From: Jerin Jacob <jerinjacobk@gmail.com>
To: Dan Gora <dg@adax.com>
Cc: "Thomas Monjalon" <thomas@monjalon.net>,
"Mattias Rönnblom" <mattias.ronnblom@ericsson.com>,
"David Marchand" <david.marchand@redhat.com>,
dpdk-dev <dev@dpdk.org>, "Gavin Hu" <gavin.hu@arm.com>,
"Honnappa Nagarahalli" <Honnappa.Nagarahalli@arm.com>
Subject: Re: [dpdk-dev] [PATCH] eal: choose initial PRNG seed source at runtime
Date: Thu, 16 Apr 2020 11:37:57 +0530 [thread overview]
Message-ID: <CALBAE1P7PK3QuXOSBFzsf_AwBaUDSRT+K_FmKU9hdOY9TQ1-sA@mail.gmail.com> (raw)
In-Reply-To: <20200415231119.27845-1-dg@adax.com>
On Thu, Apr 16, 2020 at 4:42 AM Dan Gora <dg@adax.com> wrote:
>
> Instead of choosing to use getentropy() or the rdseed instruction for
> the random number generator entropy source using compilation flags,
> determine the best source at run time.
>
> This is accomplished by defining a weak symbol for getentropy(),
> checking that the compiler can generate the rdseed instruction even if
> the compilation platform does not natively support it, and checking for
> the availability of the rdseed instruction on the execution platform
> using rte_cpu_get_flag_enabled().
>
> If neither getentropy() or rdseed is available, rte_get_timer_cycles()
> will be continue to be used as the entropy source.
>
> This also allows non-Mason builds to use getentropy().
>
> Signed-off-by: Dan Gora <dg@adax.com>
> ---
> config/x86/meson.build | 7 +++++++
> lib/librte_eal/common/rte_random.c | 29 ++++++++++++++++++++++++-----
> lib/librte_eal/meson.build | 3 ---
> mk/rte.cpuflags.mk | 8 ++++++++
> 4 files changed, 39 insertions(+), 8 deletions(-)
>
> diff --git a/config/x86/meson.build b/config/x86/meson.build
> index adc857ba2..214b16f2a 100644
> --- a/config/x86/meson.build
> +++ b/config/x86/meson.build
> @@ -20,6 +20,13 @@ if cc.get_define('__SSE4_2__', args: machine_args) == ''
> machine_args += '-msse4'
> endif
>
> +# set -mrdseed if necessary so _rdseed32_step compiles if the
> +# compilation host does not support the RDSEED instruction.
> +if cc.get_define('__RDSEED__', args: machine_args) == '' and cc.has_argument('-mrdseed')
> + machine_args += '-mrdseed'
> + message('RDSEED not enabled by default, explicitly setting -mrdseed')
> +endif
> +
> base_flags = ['SSE', 'SSE2', 'SSE3','SSSE3', 'SSE4_1', 'SSE4_2']
> foreach f:base_flags
> dpdk_conf.set('RTE_MACHINE_CPUFLAG_' + f, 1)
> diff --git a/lib/librte_eal/common/rte_random.c b/lib/librte_eal/common/rte_random.c
> index 57ec8fb2b..40f8b5aab 100644
> --- a/lib/librte_eal/common/rte_random.c
> +++ b/lib/librte_eal/common/rte_random.c
> @@ -25,6 +25,8 @@ struct rte_rand_state {
>
> static struct rte_rand_state rand_states[RTE_MAX_LCORE];
>
> +__rte_weak int getentropy(void *__buffer, size_t __length);
> +
> static uint32_t
> __rte_rand_lcg32(uint32_t *seed)
> {
> @@ -176,10 +178,24 @@ rte_rand_max(uint64_t upper_bound)
> return res;
> }
>
> +/* Use rte_get_timer_cycles() if the system does not have
> + * genentropy() or the rdseed instruction.
> + */
> +__rte_weak int
> +getentropy(void *__buffer, size_t __length __rte_unused)
> +{
> + uint64_t *ge_seed = __buffer;
> +#ifdef RTE_MACHINE_CPUFLAG_RDSEED
> + if (rte_cpu_get_flag_enabled(RTE_CPUFLAG_RDSEED))
> + return -1;
> +#endif
> + *ge_seed = rte_get_timer_cycles();
> + return 0;
IMO, we need to create a new arch EAL abstraction to get uint64_t
random number. Reason being:
1) ARMv8.5 supports similar instruction
https://developer.arm.com/docs/ddi0595/c/aarch64-system-registers/rndr
2) Avoid #ifdef clutter in common code.
Abstraction can return a random uint64_t number. Based on the arch
capabilities, it can hook
to specialized instruction or rte_get_timer_cycles()
next prev parent reply other threads:[~2020-04-16 6:08 UTC|newest]
Thread overview: 10+ messages / expand[flat|nested] mbox.gz Atom feed top
2020-04-15 23:11 Dan Gora
2020-04-15 23:59 ` [dpdk-dev] [PATCH v2] " Dan Gora
2020-04-16 11:30 ` Mattias Rönnblom
2020-04-16 23:50 ` Dan Gora
2020-04-17 9:24 ` Mattias Rönnblom
2020-04-16 6:07 ` Jerin Jacob [this message]
2020-04-16 11:36 ` [dpdk-dev] [PATCH] " Mattias Rönnblom
2020-04-16 11:48 ` Jerin Jacob
2020-04-16 12:00 ` Mattias Rönnblom
2020-04-16 12:11 ` Jerin Jacob
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=CALBAE1P7PK3QuXOSBFzsf_AwBaUDSRT+K_FmKU9hdOY9TQ1-sA@mail.gmail.com \
--to=jerinjacobk@gmail.com \
--cc=Honnappa.Nagarahalli@arm.com \
--cc=david.marchand@redhat.com \
--cc=dev@dpdk.org \
--cc=dg@adax.com \
--cc=gavin.hu@arm.com \
--cc=mattias.ronnblom@ericsson.com \
--cc=thomas@monjalon.net \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).