From patchwork Mon Sep 14 01:32:48 2020 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Mathew McBride X-Patchwork-Id: 3463 Return-Path: Received: from mail01.ipfire.org (mail01.haj.ipfire.org [172.28.1.202]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) client-signature ECDSA (P-384)) (Client CN "mail01.haj.ipfire.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by web04.haj.ipfire.org (Postfix) with ESMTPS id 4BqTQX60WQz3x3W for ; Mon, 14 Sep 2020 01:33:24 +0000 (UTC) Received: from mail02.haj.ipfire.org (mail02.haj.ipfire.org [172.28.1.201]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) server-digest SHA384 client-signature ECDSA (P-384) client-digest SHA384) (Client CN "mail02.haj.ipfire.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mail01.ipfire.org (Postfix) with ESMTPS id 4BqTQV5GgbzcT; Mon, 14 Sep 2020 01:33:22 +0000 (UTC) Received: from mail02.haj.ipfire.org (localhost [127.0.0.1]) by mail02.haj.ipfire.org (Postfix) with ESMTP id 4BqTQV4Z2Zz306X; Mon, 14 Sep 2020 01:33:22 +0000 (UTC) Received: from mail01.ipfire.org (mail01.haj.ipfire.org [172.28.1.202]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) client-signature ECDSA (P-384)) (Client CN "mail01.haj.ipfire.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mail02.haj.ipfire.org (Postfix) with ESMTPS id 4BqTQT13K8z2xgy for ; Mon, 14 Sep 2020 01:33:21 +0000 (UTC) Received: from wout1-smtp.messagingengine.com (wout1-smtp.messagingengine.com [64.147.123.24]) (using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mail01.ipfire.org (Postfix) with ESMTPS id 4BqTQQ499RzsY for ; Mon, 14 Sep 2020 01:33:17 +0000 (UTC) Received: from compute7.internal (compute7.nyi.internal [10.202.2.47]) by mailout.west.internal (Postfix) with ESMTP id 7FEC47AB; Sun, 13 Sep 2020 21:33:08 -0400 (EDT) Received: from mailfrontend2 ([10.202.2.163]) by compute7.internal (MEProxy); Sun, 13 Sep 2020 21:33:08 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=traverse.com.au; h=from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; s=fm1; bh=aGX3ettQ4ZacseG4TIQcsq4PaV b3RDVrj8oMFqJTDMk=; b=LM5DNjlJn7m8Nbx2M8rDsfnh2BQwc2u2Bt3U5NLxKL 2Sc+K8yoNlmF9IvMGMosOWZ18BWBiKUv4+0CtS4zGlFae1y61e1MgFc5NmxMX+U8 KMQHxrmfOUlstDNS+EsOez3Ir4ucKsbrTEhEw12DoizxycYSveyvGFjaPwfo7i9p vQTD3jW8RMuNBnscLjYtUgfqg8cJ2F3J4REDBG+I//nr4tRTlGh9dmUr1s+ok7MF oLVaebQoHpkJ09/97jP41ThGoajLoymkCOYRid3uzSXEMn5wJjCpIpPdRD2iZbh0 LETIcCeCZpvGE3BDhbw0pb6clp8YQxpd4M5vka+OH36A== DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:content-transfer-encoding:date:from :message-id:mime-version:subject:to:x-me-proxy:x-me-proxy :x-me-sender:x-me-sender:x-sasl-enc; s=fm3; bh=aGX3ettQ4ZacseG4T IQcsq4PaVb3RDVrj8oMFqJTDMk=; b=SRGs3w/r2DVgKM3XQlSFtiOCftRNOQ0mn HWd6wpcTB8LJ1AhOUE8JosrAX/Xe2ZGLjyNCYHORRg10E56LQftUdMfZk36fJKqO GaL0gjl9nEVvuHUmmsh0LfRGOmi8WXm85rZrJc36dcjJXS0ef4MjxqIbUQHB++7i cQoq0p/vb/WI5DheC5H3+NRvQijrGfhogCuFc1dDCnvL0uGTxYYzYGoYeMZoKLAY qMfKi+wFqBwemH1gz35bwkDLi6gtjWIsuTnHeX5IzIXUzS27B9XX3jandZ90FnDy 9wgT/DvEvxnV1VZ2EjOAUqZQRjTjQsiy2ZUasj0rkjiCisBjXREag== X-ME-Sender: X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgeduiedrudeihedggeeiucetufdoteggodetrfdotf fvucfrrhhofhhilhgvmecuhfgrshhtofgrihhlpdfqfgfvpdfurfetoffkrfgpnffqhgen uceurghilhhouhhtmecufedttdenucenucfjughrpefhvffufffkofgggfestdekredtre dttdenucfhrhhomhepofgrthhhvgifucfotgeurhhiuggvuceomhgrthhtsehtrhgrvhgv rhhsvgdrtghomhdrrghuqeenucggtffrrghtthgvrhhnpeeikeekueevfefhjedtudeuve ekieevgedvffeiveehueetgeekgfevheefleehfeenucffohhmrghinheplhhinhgrrhho rdhorhhgpdhiphhfihhrvgdrohhrghdpthhrrghvvghrshgvrdgtohhmrdgruhdpghhith hlrggsrdgtohhmnecukfhppeduudelrddujedrudehiedrudegudenucevlhhushhtvghr ufhiiigvpedtnecurfgrrhgrmhepmhgrihhlfhhrohhmpehmrghtthesthhrrghvvghrsh gvrdgtohhmrdgruh X-ME-Proxy: Received: from localhost.localdomain (119-17-156-141.77119c.mel.static.aussiebb.net [119.17.156.141]) by mail.messagingengine.com (Postfix) with ESMTPA id 39A733064674; Sun, 13 Sep 2020 21:33:05 -0400 (EDT) From: Mathew McBride To: development@lists.ipfire.org Subject: [PATCH 0/1] Enable ACPI support on ARM64 Date: Mon, 14 Sep 2020 11:32:48 +1000 Message-Id: <20200914013249.30733-1-matt@traverse.com.au> X-Mailer: git-send-email 2.19.1 MIME-Version: 1.0 ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=lists.ipfire.org; s=202003rsa; t=1600047200; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding:dkim-signature; bh=aGX3ettQ4ZacseG4TIQcsq4PaVb3RDVrj8oMFqJTDMk=; b=Qg+8OJrR3zsuAom7fvp1C1/J18/rGkrrtIM4Q0UC+9KSxAisriEj/WM/LaOwx6fLm8fRHN o8qBGRyAx3z0Y729VDw5bCLu7BV4EFQ/qaEN60N/2h2ZxN6BxmhmRee6xq2PpXZCE2AOMv VyZextr19QMIHDLDi+M3bfLZ6DzVi3SmU9Y2zX0SBT6k8+dqI3kz/Cm3u0cwo+lK0MKONU kDQljvy07H0x00mLpU/wL+FRkl3NdqQLxVoSzJYD/rjXH8npx9A8rcbgR6Izgm26/nnUdC wevMc2oe6rYjPrnm/1x5bv6MtjjT1kjH1AlrSdrnOrSeajKaynDsHntyC6fgYw== ARC-Seal: i=1; s=202003rsa; d=lists.ipfire.org; t=1600047200; a=rsa-sha256; cv=none; b=AMHA9kcKyeQVGnMNB5e6+wL0ua2h9fBTePufA0wr0eXA2U34tw2yMYizzEvbQrg7xKuED7 7lFzyVgewHmaRmLMtNvs0h+NcafmVVncPLyXT4FE5vflYE4zGW/I2l8ZvjUJzeM/nTasnB GkBiCobEgB552msWurMIVSiElz9y4jSadUjWmL6lo8EjQLR+JUZEQAzuQaSa0BlMFH0Lxr q4jPv4u8E8XaNaqt6B44AzkvJmYASTMBKDat91BZ60BoUOf7py2MX+ZqtaoQ4BlWJ0Fmi+ fcQR+tN1wS1u76PwyLioG491b6p0txrCGDc6iFUrGClsce0mbOR8OLbK6/gZsQ== ARC-Authentication-Results: i=1; mail01.ipfire.org; dkim=pass header.d=traverse.com.au header.s=fm1 header.b=LM5DNjlJ; dkim=pass header.d=messagingengine.com header.s=fm3 header.b=SRGs3w/r; spf=pass (mail01.ipfire.org: domain of matt@traverse.com.au designates 64.147.123.24 as permitted sender) smtp.mailfrom=matt@traverse.com.au Authentication-Results: mail01.ipfire.org; dkim=pass header.d=traverse.com.au header.s=fm1 header.b=LM5DNjlJ; dkim=pass header.d=messagingengine.com header.s=fm3 header.b=SRGs3w/r; dmarc=none; spf=pass (mail01.ipfire.org: domain of matt@traverse.com.au designates 64.147.123.24 as permitted sender) smtp.mailfrom=matt@traverse.com.au X-Rspamd-Queue-Id: 4BqTQQ499RzsY X-Spamd-Result: default: False [-0.21 / 11.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; ARC_NA(0.00)[]; R_DKIM_ALLOW(-0.20)[traverse.com.au:s=fm1,messagingengine.com:s=fm3]; FROM_HAS_DN(0.00)[]; TO_DN_SOME(0.00)[]; R_MISSING_CHARSET(2.50)[]; IP_REPUTATION_HAM(-0.63)[asn: 11403(-0.32), country: US(-0.00), ip: 64.147.123.24(0.00)]; MIME_GOOD(-0.10)[text/plain]; R_SPF_ALLOW(-0.20)[+ip4:64.147.123.24]; BROKEN_CONTENT_TYPE(1.50)[]; ARC_SIGNED(0.00)[i=1]; RCVD_COUNT_THREE(0.00)[4]; TO_MATCH_ENVRCPT_SOME(0.00)[]; DKIM_TRACE(0.00)[traverse.com.au:+,messagingengine.com:+]; RCPT_COUNT_TWO(0.00)[2]; MID_CONTAINS_FROM(1.00)[]; NEURAL_HAM(-0.97)[-0.972]; DMARC_NA(0.00)[traverse.com.au]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; RCVD_TLS_LAST(0.00)[]; ASN(0.00)[asn:11403, ipnet:64.147.123.0/24, country:US]; BAYES_HAM(-3.00)[99.99%]; RWL_MAILSPIKE_VERYGOOD(0.00)[64.147.123.24:from]; RCVD_IN_DNSWL_LOW(-0.10)[64.147.123.24:from] X-Rspamd-Server: mail01.haj.ipfire.org X-BeenThere: development@lists.ipfire.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: IPFire development talk List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: development-bounces@lists.ipfire.org Sender: "Development" Hi all, It's been a while. This patch enables ACPI support for ARM64 which allows IPFire to boot on ARM "server" machines which use EFI/TianoCore to boot. One such example is the QEMU arm64 "virt" machine with an EFI firmware - https://releases.linaro.org/reference-platform/enterprise/latest/uefi/ The arm64 images from "standard" distros (Debian/Ubuntu/Fedora/etc.) are designed to work with this EFI+ACPI combination. There should be no regressions for any current arm64 hardware supported by IPFire - Linux will only use ACPI tables if present, if not fallback to device tree. The use case for this is to run our hardware[1] using the muvirt[2] VM host, which also allows some "blending" of OpenWrt functions on the host, e.g the host can manage bridging of Ethernet ports and WiFi hostapd so IPFire can work with simple Ethernet interfaces for the Red/Green/Blue/Orange. You can see the Fireinfo profile for the VM here - https://fireinfo.ipfire.org/profile/67aa9a9cff94f3ef8f61866197a57106ccdcea4b I have successfully speedtested ~1Gbps though this virtualized setup so this should provide more than adequate performance for most situations. It is not possible to run IPFire directly on our LS1088 (Ten64) platform at the moment as 4.14 does not have working Ethernet (DPAA2) and PCIe controller drivers. It is possible to backport them from later kernels (and I did have a go at this a few months ago) - but it is a very large patch (>1M lines) and that is before considering any of the features and fixes in more recent kernels (e.g backporting PHYLINK). When IPFire moves to a newer kernel that would be a good time to revisit this. [1] - https://traverse.com.au/products/ten64-networking-platform/ [2] - https://gitlab.com/traversetech/muvirt Mathew McBride (1): kernel: enable ACPI support on ARM64 config/kernel/kernel.config.aarch64-ipfire | 99 +++++++++++++++++++++- 1 file changed, 96 insertions(+), 3 deletions(-)