hashform *form)
{
ub4 bad_initkey; /* how many times did initkey fail? */
ub4 bad_perfect; /* how many times did perfect fail? */
ub4 trysalt; /* trial initializer for initial hash */
ub4 maxalen;
hstuff *tabh; /* table of keys indexed by hash value */
qstuff *tabq; /* table of stuff indexed by queue value, used by augment */
/* The case of (A,B) supplied by the user is a special case */
if (form->hashtype == AB_HT)
{
hash_ab(tabb, alen, blen, salt, final,
scramble, smax, keys, nkeys, form);
return;
}
/* guess initial values for smax, alen and blen */
*smax = ((ub4)1<<mylog2(nkeys));
initalen(alen, blen, smax, nkeys, form);
scrambleinit(scramble, *smax);
maxalen = (form->perfect == MINIMAL_HP) ? *smax/2 : *smax;
/* allocate working memory */
*tabb = (bstuff *)remalloc((size_t)(sizeof(bstuff)*(*blen)),
"perfect.c, tabb");
tabq = (qstuff *)remalloc(sizeof(qstuff)*(*blen+1), "perfect.c, tabq");
tabh = (hstuff *)remalloc(sizeof(hstuff)*(form->perfect == MINIMAL_HP ?
nkeys : *smax),
"perfect.c, tabh");
/* Actually find the perfect hash */
*salt = 0;
bad_initkey = 0;
bad_perfect = 0;
for (trysalt=1; ; ++trysalt)
{
ub4 rslinit;
/* Try to find distinct (A,B) for all keys */
rslinit = initkey(keys, nkeys, *tabb, *alen, *blen, *smax, trysalt,
form, final);
if (rslinit == 2)
{ /* initkey actually found a perfect hash, not just distinct (a,b) */
*salt = 1;
*blen = 0;
break;
}
else if (rslinit == 0)
{
/* didn't find distinct (a,b) */
if (++bad_initkey >= RETRY_INITKEY)
{
/* Try to put more bits in (A,B) to make distinct (A,B) more likely */
if (*alen < maxalen)
{
*alen *= 2;
}
else if (*blen < *smax)
{
*blen *= 2;
free(tabq);
free(*tabb);
*tabb = (bstuff *)malloc((size_t)(sizeof(bstuff)*(*blen)));
tabq = (qstuff *)malloc((size_t)(sizeof(qstuff)*(*blen+1)));
}
else
{
duplicates(*tabb, *blen, keys, form); /* check for duplicates */
printf("fatal error: Cannot perfect hash: cannot find distinct (A,B)\n");
exit(SUCCESS);
}
bad_initkey = 0;
bad_perfect = 0;
}
continue; /* two keys have same (a,b) pair */
}
printf("found distinct (A,B) on attempt %u\n", trysalt);
/* Given distinct (A,B) for all keys, build a perfect hash */
if (!perfect(*tabb, tabh, tabq, *blen, *smax, scramble, nkeys, form))
{
if ((form->hashtype != INT_HT && ++bad_perfect >= RETRY_PERFECT) ||
(form->hashtype == INT_HT && ++bad_perfect >= RETRY_HEX))
{
if (*blen < *smax)
{
*blen *= 2;
free(*tabb);
free(tabq);
*tabb = (bstuff *)malloc((size_t)(sizeof(bstuff)*(*blen)));
tabq = (qstuff *)malloc((size_t)(sizeof(qstuff)*(*blen+1)));
--trysalt; /* we know this salt got distinct (A,B) */
}
else
{
printf("fatal error: Cannot perfect hash: cannot build tab[]\n");
exit(SUCCESS);
}
bad_perfect = 0;
}
continue;
}
*salt = trysalt;
break;
}
printf("built perfect hash table of size %u\n", *blen);
/* free working memory */
free((void *)tabh);
free((void *)tabq);
}
/*
------------------------------------------------------------------------------
Input/output type routines
------------------------------------------------------------------------------
*/
/* get the list of keys */
/* keys: list of all keys */
/* nkeys: number of keys */
/* textroot: get space to store key text */
/* keyroot: get space for keys */
/* form: user directives */
static void
getkeys(key **keys, ub4 *nkeys, reroot *textroot, reroot *keyroot, hashform *form)
{
key *mykey;
char *mytext;
mytext = (char *)renew(textroot);
*keys = 0;
*nkeys = 0;
while (fgets(mytext, MAXKEYLEN, stdin))
{
mykey = (key *)renew(keyroot);
if (form->mode == AB_HM)
{
sscanf(mytext, "%x %x ", &mykey->a_k, &mykey->b_k);
}
else if (form->mode == ABDEC_HM)
{
sscanf(mytext, "%u %u ", &mykey->a_k, &mykey->b_k);
}
else if (form->mode == HEX_HM)
{
sscanf(mytext, "%x ", &mykey->hash_k);
}
else if (form->mode == DECIMAL_HM)
{
sscanf(mytext, "%u ", &mykey->hash_k);
}
else
{
mykey->name_k = (ub1 *)mytext;
mytext = (char *)renew(textroot);
mykey->len_k = (ub4)(strlen((char *)mykey->name_k)-1);
}
mykey->next_k = *keys;
*keys = mykey;
++*nkeys;
}
redel(textroot, mytext);
}
/* make the .h file */
static void
make_h(ub4 blen, ub4 smax, ub4 nkeys, ub4 salt)
{
FILE *f;
f = fopen("phash.h", "w");
fprintf(f, "/* Generated File, DO NOT EDIT */\n");
fprintf(f, "/* Perfect hash definitions */\n");
fprintf(f, "#ifndef STANDARD\n");
fprintf(f, "#include \"standard.h\"\n");
fprintf(f, "#endif /* STANDARD */\n");
fprintf(f, "#ifndef PHASH\n");
fprintf(f, "#define PHASH\n");
fprintf(f, "\n");
if (blen > 0)
{
if (smax <= UB1MAXVAL+1 || blen >= USE_SCRAMBLE)
fprintf(f, "extern ub1 tab[];\n");
else
{
fprintf(f, "extern ub2 tab[];\n");
if (blen >= USE_SCRAMBLE)
{
if (smax <= UB2MAXVAL+1)
fprintf(f, "extern ub2 scramble[];\n");
else
fprintf(f, "extern ub4 scramble[];\n");
}
}
fprintf(f, "#define PHASHLEN 0x%x /* length of hash mapping table */\n",
blen);
}
fprintf(f, "#define PHASHNKEYS %u /* How many keys were hashed */\n",
nkeys);
fprintf(f, "#define PHASHRANGE %u /* Range any input might map to */\n",
smax);
fprintf(f, "#define PHASHSALT 0x%.8x /* internal, initialize normal hash */\n",
salt*0x9e3779b9);
fprintf(f, "\n");
fprintf(f, "ub4 phash();\n");
fprintf(f, "\n");
fprintf(f, "#endif /* PHASH */\n");
fprintf(f, "\n");
fclose(f);
}
/* make the .c file */
/* tab: table indexed by b */
/* smax: range of scramble[] */
/* blen: b in 0..blen-1, power of 2 */
/* scramble: used in final hash */
/* final: code for the final hash */
/* form: user directives */
static void
make_c(bstuff *tab, ub4 smax, ub4 blen, ub4 *scramble, gencode *final, hashform *form)
{
ub4 i;
FILE *f;
f = fopen("phash.c", "w");
fprintf(f, "/* Generated File, DO NOT EDIT */\n");
fprintf(f, "/* table for the mapping for the perfect hash */\n");
fprintf(f, "#ifndef STANDARD\n");
fprintf(f, "#include \"standard.h\"\n");
fprintf(f, "#endif /* STANDARD */\n");
fprintf(f, "#ifndef PHASH\n");
fprintf(f, "#include \"phash.h\"\n");
fprintf(f, "#endif /* PHASH */\n");
fprintf(f, "#ifndef LOOKUPA\n");
fprintf(f, "#include \"lookupa.h\"\n");
fprintf(f, "#endif /* LOOKUPA */\n");
fprintf(f, "\n");
if (blen >= USE_SCRAMBLE)
{
fprintf(f, "/* A way to make the 1-byte values in tab bigger */\n");
if (smax > UB2MAXVAL+1)
{
fprintf(f, "ub4 scramble[] = {\n");
for (i=0; i<=UB1MAXVAL; i+=4)
fprintf(f, "0x%.8x, 0x%.8x, 0x%.8x, 0x%.8x,\n",
scramble[i+0], scramble[i+1], scramble[i+2], scramble[i+3]);
}
else
{
fprintf(f, "ub2 scramble[] = {\n");
for (i=0; i<=UB1MAXVAL; i+=8)
fprintf(f,
"0x%.4x, 0x%.4x, 0x%.4x, 0x%.4x, 0x%.4x, 0x%.4x, 0x%.4x, 0x%.4x,\n",
scramble[i+0], scramble[i+1], scramble[i+2], scramble[i+3],
scramble[i+4], scramble[i+5], scramble[i+6], scramble[i+7]);
}
fprintf(f, "};\n");
fprintf(f, "\n");
}
if (blen > 0)
{
fprintf(f, "/* small adjustments to _a_ to make values distinct */\n");
if (smax <= UB1MAXVAL+1 || blen >= USE_SCRAMBLE)
fprintf(f, "ub1 tab[] = {\n");
else
fprintf(f, "ub2 tab[] = {\n");
if (blen < 16)
{
for (i=0; i<blen; ++i) fprintf(f, "%3d,", scramble[tab[i].val_b]);
}
else if (blen <= 1024)
{
for (i=0; i<blen; i+=16)
fprintf(f, "%u,%u,%u,%u,%u,%u,%u,%u,%u,%u,%u,%u,%u,%u,%u,%u,\n",
scramble[tab[i+0].val_b], scramble[tab[i+1].val_b],
scramble[tab[i+2].val_b], scramble[tab[i+3].val_b],
scramble[tab[i+4].val_b], scramble[tab[i+5].val_b],
scramble[tab[i+6].val_b], scramble[tab[i+7].val_b],
scramble[tab[i+8].val_b], scramble[tab[i+9].val_b],
scramble[tab[i+10].val_b], scramble[tab[i+11].val_b],
scramble[tab[i+12].val_b], scramble[tab[i+13].val_b],
scramble[tab[i+14].val_b], scramble[tab[i+15].val_b]);
}
else if (blen < USE_SCRAMBLE)
{
for (i=0; i<blen; i+=8)
fprintf(f, "%u,%u,%u,%u,%u,%u,%u,%u,\n",
scramble[tab[i+0].val_b], scramble[tab[i+1].val_b],
scramble[tab[i+2].val_b], scramble[tab[i+3].val_b],
scramble[tab[i+4].val_b], scramble[tab[i+5].val_b],
scramble[tab[i+6].val_b], scramble[tab[i+7].val_b]);
}
else
{
for (i=0; i<blen; i+=16)
fprintf(f, "%u,%u,%u,%u,%u,%u,%u,%u,%u,%u,%u,%u,%u,%u,%u,%u,\n",
tab[i+0].val_b, tab[i+1].val_b,
tab[i+2].val_b, tab[i+3].val_b,
tab[i+4].val_b, tab[i+5].val_b,
tab[i+6].val_b, tab[i+7].val_b,
tab[i+8].val_b, tab[i+9].val_b,
tab[i+10].val_b, tab[i+11].val_b,
tab[i+12].val_b, tab[i+13].val_b,
tab[i+14].val_b, tab[i+15].val_b);
}
fprintf(f, "};\n");
fprintf(f, "\n");
}
fprintf(f, "/* The hash function */\n");
switch(form->mode)
{
case NORMAL_HM:
fprintf(f, "ub4 phash(char *key, int len)\n");
break;
case INLINE_HM:
case HEX_HM:
case DECIMAL_HM:
fprintf(f, "ub4 phash(ub4 val)\n");
break;
case AB_HM:
case ABDEC_HM:
fprintf(f, "ub4 phash(ub4 a, ub4 b)\n");
break;
}
fprintf(f, "{\n");
for (i=0; i<final->used; ++i)
fputs(final->line[i], f);
fprintf(f, " return rsl;\n");
fprintf(f, "}\n");
fprintf(f, "\n");
fclose(f);
}
/*
------------------------------------------------------------------------------
Read in the keys, find the hash, and write the .c and .h files
------------------------------------------------------------------------------
*/
/* form: user directives */
static void driver(hashform *form)
{
ub4 nkeys; /* number of keys */
key *keys; /* head of list of keys */
bstuff *tab; /* table indexed by b */
ub4 smax; /* scramble[] values in 0..smax-1, a power of 2 */
ub4 alen; /* a in 0..alen-1, a power of 2 */
ub4 blen; /* b in 0..blen-1, a power of 2 */
ub4 salt; /* a parameter to the hash function */
reroot *textroot; /* MAXKEYLEN-character text lines */
reroot *keyroot; /* source of keys */
gencode final; /* code for final hash */
ub4 i;
ub4 scramble[SCRAMBLE_LEN]; /* used in final hash function */
char buf[10][80]; /* buffer for generated code */
char *buf2[10]; /* also for generated code */
/* set up memory sources */
textroot = remkroot((size_t)MAXKEYLEN);
keyroot = remkroot(sizeof(key));
/* set up code for final hash */
final.line = buf2;
final.used = 0;
final.len = 10;
for (i=0; i<10; ++i) final.line[i] = buf[i];
/* read in the list of keywords */
getkeys(&keys, &nkeys, textroot, keyroot, form);
printf("Read in %u keys\n",nkeys);
/* find the hash */
findhash(&tab, &alen, &blen, &salt, &final,
scramble, &smax, keys, nkeys, form);
/* generate the phash.h file */
make_h(blen, smax, nkeys, salt);
printf("Wrote phash.h\n");
/* generate the phash.c file */
make_c(tab, smax, blen, scramble, &final, form);
printf("Wrote phash.c\n");
/* clean up memory sources */
refree(textroot);
refree(keyroot);
free((void *)tab);
printf("Cleaned up\n");
}
/* Describe how to use this utility */
static void usage_error()
{
printf("Usage: perfect [-{NnIiHhDdAaBb}{MmPp}{FfSs}] < key.txt \n");
printf("The input is a list of keys, one key per line.\n");
printf("Only one of NnIiHhDdAa and one of MmPp may be specified.\n");
printf(" N,n: normal mode, key is any string string (default).\n");
printf(" I,i: initial hash for ASCII char strings.\n");
printf("The initial hash must be\n");
printf(" hash = PHASHSALT;\n");
printf(" for (i=0; i<keylength; ++i) {\n");
printf(" hash = (hash ^ key[i]) + ((hash<<26)+(hash>>6));\n");
printf(" }\n");
printf("Note that this can be inlined in any user loop that walks\n");
printf("through the key anyways, eliminating the loop overhead.\n");
printf(" H,h: Keys are 4-byte integers in hex in this format:\n");
printf("ffffffff\n");
printf("This is good for optimizing switch statement compilation.\n");
printf(" D,d: Same as H,h, except in decimal not hexidecimal\n");
printf(" A,a: An (A,B) pair is supplied in hex in this format:\n");
printf("aaa bbb\n");
printf(" B,b: Same as A,a, except in decimal not hexidecimal\n");
printf("This mode does nothing but find the values of tab[].\n");
printf("*A* must be less than the total number of keys.\n");
printf(" M,m: Minimal perfect hash. Hash will be in 0..nkeys-1 (default)\n");
printf(" P,p: Perfect hash. Hash will be in 0..n-1, where n >= nkeys\n");
printf("and n is a power of 2. Will probably use a smaller tab[].");
printf(" F,f: Fast mode. Generate the perfect hash fast.\n");
printf(" S,s: Slow mode. Spend time finding a good perfect hash.\n");
exit(SUCCESS);
}
/* Interpret arguments and call the driver */
/* See usage_error for the expected arguments */
int main(int argc, char **argv)
{
int mode_given = FALSE;
int minimal_given = FALSE;
int speed_given = FALSE;
hashform form;
char *c;
/* default behavior */
form.mode = NORMAL_HM;
form.hashtype = STRING_HT;
form.perfect = MINIMAL_HP;
form.speed = SLOW_HS;
/* let the user override the default behavior */
switch (argc)
{
case 1:
break;
case 2:
if (argv[1][0] != '-')
{
usage_error();
break;
}
for (c = &argv[1][1]; *c != '\0'; ++c) switch(*c)
{
case 'n': case 'N':
case 'i': case 'I':
case 'h': case 'H':
case 'd': case 'D':
case 'a': case 'A':
case 'b': case 'B':
if (mode_given == TRUE)
usage_error();
switch(*c)
{
case 'n': case 'N':
form.mode = NORMAL_HM; form.hashtype = STRING_HT; break;
case 'i': case 'I':
form.mode = INLINE_HM; form.hashtype = STRING_HT; break;
case 'h': case 'H':
form.mode = HEX_HM; form.hashtype = INT_HT; break;
case 'd': case 'D':
form.mode = DECIMAL_HM; form.hashtype = INT_HT; break;
case 'a': case 'A':
form.mode = AB_HM; form.hashtype = AB_HT; break;
case 'b': case 'B':
form.mode = ABDEC_HM; form.hashtype = AB_HT; break;
}
mode_given = TRUE;
break;
case 'm': case 'M':
case 'p': case 'P':
if (minimal_given == TRUE)
usage_error();
switch(*c)
{
case 'p': case 'P':
form.perfect = NORMAL_HP; break;
case 'm': case 'M':
form.perfect = MINIMAL_HP; break;
}
minimal_given = TRUE;
break;
case 'f': case 'F':
case 's': case 'S':
if (speed_given == TRUE)
usage_error();
switch(*c)
{
case 'f': case 'F':
form.speed = FAST_HS; break;
case 's': case 'S':
form.speed = SLOW_HS; break;
}
speed_given = TRUE;
break;
default:
usage_error();
}
break;
default:
usage_error();
}
/* Generate the [minimal] perfect hash */
driver(&form);
return SUCCESS;
}