19:00:32 #startmeeting 19:00:32 Meeting started Thu Jun 14 19:00:32 2018 UTC. The chair is wumpus. Information about MeetBot at http://wiki.debian.org/MeetBot. 19:00:32 Useful Commands: #action #agreed #help #info #idea #link #topic. 19:00:36 hi 19:00:37 aye 19:00:41 #bitcoin-core-dev Meeting: wumpus sipa gmaxwell jonasschnelli morcos luke-jr btcdrak sdaftuar jtimon cfields petertodd kanzure bluematt instagibbs phantomcircuit codeshark michagogo marcofalke paveljanik NicolasDorier jl2012 achow101 meshcollider jnewbery maaku fanquake promag provoostenator 19:00:45 hi 19:00:52 hi 19:01:00 hi. 19:01:07 Sorry I haven't been around for the last few weeks, swamped with assignments and exams 19:01:12 hi 19:01:22 hi 19:01:45 meshcollider: np! 19:01:51 topic proposals? 19:02:27 #topic high priority for review 19:02:37 jnewbery: after qt4 is dropped, I'll replace qt connections with the new sintax 19:02:39 currently on the list: #13425 #13111 #13062 #12196 #12136 19:02:42 topic proposal: srd fallback coin selection 19:02:42 https://github.com/bitcoin/bitcoin/issues/13425 | Moving final scriptSig construction from CombineSignatures to ProduceSignature (PSBT signer logic) by achow101 · Pull Request #13425 · bitcoin/bitcoin · GitHub 19:02:45 https://github.com/bitcoin/bitcoin/issues/13111 | Add unloadwallet RPC by promag · Pull Request #13111 · bitcoin/bitcoin · GitHub 19:02:47 https://github.com/bitcoin/bitcoin/issues/13062 | Make script interpreter independent from storage type CScript by sipa · Pull Request #13062 · bitcoin/bitcoin · GitHub 19:02:51 https://github.com/bitcoin/bitcoin/issues/12196 | Add scantxoutset RPC method by jonasschnelli · Pull Request #12196 · bitcoin/bitcoin · GitHub 19:02:53 [13bitcoin] 15HashUnlimited opened pull request #13472: [devtools translations] catch invalid specifiers (06master...06HashUnlimited-translate-1) 02https://github.com/bitcoin/bitcoin/pull/13472 19:02:58 https://github.com/bitcoin/bitcoin/issues/12136 | Implement BIP 174 Partially Signed Bitcoin Transactions serialization and RPCs by achow101 · Pull Request #12136 · bitcoin/bitcoin · GitHub 19:03:04 unloadwallet from promag seems almost ready for merge 19:03:04 12136 can be removed for now 19:03:15 achow101: ok 19:03:20 it depends on 13425 19:03:58 dropped 19:04:06 wumpus: I think so, I have to fix last jnewbery points 19:04:09 #13425 is pretty much all of the PSBT internal changes that are needed, excluding serialization and RPCs 19:04:10 it was unfair for you to have two entires on the list, anyway 19:04:12 https://github.com/bitcoin/bitcoin/issues/13425 | Moving final scriptSig construction from CombineSignatures to ProduceSignature (PSBT signer logic) by achow101 · Pull Request #13425 · bitcoin/bitcoin · GitHub 19:04:48 I think since the last change, unloadwallet no longer removes the unloaded wallet from the dropdown menu 19:04:52 (just kidding, no idea how it came that way) 19:05:15 jnewbery: you are right 19:05:28 needs signal unload 19:05:34 right 19:05:43 yep. Seems to work with that method declaration readded 19:07:03 should we add anything to the list this week? 19:07:25 #13160 19:07:27 https://github.com/bitcoin/bitcoin/issues/13160 | wallet: Unlock spent outputs by promag · Pull Request #13160 · bitcoin/bitcoin · GitHub 19:07:38 you already have one 19:07:46 Lol 19:07:54 there was a behaviour change since 0,15 iirc, that fixes it 19:08:32 promag: but I agree it needs more attention, FWIW 19:09:10 it's one line change 19:09:15 the high-priority list is for things that block other work 19:09:23 yes 19:09:26 not just "this needs attention" 19:09:42 that's what the meeting is for 19:10:33 #action look at #13160 19:10:35 https://github.com/bitcoin/bitcoin/issues/13160 | wallet: Unlock spent outputs by promag · Pull Request #13160 · bitcoin/bitcoin · GitHub 19:10:52 other topics? 19:11:01 I just reviewed it fwiw promag 19:11:10 meshcollider: thanks! 19:11:20 topic proposal: srd fallback coin selection 19:11:40 #topic srd fallback coin selection (achow101) 19:12:10 srd = Single Random Draw? 19:12:14 yes 19:12:19 #13307 19:12:22 https://github.com/bitcoin/bitcoin/issues/13307 | Replace coin selection fallback strategy with Single Random Draw by achow101 · Pull Request #13307 · bitcoin/bitcoin · GitHub 19:12:33 I think we should discuss instagibbs's point here: https://github.com/bitcoin/bitcoin/pull/13307#discussion_r192899180 19:12:44 oh, I said something eh 19:13:04 the basic point is that in the current coin selection, we prefer exact matches over confirmations. However the current implementation of srd fallback is that we prefer confirmations over exact matches 19:13:35 altnernating between BnB(Exact match) and then fallback, rather than Bnb of all sorts then fallback 19:14:01 so this is a bit of a question on what our coin selection algorithm should prioritize 19:14:09 yes 19:14:09 confirmed coins, or (immediate) fee 19:14:19 and privacy 19:14:46 imo privacy puts it over the top and we should try really hard to do it 19:14:53 but obviously it's not a slam dunk 19:14:59 hmm, unclear how privacy is affect here? 19:15:10 change-less outputs mess with coin analysis 19:15:16 to a large degree 19:15:36 that's a good point 19:16:45 sdaftuar, morcos: present, opinions? 19:17:02 gmaxwell: ? 19:17:28 IIRC we converged on being ok with current behavior, because it breaks the long chains if it works 19:17:31 I also did a simulation (so take it with a grain of salt) that showed that the number of utxos with exact match over confirmations was higher than not 19:17:35 was an intentional design decision 19:19:26 what do you mean by "current behaviour"? 19:19:31 in master 19:19:34 master or the SRD PR? 19:19:34 ok 19:20:11 there is another question here on what the criteria for SRD merge should be 19:20:51 because it seems it results in somewhat higher average UTXOs per wallet in simulations 19:21:10 merge as in code? or? 19:21:29 merge as in merge the pr 19:21:58 ah 19:22:05 yes, i'm wondering what our bar for deciding to change tbe logic should be 19:22:08 it doesn't seem to perform as well as the current coin selection in master w.r.t mean number of utxos in the wallet in my simulations 19:22:20 Significantly higher? 19:22:33 did you try filtering for using only coins lower than target value? using coins with negative effective value? 19:22:38 from ~20 utxos to ~90 utxos 19:22:38 allowing a single negative effective value? 19:23:07 Core is an extreme UTXO cop currently. I don't think we're going to be able to match it. 19:23:20 these are the results so far https://gist.github.com/achow101/242470486265d3f21adab08f65b9102c 19:24:02 I have tried filtering for inputs smaller than the target value and doing srd on that. if that fails, srd on all inputs 19:24:21 I have also done that but instead of srd on all inputs on failure, choosing the input that is immediately larger than the target value 19:25:29 also, these numbers are just for a single simulation, right? 19:25:40 yes, those are all for the same scenario 19:25:45 on different workloads differents effects may be preswnt 19:26:02 I'm running simulations for the other scenarios right now, but that will take a while to finish 19:26:29 i guess more to discuss in the PR 19:28:35 achow101, you can also test not filtering for -EV 19:28:51 to see how big an effect that is 19:29:07 so we could be spending dust? 19:29:36 Like we do now yes 19:29:53 hmm.. ok, I can try that too 19:29:54 And "allow 1 negative EV output" type logic 19:30:06 anyways, more to discuss on PR 19:30:25 EV filtering is probably the biggest reason for increased UTXO 19:33:23 Sorry for being late, but I'd like to propose #13439 for high priority for review 19:33:23 "allow 1" might be nice in that you won't blow up way past what is actually sane, while containing the bloat 19:33:25 https://github.com/bitcoin/bitcoin/issues/13439 | rpc: Avoid "duplicate" return value for invalid submitblock by TheBlueMatt · Pull Request #13439 · bitcoin/bitcoin · GitHub 19:35:21 MarcoFalke: sure 19:35:28 thx 19:36:14 MarcoFalke: done 19:36:17 any other topics? 19:39:01 i have 4 PRs open relating to optimized hardware SHA256... should I combine them into 1, or leave like this? 19:39:15 let me see 19:39:39 #13471 #13386 #13442 #13438 19:39:40 https://github.com/bitcoin/bitcoin/issues/13471 | For AVX2 code, also check for AVX, XSAVE, and OS support by sipa · Pull Request #13471 · bitcoin/bitcoin · GitHub 19:39:42 https://github.com/bitcoin/bitcoin/issues/13386 | SHA256 implementations based on Intel SHA Extensions by sipa · Pull Request #13386 · bitcoin/bitcoin · GitHub 19:39:43 https://github.com/bitcoin/bitcoin/issues/13442 | Convert the 1-way SSE4 SHA256 code from asm to intrinsics by sipa · Pull Request #13442 · bitcoin/bitcoin · GitHub 19:39:44 https://github.com/bitcoin/bitcoin/issues/13438 | Improve coverage of SHA256 SelfTest code by sipa · Pull Request #13438 · bitcoin/bitcoin · GitHub 19:39:54 it's good for the selftest one to be seperate, I think that one can be merged 19:40:19 I haven't really looked at the other ones yet in detail yet 19:40:33 sipa: I have a follow-up PR as well to build a lib-for-each-arch 19:40:38 cfields: ah yes 19:40:46 i'll leave things like this 19:40:48 I figured I'd just wait until everything settled for that one, but let me know if you'd prefer something else 19:40:59 re: 13442, didn't you first say that made things a few % *slower* on 64 bit? 19:41:15 wumpus: i made more changes, it's faster now 19:41:22 great, no problems with it anymore then 19:41:34 but it's very heavily compiler dependent... rearranging two lines can have 5% effect on speed 19:41:51 seems preferable in every way then 19:41:51 or making a constant static 19:41:59 how so? 19:42:10 both more readable and faster 19:42:19 ah yes, but probably less reliably faster 19:42:23 perhaps on clang it's slower 19:42:25 sipa: also worth considering (I read this just yesterday), apparently gcc switched the way that 256bit loads are done, somewhere around gcc6, I believe. 19:42:28 or with particular gcc versions 19:42:33 so, worth considering compiler age as well. 19:42:38 right 19:43:41 if it becomes faster with new compilers it's good 19:43:56 if slower, not :) 19:43:58 (see gcc's "mavx256-split-unaligned-load" option, which had its default value changed) 19:44:16 cd 19:44:37 wumpus: another benefit is that this lets us compile the exact same code with -mavx, and get a slightly faster version for AVX capable machines 19:44:40 ~$ 19:44:50 sipa: that's really nice 19:45:00 sipa: so we compile it twice, the same code? 19:45:05 wumpus: yup 19:45:12 cfields is working on build system changes for that 19:45:16 almost for free 19:45:36 i wonder what percentage of our binary will be SHA256 implementations... 19:46:09 a very small part 19:46:13 heh 19:46:33 though I understand the sentiment :) 19:47:29 as for the source code, a larger part, which reminds me I still need to add ARM 19:47:48 POWER8 one needs review #13203 19:47:50 https://github.com/bitcoin/bitcoin/issues/13203 | Add POWER8 ASM for 4-way SHA256 by TheBlueMatt · Pull Request #13203 · bitcoin/bitcoin · GitHub 19:48:31 cfields: we should also try with things like -mmovbe, -mbmi1, -mbmi2, ... 19:48:34 that's really an instruction set I have no clue about 19:48:43 cfields: i think these may not be implied by -mavx / -mavx2 19:48:59 but generally available on the same systems 19:49:05 sipa: yes. IIRC bmi provides some useful things. 19:49:34 yea, rorx 19:49:47 sorry, that's bmi2 19:52:37 I'm lost 19:52:50 don't worry :) 19:53:16 :) 19:53:27 any quick topic? 19:53:42 when 0.16.1 detached sigs? 19:54:06 achow101: soon, building now 19:54:21 jonasschnelli: ^^ ping for other half 19:54:43 already made 19:54:45 https://github.com/bitcoin-core/bitcoin-detached-sigs/pull/8 19:54:48 cfields: jonasschnelli: thanks 19:55:13 jonasschnelli: ah, I missed the pr! You beat me to it :) 19:55:29 :-) 19:55:30 [13bitcoin-detached-sigs] 15laanwj closed pull request #8: 0.16.1: osx signatures for 0.16.1 (060.16...060.16) 02https://github.com/bitcoin-core/bitcoin-detached-sigs/pull/8 19:57:03 hi 19:57:14 jonasschnelli: you should probably be able to merge your own stuff there 19:57:41 wumpus: Yes. I did create the PR because I wasn't sure if we did hit the threshold or required non code-signed signatures 19:58:02 right, good point 19:58:39 well, as soon as the signatures exist, someone could potentially use them 19:58:46 so if the threshold isn't met, even a PR could be problematic 19:58:55 5 signers for every platform so that seems ok 19:59:23 yea, it'd only be an issue if there were 2 competing "correct" gitian outputs 19:59:33 agree that for a -final relaese it's better to wait for a few more 19:59:34 I think that's happened in the past due to timezones 19:59:42 5 is fine 19:59:46 cfields: yes, that's worrying 19:59:51 IIRC threshold was 3 anyway 20:00:03 meeting ending in 1 minute 20:00:07 oh no, now 20:00:09 #endmeeting