<jnettlet>
Hey guys. Do we have working support for the crypto engine and hwrng on the 5420 and later SOCs? I see that the ChromeOS kernel has the same problem as android of not being able to keep the entropy pool filled so new processes and connections can stall.
<jnettlet>
I will install rngd for now but would prefer to use the hwrng which it seems does exist
dlezcano has joined #linux-exynos
<Wizzup>
jnettlet: maybe haveged? I haven't run into exhausting problems before btw
<jnettlet>
Wizzup, under ChromeOS?
<jnettlet>
trust me I am sure you have. check your entropy_avail under /proc I am sure it is around 150-300 bytes, which means every time you launch a new time you input is micro-freezing trying to gather entropy
<jnettlet>
also things that constantly run under ssl will be causing lag on input because that is the primary entropy gatherer in 3.4
<jnettlet>
the reason intel doesn't have this problem is that their hwrng driver feeds the random pool with only a partial mix of kernel randomness for security.
<jnettlet>
I don't know why Google continually makes this mistake. Android has the same problem
<jnettlet>
I think 3.4 actually does all this within an interrupt mutex as well which when all IRQs are being serviced by CPU0 it will cause micro-stuttering in everything
<Wizzup>
jnettlet: no, never under chromeOS
<Wizzup>
and intel only very recently had this
<Wizzup>
And most distros don't use randomness that much
<jnettlet>
so the contents /proc/sys/kernel/random/entropy_avail is around 3000?
<Wizzup>
nope, much less
<jnettlet>
yes, so that is creating input lag
<Wizzup>
lag to what exactly?
<jnettlet>
and much more because in earlier kernels the input randomness is collected under an rcu lock
<Wizzup>
I know this is required for a lot of things
<jnettlet>
launching processes for one
<Wizzup>
right, I am (soon) going to run gentoo hardened with pax etc
<Wizzup>
so that'll be a problem
<jnettlet>
Why does Google continue to screw up this inefficiency?
<jnettlet>
it is like they aren't even trying with ARM