/srv/irclogs.ubuntu.com/2012/05/18/#ubuntu-kernel.txt

=== josepht_ is now known as josepht
hrwhi08:49
hrwlinux/quantal contains debian/stamps/ directory but /usr/src/linux-3.4.0/debian/ from linux-source-3.4.0 does not09:01
hrwwhich patch will be more acceptable:09:01
hrw1. add 'install -d $(stampdir)'09:02
hrw2. add 'debian/stamps/' into linux-source-3.4.009:02
hrw?09:02
hrwreported as bug 100117209:13
ubot2Launchpad bug 1001172 in linux "linux-source-3.4.0 does not contains debian/stamps/ directory" [Undecided,New] https://launchpad.net/bugs/100117209:13
=== yofel_ is now known as yofel
=== ayan_ is now known as ayan
tgardnerarges, linux-firmware-nonfree accepted into lucid and precise with the Beceem wimax firmware.13:08
argestgardner, great. do I need to talk to the archive admins or do verification now?13:08
tgardnerarges, nope, its a done deal13:08
argestgardner, cool! thanks a ton13:08
ogasawaratgardner: can you refresh my memory, I thought there was a script which would help update the lts-backport-<release> branch.  what was it called again?13:29
tgardnerogasawara, I started the quantal one and pushed to precise13:30
tgardnerlooking...13:30
henrixogasawara: are you looking for debian.oneiric/etc/update-from-oneiric-master ?13:31
tgardnerogasawara, ubuntu-precise/debian.quantal/etc/update-from-quantal-master in the lts-backport-quantal branch13:31
ogasawaratgardner, henrix: thanks13:31
ogasawaratgardner: was thinking that an additional step to uploading a new kernel to Quantal would be to run that script and shove the resulting backport kernel into the PPA bryceh pointed to13:32
tgardnerogasawara, I'm thinking Andy's daily build scripts will pick that up.13:33
ogasawaratgardner: ah, that's even better13:34
tgardnerogasawara, though I don't think we should turn on that machinery until the meta package and flavour carnage has settled.13:34
ckingtyhicks, ping13:35
tgardnerogasawara, I'm finishing up with the quantal kernel mess, then I'll do the meta package. should have it all done today.13:35
ogasawaratgardner: ack13:35
tyhickscking: hey - just picking my chin up off the floor after reading your email :)13:35
ckingtyhicks, we could restructure the code so that the fp flags are stashed and restored outside the loop, but I think before I go any further I will contact intel13:36
tyhickscking: I had just cracked open the code, so I don't have a good feeling for what is best yet13:37
tyhickscking: Contacting intel is probably the thing to do though13:37
ckingtyhicks, yep, will do, and while I am waiting for a response I will tweak the code to see if I can "improve" things ;-)13:38
tyhickscking: When you say "outside of the loop", which function are you referring to?13:39
tyhickscking: nvm, I see it in aes_encrypt() now13:39
ckingtyhicks, crypto_cbc_encrypt() iterates over the data in 16 byte blocks, and each block wastes cycles doing the kernel_fpu_begin/end calls :-(13:42
ckingit's just a problem to do with the way it has been abstracted13:43
tyhickscking: I'm following along now. :) Nice find!13:44
ckingjust needed a little bit of digging and some accurate instrumentation13:45
ckingtyhicks, I expect the userspace version of the code rocks because it does not have to mess around with the fpu state, hence the benchmarks on the code look good but nobody has instrumented it in-kernel13:48
tyhickscking: Ack - I think you're right13:48
argescking, this was it: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/100091314:28
ubot2Launchpad bug 1000913 in linux "K43SA hangs on suspend" [Medium,Incomplete]14:28
* ogasawara back in 2014:32
tgardnerogasawara, just sent an email explaining Quantal meta package carnage. please review.15:51
ogasawaratgardner: ack15:51
* tgardner goes back to working on highbank and lowlatency15:52
* ogasawara head just exploaded with meta packages16:03
tgardnerogasawara, but they are so orthogonal now16:03
ogra_the heads ? or the explosions ?16:06
ckingtyhicks, it looks like restructuring the code means I add extra overhead to the non arch specific generic code, which is not going to be acceptable. I will see what Intel say 16:17
tyhickscking: I'm a bit confused because some of aesni-intel_glue.c seems to be doing the right thing by putting the fpu restore on the outside of the loop16:29
tyhickscking: cbc_encrypt(), for example16:29
* cking looks16:29
tyhickscking: I'm wondering if eCryptfs flows through a different path than dm-crypt, which may be why dm-crypt benefits from aes-ni16:30
ckingtyhicks, aesni-intel_glue.c saves the fp state, does 16 bytes and restores the fp state16:31
tyhickscking: I agree regarding aes_encrypt() in aesni-intel_glue.c, but that doesn't look to be true for cbc_encrypt() in aesni-intel_glue.c16:32
tyhickscking: note that there are different drivers in aesni-intel_glue.c16:34
ckingtyhicks, OK - I can see what you are getting at, I will re-examine this16:34
ckingtwisty maze of callbacks :-/16:34
cking[  509.765572] Call Trace:16:35
cking[  509.765574]  [<ffffffffa05e214c>] aes_encrypt+0x2c/0xf0 [aesni_intel]16:35
cking[  509.765577]  [<ffffffff812e80ef>] crypto_cbc_encrypt+0xcf/0x19016:35
cking[  509.765579]  [<ffffffffa05e2120>] ? aes_decrypt+0xf0/0xf0 [aesni_intel]16:35
cking[  509.765582]  [<ffffffff8126eed3>] encrypt_scatterlist+0xd3/0x1b016:35
cking[  509.765585]  [<ffffffff8126f643>] ecryptfs_encrypt_extent+0x103/0x19016:35
cking[  509.765588]  [<ffffffff8126fc5d>] ecryptfs_encrypt_page+0xcd/0x19016:35
cking[  509.765591]  [<ffffffff8126d962>] ecryptfs_writepage+0x32/0x9016:35
sforsheeogasawara, I'm going to send a patch to disable CONFIG_B43_BCMA_EXTRA in quantal as it causes conflicts between b43 and brcmsmac. Do I also need to add a check in the enforcer?16:36
ogasawarasforshee: that'd be good so we don't accidentally flip it back on.  it also ensure's it get annotated in our config review for why it doesn't adhere to policy.16:37
sforsheeogasawara, ack. Guess I get to learn how to write enforcer rules :)16:37
tyhickscking: Ok, so the question is how to get the crypto api to give us the "__driver-cbc-aes-aesni" driver rather than the "aes-aesni" driver16:42
ckingtyhicks, that's what I'm trying to figure out right now, it's most curious16:43
tyhickscking: The "aes-aesni" driver has a higher priority value, so it would obviously be selected first... but is it supposed to then use the "__driver-cbc-aes-aesni" driver if aes with cbc is used? Hmm...16:44
ckinglooks iffy to me16:44
tgardnertyhicks, cking: isn't some of this link order dependent? the most CPU specific drivers are supposed to register first.16:48
tgardnerIIRC thats why we started building them in16:49
tyhickstgardner: Yeah, that's right. But the highest priority driver for the aesni-intel code does the wrong thing. :)16:49
tyhickstgardner: Then there's a lower priority, generic software-based driver that is next in the priority list. Then, there's *another* aesni-intel driver that is priority 0, but it does the right thing.16:50
ckingunless I shove a load of debug in, it really is unclear to me at the moment why it is doing the wrong thing16:50
tgardnerI assume you've looked at how dm-crypt registers ? (just flapping my gums here)16:51
ckingthat's a worthy point to pursue16:51
tyhickstgardner: It has been a while since I've looked at that. But the way that one registers is just by registering the "cbc(aes)" driver. The crypto api is supposed to be smart enough to pick the best option.16:52
tgardnerright,, thats what I remember16:52
ckingevidently it isn't16:52
tyhickscking: From your analysis, what it supposed to be the best option may just be poorly written :)16:53
tyhicks(or just a victim of a code refactoring that screwed things up)16:53
ckingindeed, it's getting late in my day and I'm still foggy a bit from jet lag, so I will focus on this next week 16:54
ckingi'm sure it be very evident once I work through the code methodically16:54
tyhickscking: Understandable. I'll try to take a closer look in a couple hours. I'll email you if I come across anything useful.16:54
ckingcool16:55
ckinggotta go16:55
tyhicksbye cking16:55
* cking -> EOW16:55
sforsheeogasawara, does this look right? seems to trip the config enforcer at least17:04
sforshee# Ensure CONFIG_B43_BCMA_EXTRA is disabled if CONFIG_BRCMSMAC is enabled. 17:04
sforshee# Otherwise b43 and brcmsmac will overlap in the hardware they claim to 17:04
sforshee# support. 17:04
sforshee(!exists CONFIG_BRCMSMAC | value CONFIG_BRCMSMAC n) | \ 17:04
sforshee((value CONFIG_BRCMSMAC y | value CONFIG_BRCMSMAC m) & (value CONFIG_B43_BCMA_EXTRA n | !exists CONFIG_B43_BCMA_EXTRA)) 17:04
* ogasawara parses17:04
ogasawarasforshee: looks correct17:06
sforsheeogasawara, thanks! I'll send the patch after lunch.17:07
ogasawarasforshee: ack17:07
=== tgardner is now known as tgardner-lunch
hggdhtgardner-lunch: when you are back -- I have been getting hardlocks on my laptop (precise, realtek SE wireless). Seems to be the realteck, and I have the backports-cw package installed17:43
hggdhtgardner-lunch: Pete asked me to ping you, it seems you would have a more up-to-date package to test17:44
=== tgardner-lunch is now known as tgardner
tgardnerhggdh, I've been runnign the Quantal kernel. seems to be working OK18:01
* bjf has swapped out18:17
=== bjf is now known as bjf[swapped]
hggdhtgardner: I will upgrade to quantal, then and try. Thank you18:19
tgardnersforshee, why don't we blacklist b43 instead of not building it ? It may still work well for some folks (or be their preferred option).18:19
tgardnerhggdh, you don't have to upgrade completely. we'll have a PPA soon from which you can pull the Quantal LTS backport kernel18:19
hggdhtgardner: ack, I will wait, then. Thank you again :-)18:20
tgardnerhggdh, in the meantime, you could pull the linux-image deb from the archive and install it by hand to see if it works any better.18:20
hggdhroj. Even better, I can check on it now18:20
* ogasawara lunch18:36
tgardnerogasawara, I'm guilty of hoarding my bits, pull quantal master-next again20:36
ogasawaratgardner: ack20:36
tgardnerogasawara, also just pushed precise lts-backport-quantal. I'll finish it up next week when next you upload. waiting on a response from Michael Vogt to make sure we've not dome something we can't recover from.20:39
ogasawaratgardner: ack20:39
* tgardner -> EOD20:41

Generated by irclog2html.py 2.7 by Marius Gedminas - find it at mg.pov.lt!