Message ID | 20240217010557.2381548-6-sboyd@kernel.org |
---|---|
State | New |
Headers |
Return-Path: <linux-kernel+bounces-69630-ouuuleilei=gmail.com@vger.kernel.org> Delivered-To: ouuuleilei@gmail.com Received: by 2002:a05:693c:2685:b0:108:e6aa:91d0 with SMTP id mn5csp92322dyc; Fri, 16 Feb 2024 17:24:05 -0800 (PST) X-Forwarded-Encrypted: i=3; AJvYcCXNwbGOda4qwD5ZE1tVvpjxZtYzV+RC4nByteufWEWv26TsHdtPNnvORvy3f/CNVZUDVfQvr1/nvVz5ulMb7+SylmjKSw== X-Google-Smtp-Source: AGHT+IE4pygy7JHBA1t33kDbH5nSkczWX9lH8M8jX+nwGNK8Z4JQkGPZnLZHnXB7jTWhoscgZL6Z X-Received: by 2002:a17:902:c20d:b0:1db:aac0:faf3 with SMTP id 13-20020a170902c20d00b001dbaac0faf3mr3039855pll.69.1708133045470; Fri, 16 Feb 2024 17:24:05 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1708133045; cv=pass; d=google.com; s=arc-20160816; b=evd8UuXO+15wXtO3uyYbXKSBCaJpKEdbWS9UnrTxFj3409deqX5c1bwUQaG7VTb8Mw v/MlItrUhvb9yB99+QCoBFxI43hbhA6F/olD0Wy9JxWvrDXYXVtEiE9PnJDcNSCGvxPb bB6Ig1r1JtYU3+cNwu+WnkrUX1BezkjfH9SFqu4gU0Sfv30Bz5GPBsU8DSQxOeFra/9N AzNV+3ylTig08VSOCNc5KR/iYtCYXYu7yARO3+o7UTQoem4aCdSn3xDX0R49aEA5O0gu gU66eYmDKD1znVTGbvk/HnFItzIFap+zSpX793kdKmpLUR+RpZR/9xyxjD/DPhKt0Dam Tusg== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:in-reply-to:message-id :date:subject:cc:to:from:dkim-signature; bh=f6Ys8FPEhgXvqlylTOVJOo7KlGjQhGaUKR9xz0jyv0I=; fh=9xLTKyG5LLeWwVhC/s1cfm3V7bFxJkLIOBVCvZG8d5Q=; b=CjSLuAufo1xd9bWl/uAdeMB2phaOr7vpvM2T0mN7YR+A9ZPpbksvk3UoqK6lHhQfas ejOwBShheay/Oqw/mCZCCgnVa/30Si4j+lLz2gD2IVEdDIZ6H/982Wx/8ROWRau+8AtP sKkXt2yxlUfofSLIZiINY6zPIek992yx0CU+o6zwdakhtM1wv4NzKPWxoyMknB1XV8+2 A+qoKST2t92MdPS/2EIl4eHlX0jVC3bpSfIANKP7Flr4Z8PhR+nXheZfqkjZYFFdULy8 Bi5M4Vqe2EBII6wBiYy55p5pZd+XyrbQS6CW5sgxWlKMs6sqWWeYnlSGpl+1UsPe9CU9 JF2Q==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b="mLu/fetq"; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-69630-ouuuleilei=gmail.com@vger.kernel.org designates 147.75.48.161 as permitted sender) smtp.mailfrom="linux-kernel+bounces-69630-ouuuleilei=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from sy.mirrors.kernel.org (sy.mirrors.kernel.org. [147.75.48.161]) by mx.google.com with ESMTPS id j6-20020a17090276c600b001db4585552bsi655398plt.426.2024.02.16.17.24.05 for <ouuuleilei@gmail.com> (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 16 Feb 2024 17:24:05 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-69630-ouuuleilei=gmail.com@vger.kernel.org designates 147.75.48.161 as permitted sender) client-ip=147.75.48.161; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b="mLu/fetq"; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-69630-ouuuleilei=gmail.com@vger.kernel.org designates 147.75.48.161 as permitted sender) smtp.mailfrom="linux-kernel+bounces-69630-ouuuleilei=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sy.mirrors.kernel.org (Postfix) with ESMTPS id 4546CB25867 for <ouuuleilei@gmail.com>; Sat, 17 Feb 2024 01:10:39 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id AB21B22F0E; Sat, 17 Feb 2024 01:06:05 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="mLu/fetq" Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 08A5620DC4; Sat, 17 Feb 2024 01:06:02 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1708131963; cv=none; b=dOLlFoESSts2UCMHKLQiZhmY22N4DHzqqcwsIJE4ZTnpQ7NMhLzpWmIuh0LyYXidL5QAKicPrtxiOSZa1zZbEH69wZPnEGejkUfK2rBiGSZqTujCf2cr7WnVrcdalLb5pBSXA+3u7EescOIMHODRy8COY2Ye+D8Yl47HTFj7S+I= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1708131963; c=relaxed/simple; bh=1HWmL/t+ml480s8rBnTxQKeWVgi/0Mqu3CbJKyMEIU4=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=W+y5L5PyH+VYeBMySDzAvoDfhvcv/XurRPybcTHWByhSoTEFIJAI3R8QZ3+SQyLBBtqEZQC/QlbKVOt5wECkAFUmLqFZXbCnZAvV3FklFDFzwROa1f80xj6v8GsHYBPMNWNr5JaSbn3vvE+ea0zDZeRWv27vdxIYyrYwxzIEE80= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=mLu/fetq; arc=none smtp.client-ip=10.30.226.201 Received: by smtp.kernel.org (Postfix) with ESMTPSA id 68291C433B1; Sat, 17 Feb 2024 01:06:01 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1708131962; bh=1HWmL/t+ml480s8rBnTxQKeWVgi/0Mqu3CbJKyMEIU4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=mLu/fetqM+cb3tFtOHS4DOL5HzdsL62p8HCA7st+6zWovNRgJDBAgQnu6PXC1+c9G HFZmLUhjJAsUY3SYQrxRX0DJ51MCTu7WUqyLaRDBYT0p7U3hhqasKo3LofYMLnFUmS wyRODHMZMXZEjB75NprcfvwHNV/GncU03JL5Uh+3ni6KVVnTXs0sqEPcJRHZZ5VUhZ KDwZy/JMZPFcz3N3YG14+nEDcPwAloywz+fsCh01BgyNBj0GdXEtQLT9hc25xBrUQB JooWdwLPYjQZABiqq2n0BCu5ZwpDE4wcww/s7bAxn5H8dLXJcIiin859FkSNqXFBMd ex/bdl98FQEGg== From: Stephen Boyd <sboyd@kernel.org> To: Rob Herring <robh+dt@kernel.org> Cc: linux-kernel@vger.kernel.org, patches@lists.linux.dev, linux-um@lists.infradead.org, linux-arm-kernel@lists.infradead.org, kunit-dev@googlegroups.com, linux-kselftest@vger.kernel.org, devicetree@vger.kernel.org, Frank Rowand <frowand.list@gmail.com>, Catalin Marinas <catalin.marinas@arm.com>, Will Deacon <will@kernel.org>, Mark Rutland <mark.rutland@arm.com> Subject: [PATCH v4 5/7] arm64: Unconditionally call unflatten_device_tree() Date: Fri, 16 Feb 2024 17:05:54 -0800 Message-ID: <20240217010557.2381548-6-sboyd@kernel.org> X-Mailer: git-send-email 2.44.0.rc0.258.g7320e95886-goog In-Reply-To: <20240217010557.2381548-1-sboyd@kernel.org> References: <20240217010557.2381548-1-sboyd@kernel.org> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: <linux-kernel.vger.kernel.org> List-Subscribe: <mailto:linux-kernel+subscribe@vger.kernel.org> List-Unsubscribe: <mailto:linux-kernel+unsubscribe@vger.kernel.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-getmail-retrieved-from-mailbox: INBOX X-GMAIL-THRID: 1791107316263439254 X-GMAIL-MSGID: 1791107316263439254 |
Series |
of: populate of_root node if bootloader doesn't
|
|
Commit Message
Stephen Boyd
Feb. 17, 2024, 1:05 a.m. UTC
Call this function unconditionally so that we can populate an empty DTB
on platforms that don't boot with a firmware provided or builtin DTB.
When ACPI is in use, unflatten_device_tree() ignores the
'initial_boot_params' pointer so the live DT on those systems won't be
whatever that's pointing to. Similarly, when kexec copies the DT data
the previous kernel to the new one on ACPI systems,
of_kexec_alloc_and_setup_fdt() will ignore the live DT (the empty root
one) and copy the 'initial_boot_params' data.
Cc: Rob Herring <robh+dt@kernel.org>
Cc: Frank Rowand <frowand.list@gmail.com>
Cc: Catalin Marinas <catalin.marinas@arm.com>
Cc: Will Deacon <will@kernel.org>
Cc: Mark Rutland <mark.rutland@arm.com>
Cc: <linux-arm-kernel@lists.infradead.org>
Signed-off-by: Stephen Boyd <sboyd@kernel.org>
---
arch/arm64/kernel/setup.c | 3 +--
1 file changed, 1 insertion(+), 2 deletions(-)
Comments
On Fri, Feb 16, 2024 at 05:05:54PM -0800, Stephen Boyd wrote: > Call this function unconditionally so that we can populate an empty DTB > on platforms that don't boot with a firmware provided or builtin DTB. > When ACPI is in use, unflatten_device_tree() ignores the > 'initial_boot_params' pointer so the live DT on those systems won't be > whatever that's pointing to. Similarly, when kexec copies the DT data > the previous kernel to the new one on ACPI systems, > of_kexec_alloc_and_setup_fdt() will ignore the live DT (the empty root > one) and copy the 'initial_boot_params' data. > > Cc: Rob Herring <robh+dt@kernel.org> > Cc: Frank Rowand <frowand.list@gmail.com> > Cc: Catalin Marinas <catalin.marinas@arm.com> > Cc: Will Deacon <will@kernel.org> > Cc: Mark Rutland <mark.rutland@arm.com> > Cc: <linux-arm-kernel@lists.infradead.org> > Signed-off-by: Stephen Boyd <sboyd@kernel.org> > --- > arch/arm64/kernel/setup.c | 3 +-- > 1 file changed, 1 insertion(+), 2 deletions(-) Catalin, Will, Can I get an ack on this so I can take the series via the DT tree. Rob
On Thu, Feb 22, 2024 at 05:03:17PM -0700, Rob Herring wrote: > On Fri, Feb 16, 2024 at 05:05:54PM -0800, Stephen Boyd wrote: > > Call this function unconditionally so that we can populate an empty DTB > > on platforms that don't boot with a firmware provided or builtin DTB. > > When ACPI is in use, unflatten_device_tree() ignores the > > 'initial_boot_params' pointer so the live DT on those systems won't be > > whatever that's pointing to. Similarly, when kexec copies the DT data > > the previous kernel to the new one on ACPI systems, > > of_kexec_alloc_and_setup_fdt() will ignore the live DT (the empty root > > one) and copy the 'initial_boot_params' data. > > > > Cc: Rob Herring <robh+dt@kernel.org> > > Cc: Frank Rowand <frowand.list@gmail.com> > > Cc: Catalin Marinas <catalin.marinas@arm.com> > > Cc: Will Deacon <will@kernel.org> > > Cc: Mark Rutland <mark.rutland@arm.com> > > Cc: <linux-arm-kernel@lists.infradead.org> > > Signed-off-by: Stephen Boyd <sboyd@kernel.org> > > --- > > arch/arm64/kernel/setup.c | 3 +-- > > 1 file changed, 1 insertion(+), 2 deletions(-) > > Catalin, Will, Can I get an ack on this so I can take the series via the > DT tree. Mark had strong pretty strong objections to this in version one: https://lore.kernel.org/all/ZaZtbU9hre3YhZam@FVFF77S0Q05N/ and this patch looks the same now as it did then. Did something else change? Will
On Fri, Feb 23, 2024 at 3:23 AM Will Deacon <will@kernel.org> wrote: > > On Thu, Feb 22, 2024 at 05:03:17PM -0700, Rob Herring wrote: > > On Fri, Feb 16, 2024 at 05:05:54PM -0800, Stephen Boyd wrote: > > > Call this function unconditionally so that we can populate an empty DTB > > > on platforms that don't boot with a firmware provided or builtin DTB. > > > When ACPI is in use, unflatten_device_tree() ignores the > > > 'initial_boot_params' pointer so the live DT on those systems won't be > > > whatever that's pointing to. Similarly, when kexec copies the DT data > > > the previous kernel to the new one on ACPI systems, > > > of_kexec_alloc_and_setup_fdt() will ignore the live DT (the empty root > > > one) and copy the 'initial_boot_params' data. > > > > > > Cc: Rob Herring <robh+dt@kernel.org> > > > Cc: Frank Rowand <frowand.list@gmail.com> > > > Cc: Catalin Marinas <catalin.marinas@arm.com> > > > Cc: Will Deacon <will@kernel.org> > > > Cc: Mark Rutland <mark.rutland@arm.com> > > > Cc: <linux-arm-kernel@lists.infradead.org> > > > Signed-off-by: Stephen Boyd <sboyd@kernel.org> > > > --- > > > arch/arm64/kernel/setup.c | 3 +-- > > > 1 file changed, 1 insertion(+), 2 deletions(-) > > > > Catalin, Will, Can I get an ack on this so I can take the series via the > > DT tree. > > Mark had strong pretty strong objections to this in version one: Yes, I had concerns with it as well. > https://lore.kernel.org/all/ZaZtbU9hre3YhZam@FVFF77S0Q05N/ > > and this patch looks the same now as it did then. Did something else > change? Yes, that version unflattened the bootloader passed DT. Now within unflatten_devicetree(), the bootloader DT is ignored if ACPI is enabled and we unflatten an empty tree. That will prevent the kernel getting 2 h/w descriptions if/when a platform does such a thing. Also, kexec still uses the bootloader provided DT as before. Rob
On 2/16/2024 5:05 PM, Stephen Boyd wrote: > Call this function unconditionally so that we can populate an empty DTB > on platforms that don't boot with a firmware provided or builtin DTB. > When ACPI is in use, unflatten_device_tree() ignores the > 'initial_boot_params' pointer so the live DT on those systems won't be > whatever that's pointing to. Similarly, when kexec copies the DT data > the previous kernel to the new one on ACPI systems, > of_kexec_alloc_and_setup_fdt() will ignore the live DT (the empty root > one) and copy the 'initial_boot_params' data. > > Cc: Rob Herring <robh+dt@kernel.org> > Cc: Frank Rowand <frowand.list@gmail.com> > Cc: Catalin Marinas <catalin.marinas@arm.com> > Cc: Will Deacon <will@kernel.org> > Cc: Mark Rutland <mark.rutland@arm.com> > Cc: <linux-arm-kernel@lists.infradead.org> > Signed-off-by: Stephen Boyd <sboyd@kernel.org> This change looks good to me. I am working on a patch set that will benefit from this. Reviewed-by: Oreoluwa Babatunde <quic_obabatun@quicinc.com> Regards, Oreoluwa > --- > arch/arm64/kernel/setup.c | 3 +-- > 1 file changed, 1 insertion(+), 2 deletions(-) > > diff --git a/arch/arm64/kernel/setup.c b/arch/arm64/kernel/setup.c > index 42c690bb2d60..0d210720d47d 100644 > --- a/arch/arm64/kernel/setup.c > +++ b/arch/arm64/kernel/setup.c > @@ -351,8 +351,7 @@ void __init __no_sanitize_address setup_arch(char **cmdline_p) > /* Parse the ACPI tables for possible boot-time configuration */ > acpi_boot_table_init(); > > - if (acpi_disabled) > - unflatten_device_tree(); > + unflatten_device_tree(); > > bootmem_init();
On Fri, Feb 23, 2024 at 11:17:02AM -0700, Rob Herring wrote: > On Fri, Feb 23, 2024 at 3:23 AM Will Deacon <will@kernel.org> wrote: > > > > On Thu, Feb 22, 2024 at 05:03:17PM -0700, Rob Herring wrote: > > > On Fri, Feb 16, 2024 at 05:05:54PM -0800, Stephen Boyd wrote: > > > > Call this function unconditionally so that we can populate an empty DTB > > > > on platforms that don't boot with a firmware provided or builtin DTB. > > > > When ACPI is in use, unflatten_device_tree() ignores the > > > > 'initial_boot_params' pointer so the live DT on those systems won't be > > > > whatever that's pointing to. Similarly, when kexec copies the DT data > > > > the previous kernel to the new one on ACPI systems, > > > > of_kexec_alloc_and_setup_fdt() will ignore the live DT (the empty root > > > > one) and copy the 'initial_boot_params' data. > > > > > > > > Cc: Rob Herring <robh+dt@kernel.org> > > > > Cc: Frank Rowand <frowand.list@gmail.com> > > > > Cc: Catalin Marinas <catalin.marinas@arm.com> > > > > Cc: Will Deacon <will@kernel.org> > > > > Cc: Mark Rutland <mark.rutland@arm.com> > > > > Cc: <linux-arm-kernel@lists.infradead.org> > > > > Signed-off-by: Stephen Boyd <sboyd@kernel.org> > > > > --- > > > > arch/arm64/kernel/setup.c | 3 +-- > > > > 1 file changed, 1 insertion(+), 2 deletions(-) > > > > > > Catalin, Will, Can I get an ack on this so I can take the series via the > > > DT tree. > > > > Mark had strong pretty strong objections to this in version one: > > Yes, I had concerns with it as well. > > > https://lore.kernel.org/all/ZaZtbU9hre3YhZam@FVFF77S0Q05N/ > > > > and this patch looks the same now as it did then. Did something else > > change? > > Yes, that version unflattened the bootloader passed DT. Now within > unflatten_devicetree(), the bootloader DT is ignored if ACPI is > enabled and we unflatten an empty tree. That will prevent the kernel > getting 2 h/w descriptions if/when a platform does such a thing. Also, > kexec still uses the bootloader provided DT as before. That avoids the main instance of my concern, and means that this'll boot without issue, but IIUC this opens the door to dynamically instantiating DT devices atop an ACPI base system, which I think in general is something that's liable to cause more problems than it solves. I understand that's desireable for the selftests, though I still don't believe it's strictly necessary -- there are plenty of other things that only work if the kernel is booted in a specific configuration. Putting the selftests aside, why do we need to do this? Is there any other reason to enable this? Mark.
On Tue, Feb 27, 2024 at 05:34:58PM +0000, Mark Rutland wrote: > On Fri, Feb 23, 2024 at 11:17:02AM -0700, Rob Herring wrote: > > On Fri, Feb 23, 2024 at 3:23 AM Will Deacon <will@kernel.org> wrote: > > > > > > On Thu, Feb 22, 2024 at 05:03:17PM -0700, Rob Herring wrote: > > > > On Fri, Feb 16, 2024 at 05:05:54PM -0800, Stephen Boyd wrote: > > > > > Call this function unconditionally so that we can populate an empty DTB > > > > > on platforms that don't boot with a firmware provided or builtin DTB. > > > > > When ACPI is in use, unflatten_device_tree() ignores the > > > > > 'initial_boot_params' pointer so the live DT on those systems won't be > > > > > whatever that's pointing to. Similarly, when kexec copies the DT data > > > > > the previous kernel to the new one on ACPI systems, > > > > > of_kexec_alloc_and_setup_fdt() will ignore the live DT (the empty root > > > > > one) and copy the 'initial_boot_params' data. > > > > > > > > > > Cc: Rob Herring <robh+dt@kernel.org> > > > > > Cc: Frank Rowand <frowand.list@gmail.com> > > > > > Cc: Catalin Marinas <catalin.marinas@arm.com> > > > > > Cc: Will Deacon <will@kernel.org> > > > > > Cc: Mark Rutland <mark.rutland@arm.com> > > > > > Cc: <linux-arm-kernel@lists.infradead.org> > > > > > Signed-off-by: Stephen Boyd <sboyd@kernel.org> > > > > > --- > > > > > arch/arm64/kernel/setup.c | 3 +-- > > > > > 1 file changed, 1 insertion(+), 2 deletions(-) > > > > > > > > Catalin, Will, Can I get an ack on this so I can take the series via the > > > > DT tree. > > > > > > Mark had strong pretty strong objections to this in version one: > > > > Yes, I had concerns with it as well. > > > > > https://lore.kernel.org/all/ZaZtbU9hre3YhZam@FVFF77S0Q05N/ > > > > > > and this patch looks the same now as it did then. Did something else > > > change? > > > > Yes, that version unflattened the bootloader passed DT. Now within > > unflatten_devicetree(), the bootloader DT is ignored if ACPI is > > enabled and we unflatten an empty tree. That will prevent the kernel > > getting 2 h/w descriptions if/when a platform does such a thing. Also, > > kexec still uses the bootloader provided DT as before. > > That avoids the main instance of my concern, and means that this'll boot > without issue, but IIUC this opens the door to dynamically instantiating DT > devices atop an ACPI base system, which I think in general is something that's > liable to cause more problems than it solves. > > I understand that's desireable for the selftests, though I still don't believe > it's strictly necessary -- there are plenty of other things that only work if > the kernel is booted in a specific configuration. Why add to the test matrix if we don't have to? > Putting the selftests aside, why do we need to do this? Is there any other > reason to enable this? See my Plumbers talk... Or in short, there's 3 main usecases: - PCI FPGA card with devices instantiated in it - SoCs which expose their peripherals via a PCI endpoint. - Injecting test devices with QEMU (testing, but not what this series does. Jonathan Cameron's usecase) In all cases, drivers already exist for the devices, and they often only support DT. DT overlays is the natural solution for this, and there's now kernel support for it (dynamically generating PCI DT nodes when they don't exist). The intent is to do the same thing on ACPI systems. I don't see another solution other than 'go away, you're crazy'. There's ACPI overlays, but that's only a debug feature. Also, that would encourage more of the DT bindings in ACPI which I find worse than this mixture. There's swnodes, but that's just board files and platform_data 2.0. I share the concerns with mixing, but I don't see a better solution. The scope of what's possible is contained enough to avoid issues. Rob
diff --git a/arch/arm64/kernel/setup.c b/arch/arm64/kernel/setup.c index 42c690bb2d60..0d210720d47d 100644 --- a/arch/arm64/kernel/setup.c +++ b/arch/arm64/kernel/setup.c @@ -351,8 +351,7 @@ void __init __no_sanitize_address setup_arch(char **cmdline_p) /* Parse the ACPI tables for possible boot-time configuration */ acpi_boot_table_init(); - if (acpi_disabled) - unflatten_device_tree(); + unflatten_device_tree(); bootmem_init();