Re: apm_emu module missing
Hi Ed, Ed Robbins wrote: I believe that the apm_emu module is required for battery indicator/monitoring on certain powerbooks? It seems to be missing on latest kernels (6.3, 6.11). Can it be enabled for our config? Or, is there an alternative way to enable battery indicators? GNUstep battery monitor (batmon.app) supports directly the Apple PMU. Didn't check if it is packaged on Debian though. I didn't even know emulation of APM existed. It has some minor shortcomings since it seems the kernel has some bogus flags, I asked about this here in the mailing list a year ago and never got an answer! So it can what I found though reverse engineering. Riccardo
Re: apm_emu module missing
Hi Riccardo, On Fri, 18 Oct 2024 at 08:44, Riccardo Mottola wrote: > > Hi Ed, > > Ed Robbins wrote: > > I believe that the apm_emu module is required for battery > > indicator/monitoring on certain powerbooks? > > > > It seems to be missing on latest kernels (6.3, 6.11). Can it be > > enabled for our config? > > > > Or, is there an alternative way to enable battery indicators? > > GNUstep battery monitor (batmon.app) supports directly the Apple PMU. > Didn't check if it is packaged on Debian though. > I didn't even know emulation of APM existed. > It has some minor shortcomings since it seems the kernel has some bogus > flags, I asked about this here in the mailing list a year ago and never > got an answer! So it can what I found though reverse engineering. > Well, the latest version of xfce4-battery-plugin supports neither APM nor upower nor the apple PMU in some more direct way. So fixing upower does not actually resolve my original problem directly either. But there is some other battery indicator in the xfce panel by default that does support upower, and the xfce power preferences also seems to support upower. So if upstream accept a patch for upower support this will be acceptable to me. However if the apm_emu module would be useful for other desktop environments I can submit a patch to add it to the default debian powerpc kernel config as suggested by Adrian? It appears the GNUstep battery monitor does support APM. I submitted a kernel patch to fix upower support this morning [1]. Ed [1] https://lore.kernel.org/linux-pm/iofjls.120oj5kjg9...@googlemail.com/T/#u
Re: apm_emu module missing
Hi, Ed Robbins wrote: However if the apm_emu module would be useful for other desktop environments I can submit a patch to add it to the default debian powerpc kernel config as suggested by Adrian? It appears the GNUstep battery monitor does support APM. GNUstep Battery Monitor supports both ACPI, APM and PMU in that fallback order, IIRC. It's my code! It started as APM many years ago, but that is mostly obsolete. I also wrote the PMU support, maybe it should be preferred if found? But as you write, probably there are few or no monitors left supporting APM. I hinted you to batmon to avoid it, if you wish. Riccardo
nx_crypto on power8 lpar
Hello! Is it possible to somehow debug crypto-nx errors and follow-up in cryptomgr_test ? System info is debian sid , running in LPAR on IBM S822 machine. # uname -a Linux redpanda 6.12.0-rc3 #119 SMP Thu Oct 17 23:47:18 MSK 2024 ppc64 GNU/Linux # lscpu Architecture: ppc64 CPU op-mode(s): 32-bit, 64-bit Byte Order: Big Endian CPU(s): 32 On-line CPU(s) list:0-31 Model name: POWER8 (architected), altivec supported Model: 2.1 (pvr 004b 0201) Thread(s) per core: 8 Core(s) per socket: 4 Socket(s): 1 Virtualization features: Hypervisor vendor: pHyp Virtualization type:para Caches (sum of all): L1d:256 KiB (4 instances) L1i:128 KiB (4 instances) NUMA: NUMA node(s): 1 NUMA node0 CPU(s): 0-31 after doing "modprobe nx_crypto" getting the following kernel error logs: (this trace is non-debug kernel) [ 79.134739] nx-crypto ibm,sym-encryption-v1: bogus sglen/databytelen for 0/6/1: 0/0 (ignored) [ 79.134750] [ cut here ] [ 79.134756] nx-crypto ibm,sym-encryption-v1: bogus sglen/databytelen for 0/6/1: 0/0 (ignored) [ 79.134771] WARNING: CPU: 11 PID: 1273 at mm/slab_common.c:991 __ksize+0x14c/0x1a0 [ 79.134784] Modules linked in: nx_crypto(E+) binfmt_misc(E) ctr(E) xts(E) vmx_crypto(E) gf128mul(E) sg(E) configfs(E) nfnetlink(E) vsock_loopback(E) vmw_vsock_virti o_transport_common(E) vsock(E) ip_tables(E) x_tables(E) autofs4(E) ext4(E) crc16(E) mbcache(E) jbd2(E) btrfs(E) blake2b_generic(E) raid10(E) raid456(E) async_raid6_rec ov(E) async_memcpy(E) async_pq(E) async_xor(E) async_tx(E) xor(E) raid6_pq(E) raid1(E) raid0(E) md_mod(E) dm_mod(E) sr_mod(E) cdrom(E) sd_mod(E) ibmvscsi(E) scsi_trans port_srp(E) crc32c_vpmsum(E) [ 79.134854] CPU: 11 UID: 0 PID: 1273 Comm: cryptomgr_test Tainted: GE 6.12.0-rc3 #119 [ 79.134863] Tainted: [E]=UNSIGNED_MODULE [ 79.134866] Hardware name: IBM,8284-22A POWER8 (architected) 0x4b0201 0xf04 of:IBM,FW860.42 (SV860_138) hv:phyp pSeries [ 79.134872] NIP: c0476e8c LR: c0476fd8 CTR: c0476f60 [ 79.134877] REGS: ced679b0 TRAP: 0700 Tainted: G E (6.12.0-rc3) [ 79.134882] MSR: 8282b032 CR: 44008420 XER: 2010 [ 79.134897] CFAR: c0476d90 IRQMASK: 0 GPR00: c0476fd8 ced67c50 c114be00 30399000 GPR04: 30399000 b0bac02b00c0 008c GPR08: c0001000 c00030398000 0001 c0003d0004ee2370 GPR12: c0476f60 [ 79.134917] nx-crypto ibm,sym-encryption-v1: bogus sglen/databytelen for 0/20/1: 0/0 (ignored) [ 79.134918] c0001e437f00 [ 79.134932] c0165a78 c31aae80 GPR16: 00ed 0077 GPR20: c0e60ca8 0077 0076 GPR24: c0e625f8 cf3d9408 0005 c0002bc0ba80 GPR28: cf3d9400 c0003d0004ee5470 c0003fc0e600 [ 79.134982] NIP [c0476e8c] __ksize+0x14c/0x1a0 [ 79.134990] LR [c0476fd8] kfree_sensitive+0x78/0xa0 [ 79.134998] Call Trace: [ 79.135001] [ced67c50] [ced67d40] 0xced67d40 (unreliable) [ 79.135013] [ced67c80] [0003] 0x3 [ 79.135020] [ced67cb0] [c0003d0004eddcf4] nx_crypto_ctx_skcipher_exit+0x2c/0x60 [nx_crypto] [ 79.135034] [ced67ce0] [c0884d58] crypto_skcipher_exit_tfm+0x38/0x50 [ 79.135045] [ced67d00] [c087d8d8] crypto_destroy_tfm+0x98/0x140 [ 79.135053] [ced67d40] [c0897c14] alg_test_skcipher+0x164/0x280 [ 79.135063] [ced67de0] [c089864c] alg_test+0x91c/0xf18 [ 79.135071] [ced67f60] [c0890294] cryptomgr_test+0x34/0x70 [ 79.135080] [ced67f90] [c0165ba4] kthread+0x134/0x140 [ 79.135089] [ced67fe0] [c000cd30] start_kernel_thread+0x14/0x18 [ 79.135097] Code: 7d084110 39080001 0b08 282a2000 40810064 7d29f850 3940 792934e4 7949f00e 7c884a78 3148 7d4a4110 <0b0a> 7c244840 4082003c e93f [ 79.135131] ---[ end trace ]--- [ 79.135294] [ cut here ] [ 79.135317] WARNING: CPU: 31 PID: 1274 at mm/slab_common.c:991 __ksize+0x14c/0x1a0 [ 79.135340] Modules linked in: nx_crypto(E) binfmt_misc(E) ctr(E) xts(E) vmx_crypto(E) gf128mul(E) sg(E) configfs(E) nfnetlink(E) vsock_loopback(E) vmw_vsock_virtio _transport_common(E) vsock(E) ip_tables(E) x_tables(E) autofs4(E) ext4(E) crc16(E) mbcache(E) jbd2(E) btrfs(E) blake2b_generic(E) raid10(E) raid456(E) async_raid6_reco v(E) async_memcpy(E) async_pq(E) async_xor(E) async_tx(E) xor(E) raid6_pq(E)