Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 1 Aug 2021 23:47:35 -0400
From:      Alexander Motin <mav@FreeBSD.org>
To:        Mateusz Guzik <mjguzik@gmail.com>
Cc:        src-committers@freebsd.org, dev-commits-src-all@freebsd.org, dev-commits-src-main@freebsd.org
Subject:   Re: git: 8bb173fb5bc3 - main - sched_ule(4): Use trylock when stealing load.
Message-ID:  <443ba55d-aff1-1f36-e3e7-00df95f4abdc@FreeBSD.org>
In-Reply-To: <CAGudoHEeOZ8aSijNnyU3UU4Cb2BfTXoYiM%2BBHD-A1JgnU_OD0A@mail.gmail.com>
References:  <202108020258.1722walG094152@gitrepo.freebsd.org> <CAGudoHEeOZ8aSijNnyU3UU4Cb2BfTXoYiM%2BBHD-A1JgnU_OD0A@mail.gmail.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On 01.08.2021 23:43, Mateusz Guzik wrote:
> Mostly related, I just had a look at the code and noticed:
> 
> static uint32_t
> sched_random(void)
> {
>         uint32_t *rndptr;
> 
>         rndptr = DPCPU_PTR(randomval);
>         *rndptr = *rndptr * 69069 + 5;
> 
>         return (*rndptr >> 16);
> }
> 
> Except randomval starts at 0 for all CPUs. Should be easy to pre-init
> with an actual random value. Is that something you played with?

It is pretty old code, so no, at least not this time.  But I doubt it
would make a any difference, since different CPUs should have different
number of calls to this, so they should naturally run away from each-other.

-- 
Alexander Motin



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?443ba55d-aff1-1f36-e3e7-00df95f4abdc>