random.c 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258
  1. /*
  2. * Copyright (c) 1983 Regents of the University of California.
  3. * All rights reserved.
  4. *
  5. * Redistribution and use in source and binary forms are permitted
  6. * provided that the above copyright notice and this paragraph are
  7. * duplicated in all such forms and that any documentation,
  8. * advertising materials, and other materials related to such
  9. * distribution and use acknowledge that the software was developed
  10. * by the University of California, Berkeley. The name of the
  11. * University may not be used to endorse or promote products derived
  12. * from this software without specific prior written permission.
  13. * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR
  14. * IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
  15. * WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
  16. */
  17. /*
  18. * This is derived from the Berkeley source:
  19. * @(#)random.c 5.5 (Berkeley) 7/6/88
  20. * It was reworked for the GNU C Library by Roland McGrath.
  21. * Rewritten to use reentrant functions by Ulrich Drepper, 1995.
  22. */
  23. #define random_r __random_r
  24. #define srandom_r __srandom_r
  25. #define _GNU_SOURCE
  26. #include <features.h>
  27. #include <limits.h>
  28. #include <stddef.h>
  29. #include <stdlib.h>
  30. #ifdef __UCLIBC_HAS_THREADS__
  31. #include <pthread.h>
  32. /* POSIX.1c requires that there is mutual exclusion for the `rand' and
  33. `srand' functions to prevent concurrent calls from modifying common
  34. data. */
  35. static pthread_mutex_t lock = PTHREAD_RECURSIVE_MUTEX_INITIALIZER_NP;
  36. #else
  37. #define __pthread_mutex_lock(x)
  38. #define __pthread_mutex_unlock(x)
  39. #endif
  40. /* An improved random number generation package. In addition to the standard
  41. rand()/srand() like interface, this package also has a special state info
  42. interface. The initstate() routine is called with a seed, an array of
  43. bytes, and a count of how many bytes are being passed in; this array is
  44. then initialized to contain information for random number generation with
  45. that much state information. Good sizes for the amount of state
  46. information are 32, 64, 128, and 256 bytes. The state can be switched by
  47. calling the setstate() function with the same array as was initialized
  48. with initstate(). By default, the package runs with 128 bytes of state
  49. information and generates far better random numbers than a linear
  50. congruential generator. If the amount of state information is less than
  51. 32 bytes, a simple linear congruential R.N.G. is used. Internally, the
  52. state information is treated as an array of longs; the zeroth element of
  53. the array is the type of R.N.G. being used (small integer); the remainder
  54. of the array is the state information for the R.N.G. Thus, 32 bytes of
  55. state information will give 7 longs worth of state information, which will
  56. allow a degree seven polynomial. (Note: The zeroth word of state
  57. information also has some other information stored in it; see setstate
  58. for details). The random number generation technique is a linear feedback
  59. shift register approach, employing trinomials (since there are fewer terms
  60. to sum up that way). In this approach, the least significant bit of all
  61. the numbers in the state table will act as a linear feedback shift register,
  62. and will have period 2^deg - 1 (where deg is the degree of the polynomial
  63. being used, assuming that the polynomial is irreducible and primitive).
  64. The higher order bits will have longer periods, since their values are
  65. also influenced by pseudo-random carries out of the lower bits. The
  66. total period of the generator is approximately deg*(2**deg - 1); thus
  67. doubling the amount of state information has a vast influence on the
  68. period of the generator. Note: The deg*(2**deg - 1) is an approximation
  69. only good for large deg, when the period of the shift register is the
  70. dominant factor. With deg equal to seven, the period is actually much
  71. longer than the 7*(2**7 - 1) predicted by this formula. */
  72. /* For each of the currently supported random number generators, we have a
  73. break value on the amount of state information (you need at least this many
  74. bytes of state info to support this random number generator), a degree for
  75. the polynomial (actually a trinomial) that the R.N.G. is based on, and
  76. separation between the two lower order coefficients of the trinomial. */
  77. /* Linear congruential. */
  78. #define TYPE_0 0
  79. #define BREAK_0 8
  80. #define DEG_0 0
  81. #define SEP_0 0
  82. /* x**7 + x**3 + 1. */
  83. #define TYPE_1 1
  84. #define BREAK_1 32
  85. #define DEG_1 7
  86. #define SEP_1 3
  87. /* x**15 + x + 1. */
  88. #define TYPE_2 2
  89. #define BREAK_2 64
  90. #define DEG_2 15
  91. #define SEP_2 1
  92. /* x**31 + x**3 + 1. */
  93. #define TYPE_3 3
  94. #define BREAK_3 128
  95. #define DEG_3 31
  96. #define SEP_3 3
  97. /* x**63 + x + 1. */
  98. #define TYPE_4 4
  99. #define BREAK_4 256
  100. #define DEG_4 63
  101. #define SEP_4 1
  102. /* Array versions of the above information to make code run faster.
  103. Relies on fact that TYPE_i == i. */
  104. #define MAX_TYPES 5 /* Max number of types above. */
  105. /* Initially, everything is set up as if from:
  106. initstate(1, randtbl, 128);
  107. Note that this initialization takes advantage of the fact that srandom
  108. advances the front and rear pointers 10*rand_deg times, and hence the
  109. rear pointer which starts at 0 will also end up at zero; thus the zeroth
  110. element of the state information, which contains info about the current
  111. position of the rear pointer is just
  112. (MAX_TYPES * (rptr - state)) + TYPE_3 == TYPE_3. */
  113. static int32_t randtbl[DEG_3 + 1] =
  114. {
  115. TYPE_3,
  116. -1726662223, 379960547, 1735697613, 1040273694, 1313901226,
  117. 1627687941, -179304937, -2073333483, 1780058412, -1989503057,
  118. -615974602, 344556628, 939512070, -1249116260, 1507946756,
  119. -812545463, 154635395, 1388815473, -1926676823, 525320961,
  120. -1009028674, 968117788, -123449607, 1284210865, 435012392,
  121. -2017506339, -911064859, -370259173, 1132637927, 1398500161,
  122. -205601318,
  123. };
  124. static struct random_data unsafe_state =
  125. {
  126. /* FPTR and RPTR are two pointers into the state info, a front and a rear
  127. pointer. These two pointers are always rand_sep places aparts, as they
  128. cycle through the state information. (Yes, this does mean we could get
  129. away with just one pointer, but the code for random is more efficient
  130. this way). The pointers are left positioned as they would be from the call:
  131. initstate(1, randtbl, 128);
  132. (The position of the rear pointer, rptr, is really 0 (as explained above
  133. in the initialization of randtbl) because the state table pointer is set
  134. to point to randtbl[1] (as explained below).) */
  135. fptr : &randtbl[SEP_3 + 1],
  136. rptr : &randtbl[1],
  137. /* The following things are the pointer to the state information table,
  138. the type of the current generator, the degree of the current polynomial
  139. being used, and the separation between the two pointers.
  140. Note that for efficiency of random, we remember the first location of
  141. the state information, not the zeroth. Hence it is valid to access
  142. state[-1], which is used to store the type of the R.N.G.
  143. Also, we remember the last location, since this is more efficient than
  144. indexing every time to find the address of the last element to see if
  145. the front and rear pointers have wrapped. */
  146. state : &randtbl[1],
  147. rand_type : TYPE_3,
  148. rand_deg : DEG_3,
  149. rand_sep : SEP_3,
  150. end_ptr : &randtbl[sizeof (randtbl) / sizeof (randtbl[0])]
  151. };
  152. /* Initialize the random number generator based on the given seed. If the
  153. type is the trivial no-state-information type, just remember the seed.
  154. Otherwise, initializes state[] based on the given "seed" via a linear
  155. congruential generator. Then, the pointers are set to known locations
  156. that are exactly rand_sep places apart. Lastly, it cycles the state
  157. information a given number of times to get rid of any initial dependencies
  158. introduced by the L.C.R.N.G. Note that the initialization of randtbl[]
  159. for default usage relies on values produced by this routine. */
  160. void srandom (unsigned int x)
  161. {
  162. __pthread_mutex_lock(&lock);
  163. srandom_r (x, &unsafe_state);
  164. __pthread_mutex_unlock(&lock);
  165. }
  166. weak_alias (srandom, srand)
  167. /* Initialize the state information in the given array of N bytes for
  168. future random number generation. Based on the number of bytes we
  169. are given, and the break values for the different R.N.G.'s, we choose
  170. the best (largest) one we can and set things up for it. srandom is
  171. then called to initialize the state information. Note that on return
  172. from srandom, we set state[-1] to be the type multiplexed with the current
  173. value of the rear pointer; this is so successive calls to initstate won't
  174. lose this information and will be able to restart with setstate.
  175. Note: The first thing we do is save the current state, if any, just like
  176. setstate so that it doesn't matter when initstate is called.
  177. Returns a pointer to the old state. */
  178. char * initstate (unsigned int seed, char *arg_state, size_t n)
  179. {
  180. int32_t *ostate;
  181. __pthread_mutex_lock(&lock);
  182. ostate = &unsafe_state.state[-1];
  183. initstate_r (seed, arg_state, n, &unsafe_state);
  184. __pthread_mutex_unlock(&lock);
  185. return (char *) ostate;
  186. }
  187. /* Restore the state from the given state array.
  188. Note: It is important that we also remember the locations of the pointers
  189. in the current state information, and restore the locations of the pointers
  190. from the old state information. This is done by multiplexing the pointer
  191. location into the zeroth word of the state information. Note that due
  192. to the order in which things are done, it is OK to call setstate with the
  193. same state as the current state
  194. Returns a pointer to the old state information. */
  195. char * setstate (char *arg_state)
  196. {
  197. int32_t *ostate;
  198. __pthread_mutex_lock(&lock);
  199. ostate = &unsafe_state.state[-1];
  200. if (setstate_r (arg_state, &unsafe_state) < 0)
  201. ostate = NULL;
  202. __pthread_mutex_unlock(&lock);
  203. return (char *) ostate;
  204. }
  205. /* If we are using the trivial TYPE_0 R.N.G., just do the old linear
  206. congruential bit. Otherwise, we do our fancy trinomial stuff, which is the
  207. same in all the other cases due to all the global variables that have been
  208. set up. The basic operation is to add the number at the rear pointer into
  209. the one at the front pointer. Then both pointers are advanced to the next
  210. location cyclically in the table. The value returned is the sum generated,
  211. reduced to 31 bits by throwing away the "least random" low bit.
  212. Note: The code takes advantage of the fact that both the front and
  213. rear pointers can't wrap on the same call by not testing the rear
  214. pointer if the front one has wrapped. Returns a 31-bit random number. */
  215. long int attribute_hidden __random (void)
  216. {
  217. int32_t retval;
  218. __pthread_mutex_lock(&lock);
  219. random_r (&unsafe_state, &retval);
  220. __pthread_mutex_unlock(&lock);
  221. return retval;
  222. }
  223. strong_alias(__random,random)