OpenCores
URL https://opencores.org/ocsvn/or1k/or1k/trunk

Subversion Repositories or1k

[/] [or1k/] [trunk/] [linux/] [uClibc/] [libc/] [stdlib/] [random.c] - Blame information for rev 1771

Go to most recent revision | Details | Compare with Previous | View Log

Line No. Rev Author Line
1 1325 phoenix
/*
2
 * Copyright (c) 1983 Regents of the University of California.
3
 * All rights reserved.
4
 *
5
 * Redistribution and use in source and binary forms are permitted
6
 * provided that the above copyright notice and this paragraph are
7
 * duplicated in all such forms and that any documentation,
8
 * advertising materials, and other materials related to such
9
 * distribution and use acknowledge that the software was developed
10
 * by the University of California, Berkeley.  The name of the
11
 * University may not be used to endorse or promote products derived
12
 * from this software without specific prior written permission.
13
 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR
14
 * IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
15
 * WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
16
 */
17
 
18
/*
19
 * This is derived from the Berkeley source:
20
 *      @(#)random.c    5.5 (Berkeley) 7/6/88
21
 * It was reworked for the GNU C Library by Roland McGrath.
22
 * Rewritten to use reentrant functions by Ulrich Drepper, 1995.
23
 */
24
 
25
#define _GNU_SOURCE
26
#include <features.h>
27
#include <limits.h>
28
#include <stddef.h>
29
#include <stdlib.h>
30
#ifdef __UCLIBC_HAS_THREADS__
31
#include <pthread.h>
32
/* POSIX.1c requires that there is mutual exclusion for the `rand' and
33
   `srand' functions to prevent concurrent calls from modifying common
34
   data.  */
35
static pthread_mutex_t lock = PTHREAD_RECURSIVE_MUTEX_INITIALIZER_NP;
36
#else
37
#define __pthread_mutex_lock(x)
38
#define __pthread_mutex_unlock(x)
39
#endif
40
 
41
/* An improved random number generation package.  In addition to the standard
42
   rand()/srand() like interface, this package also has a special state info
43
   interface.  The initstate() routine is called with a seed, an array of
44
   bytes, and a count of how many bytes are being passed in; this array is
45
   then initialized to contain information for random number generation with
46
   that much state information.  Good sizes for the amount of state
47
   information are 32, 64, 128, and 256 bytes.  The state can be switched by
48
   calling the setstate() function with the same array as was initialized
49
   with initstate().  By default, the package runs with 128 bytes of state
50
   information and generates far better random numbers than a linear
51
   congruential generator.  If the amount of state information is less than
52
   32 bytes, a simple linear congruential R.N.G. is used.  Internally, the
53
   state information is treated as an array of longs; the zeroth element of
54
   the array is the type of R.N.G. being used (small integer); the remainder
55
   of the array is the state information for the R.N.G.  Thus, 32 bytes of
56
   state information will give 7 longs worth of state information, which will
57
   allow a degree seven polynomial.  (Note: The zeroth word of state
58
   information also has some other information stored in it; see setstate
59
   for details).  The random number generation technique is a linear feedback
60
   shift register approach, employing trinomials (since there are fewer terms
61
   to sum up that way).  In this approach, the least significant bit of all
62
   the numbers in the state table will act as a linear feedback shift register,
63
   and will have period 2^deg - 1 (where deg is the degree of the polynomial
64
   being used, assuming that the polynomial is irreducible and primitive).
65
   The higher order bits will have longer periods, since their values are
66
   also influenced by pseudo-random carries out of the lower bits.  The
67
   total period of the generator is approximately deg*(2**deg - 1); thus
68
   doubling the amount of state information has a vast influence on the
69
   period of the generator.  Note: The deg*(2**deg - 1) is an approximation
70
   only good for large deg, when the period of the shift register is the
71
   dominant factor.  With deg equal to seven, the period is actually much
72
   longer than the 7*(2**7 - 1) predicted by this formula.  */
73
 
74
 
75
 
76
/* For each of the currently supported random number generators, we have a
77
   break value on the amount of state information (you need at least this many
78
   bytes of state info to support this random number generator), a degree for
79
   the polynomial (actually a trinomial) that the R.N.G. is based on, and
80
   separation between the two lower order coefficients of the trinomial.  */
81
 
82
/* Linear congruential.  */
83
#define TYPE_0          0
84
#define BREAK_0         8
85
#define DEG_0           0
86
#define SEP_0           0
87
 
88
/* x**7 + x**3 + 1.  */
89
#define TYPE_1          1
90
#define BREAK_1         32
91
#define DEG_1           7
92
#define SEP_1           3
93
 
94
/* x**15 + x + 1.  */
95
#define TYPE_2          2
96
#define BREAK_2         64
97
#define DEG_2           15
98
#define SEP_2           1
99
 
100
/* x**31 + x**3 + 1.  */
101
#define TYPE_3          3
102
#define BREAK_3         128
103
#define DEG_3           31
104
#define SEP_3           3
105
 
106
/* x**63 + x + 1.  */
107
#define TYPE_4          4
108
#define BREAK_4         256
109
#define DEG_4           63
110
#define SEP_4           1
111
 
112
 
113
/* Array versions of the above information to make code run faster.
114
   Relies on fact that TYPE_i == i.  */
115
 
116
#define MAX_TYPES       5       /* Max number of types above.  */
117
 
118
 
119
/* Initially, everything is set up as if from:
120
        initstate(1, randtbl, 128);
121
   Note that this initialization takes advantage of the fact that srandom
122
   advances the front and rear pointers 10*rand_deg times, and hence the
123
   rear pointer which starts at 0 will also end up at zero; thus the zeroth
124
   element of the state information, which contains info about the current
125
   position of the rear pointer is just
126
        (MAX_TYPES * (rptr - state)) + TYPE_3 == TYPE_3.  */
127
 
128
static int32_t randtbl[DEG_3 + 1] =
129
{
130
    TYPE_3,
131
 
132
    -1726662223, 379960547, 1735697613, 1040273694, 1313901226,
133
    1627687941, -179304937, -2073333483, 1780058412, -1989503057,
134
    -615974602, 344556628, 939512070, -1249116260, 1507946756,
135
    -812545463, 154635395, 1388815473, -1926676823, 525320961,
136
    -1009028674, 968117788, -123449607, 1284210865, 435012392,
137
    -2017506339, -911064859, -370259173, 1132637927, 1398500161,
138
    -205601318,
139
};
140
 
141
 
142
static struct random_data unsafe_state =
143
{
144
    /* FPTR and RPTR are two pointers into the state info, a front and a rear
145
       pointer.  These two pointers are always rand_sep places aparts, as they
146
       cycle through the state information.  (Yes, this does mean we could get
147
       away with just one pointer, but the code for random is more efficient
148
       this way).  The pointers are left positioned as they would be from the call:
149
       initstate(1, randtbl, 128);
150
       (The position of the rear pointer, rptr, is really 0 (as explained above
151
       in the initialization of randtbl) because the state table pointer is set
152
       to point to randtbl[1] (as explained below).)  */
153
 
154
    fptr : &randtbl[SEP_3 + 1],
155
    rptr : &randtbl[1],
156
 
157
    /* The following things are the pointer to the state information table,
158
       the type of the current generator, the degree of the current polynomial
159
       being used, and the separation between the two pointers.
160
       Note that for efficiency of random, we remember the first location of
161
       the state information, not the zeroth.  Hence it is valid to access
162
       state[-1], which is used to store the type of the R.N.G.
163
       Also, we remember the last location, since this is more efficient than
164
       indexing every time to find the address of the last element to see if
165
       the front and rear pointers have wrapped.  */
166
 
167
    state : &randtbl[1],
168
 
169
    rand_type : TYPE_3,
170
    rand_deg : DEG_3,
171
    rand_sep : SEP_3,
172
 
173
    end_ptr : &randtbl[sizeof (randtbl) / sizeof (randtbl[0])]
174
};
175
 
176
 
177
/* Initialize the random number generator based on the given seed.  If the
178
   type is the trivial no-state-information type, just remember the seed.
179
   Otherwise, initializes state[] based on the given "seed" via a linear
180
   congruential generator.  Then, the pointers are set to known locations
181
   that are exactly rand_sep places apart.  Lastly, it cycles the state
182
   information a given number of times to get rid of any initial dependencies
183
   introduced by the L.C.R.N.G.  Note that the initialization of randtbl[]
184
   for default usage relies on values produced by this routine.  */
185
void srandom (unsigned int x)
186
{
187
    __pthread_mutex_lock(&lock);
188
    srandom_r (x, &unsafe_state);
189
    __pthread_mutex_unlock(&lock);
190
}
191
weak_alias (srandom, srand)
192
 
193
/* Initialize the state information in the given array of N bytes for
194
   future random number generation.  Based on the number of bytes we
195
   are given, and the break values for the different R.N.G.'s, we choose
196
   the best (largest) one we can and set things up for it.  srandom is
197
   then called to initialize the state information.  Note that on return
198
   from srandom, we set state[-1] to be the type multiplexed with the current
199
   value of the rear pointer; this is so successive calls to initstate won't
200
   lose this information and will be able to restart with setstate.
201
   Note: The first thing we do is save the current state, if any, just like
202
   setstate so that it doesn't matter when initstate is called.
203
   Returns a pointer to the old state.  */
204
char * initstate (unsigned int seed, char *arg_state, size_t n)
205
{
206
    int32_t *ostate;
207
 
208
    __pthread_mutex_lock(&lock);
209
    ostate = &unsafe_state.state[-1];
210
    initstate_r (seed, arg_state, n, &unsafe_state);
211
    __pthread_mutex_unlock(&lock);
212
    return (char *) ostate;
213
}
214
 
215
/* Restore the state from the given state array.
216
   Note: It is important that we also remember the locations of the pointers
217
   in the current state information, and restore the locations of the pointers
218
   from the old state information.  This is done by multiplexing the pointer
219
   location into the zeroth word of the state information. Note that due
220
   to the order in which things are done, it is OK to call setstate with the
221
   same state as the current state
222
   Returns a pointer to the old state information.  */
223
char * setstate (char *arg_state)
224
{
225
    int32_t *ostate;
226
 
227
    __pthread_mutex_lock(&lock);
228
    ostate = &unsafe_state.state[-1];
229
    if (setstate_r (arg_state, &unsafe_state) < 0)
230
        ostate = NULL;
231
    __pthread_mutex_unlock(&lock);
232
    return (char *) ostate;
233
}
234
 
235
/* If we are using the trivial TYPE_0 R.N.G., just do the old linear
236
   congruential bit.  Otherwise, we do our fancy trinomial stuff, which is the
237
   same in all the other cases due to all the global variables that have been
238
   set up.  The basic operation is to add the number at the rear pointer into
239
   the one at the front pointer.  Then both pointers are advanced to the next
240
   location cyclically in the table.  The value returned is the sum generated,
241
   reduced to 31 bits by throwing away the "least random" low bit.
242
   Note: The code takes advantage of the fact that both the front and
243
   rear pointers can't wrap on the same call by not testing the rear
244
   pointer if the front one has wrapped.  Returns a 31-bit random number.  */
245
 
246
long int random ()
247
{
248
  int32_t retval;
249
 
250
  __pthread_mutex_lock(&lock);
251
  random_r (&unsafe_state, &retval);
252
  __pthread_mutex_unlock(&lock);
253
  return retval;
254
}
255
 

powered by: WebSVN 2.1.0

© copyright 1999-2024 OpenCores.org, equivalent to Oliscience, all rights reserved. OpenCores®, registered trademark.