< Previous by Date Date Index Next by Date >
< Previous in Thread Thread Index Next in Thread >

Re: [reSIProcate] Random.cxx and MultiCore systems


The only thing that I could think of is to use the new random_r and srand_r functions instead of random and srand. The glibc _r ones force the application to keep the “seed” value which might make it immune to the caching problem.

 

The issue with this approach was that the entire Random() class is static although you could just add a class wide static variable to hold the new userland data.

 

-Aron

 

 

From: Byron Campen [mailto:bcampen@xxxxxxxxxxxx]
Sent: Wednesday, March 19, 2008 2:55 PM
To: Alan Hawrylyshen
Cc: Aron Rosenberg; resiprocate-devel
Subject: Re: [reSIProcate] Random.cxx and MultiCore systems

 

            Upon some discussion, it seems that this is happening _in a single thread_, so using a thread-id will not help with this specific problem (although it is probably a good idea anyway). It does seem likely that we are running into a caching problem, although I am not sure what can be done about this.

 

            Anyone have any ideas?

 

Best regards,

Byron Campen

 



More to Byron's point. If you substitute the crypto random function, you will notice a significant increase in latency. A pseudo random cheap solution that doesn't exhibit this erect is needed.  We stumbled across something similar years ago when we ported to a then exotic dual processor machine. The problem occurred very rarely then but with 4+ cores and todays speeds I believe the problem will happen predictably as you have seen Aron. 

 

Alan
--

Sorry this is terse; it is from my handheld device. 


On 19 Mar 2008, at 10:14, Byron Campen <bcampen@xxxxxxxxxxxx> wrote:

            I wouldn't re-implement Random::getRandom() with getCryptoRandom(), since the contract on it is for providing cheap, pseudo-random numbers. It would be more reasonable to change the code that generates transaction-ids and tags (in fact, the code that generates Call-Ids has been tweaked to help with this very problem that you're seeing). The tweak in the Call-Id generation code involves throwing the thread-id into the generated bits, which solves the collision issue you're seeing. Maybe we could alter Random::getRandom() to xor the current thread-id with everything it returned (this would be in-keeping with "cheap, pseudo-random numbers")? Or maybe we could add a Random::getRandomReentrant() function?

 

            Anyone have an opinion on this?

 

Best regards,

Byron Campen



So this bug report concerns a very strange issue that we noticed on our brandnew Dual Quad Core machine (8 cpu’s) involving duplicate Call-Id’s, Transaction-ID’s and Tag’s being generated for independent INVITE’s. This behavior would then result in assert failures all over the stack.

 

We have a single instance of DUM/Resiprocate running on its own thread. Our application generates 4 independent INVITE requests at the same exact time which results in sequential calls eventually being made to Random.cxx and then glibc’s random() function. Of the four calls we get the following random values returned

 

Call 1: aaaaaaaaaaa

Call 2: bbbbbbbbbb

Call 3: aaaaaaaaaaa   (same exact sequence of random values as the first call)

Call 4: bbbbbbbbbb  (same exact sequence of random values as the second call)

 

Sometime later, various assert failures would occur due to duplicate TID values and all sorts of other issues.

 

If pause or sleep the thread for 1 MS then the the problem disappears. So what the heck is going on….

 

We think that DUM thread is being migrated across CPU’s between the different invocations of glibc’s random() function and the “seed” value is stale in a one of the CPU caches.

 

So how do we fix this – When we dug into the resiprocate Random.cxx code we noticed that although we had linked against OpenSSL, the OpenSSL random functions were not being used at all. They would be used to initialize the seed but not used to actually generate the random values.

 

If we used the crypto versions of the functions the repeatedness issue went away completely.

 

Here is a small patch which will use the crypto version if USE_OPENSSL is defined

 

--- rutil/Random.cxx.orig              2008-03-14 23:21:29.000000000 -0700

+++ rutil/Random.cxx    2008-03-15 00:26:59.000000000 -0700

@@ -149,8 +149,9 @@

 Random::getRandom()

 {

    initialize();

-

-#ifdef WIN32

+#if USE_OPENSSL

+   return getCryptoRandom();

+#elif WIN32

    assert( RAND_MAX == 0x7fff );

    int r1 = rand();

    int r2 = rand();

 

 

-Aron

 

Aron Rosenberg

SightSpeed

_______________________________________________

resiprocate-devel mailing list

_______________________________________________
resiprocate-devel mailing list
resiprocate-devel@xxxxxxxxxxxxxxx
https://list.resiprocate.org/mailman/listinfo/resiprocate-devel