public inbox for development@lists.ipfire.org
 help / color / mirror / Atom feed
From: Michael Tremer <michael.tremer@ipfire.org>
To: development@lists.ipfire.org
Subject: Re: ARM 64?
Date: Mon, 20 Aug 2018 16:11:21 +0100	[thread overview]
Message-ID: <dae3469cae510ff5e4baf201c2fe40adbec29a6e.camel@ipfire.org> (raw)
In-Reply-To: <55025D1B-BA00-47EE-A951-1DBC62383DC1@traverse.com.au>

[-- Attachment #1: Type: text/plain, Size: 12506 bytes --]

Hello,

On Sun, 2018-08-19 at 18:54 +1000, Mathew McBride wrote:
> Hi Michael,
> I gave the arm64 snapshot a go under virtualization on our boards. 
> The kernel dies very quickly, I had to use earlycon to get some output.
> 
> It looks like ACPI isn't enabled? (CONFIG_ACPI=n in
> config/kernel/kernel.config.aarch64-ipfire)

Yes, that might be possible.

The ARM64 configuration came from the 32 bit ARM build and that was terribly
stripped down, because it doesn't have support for things like PCI, EFI and no
ACPI either - and if it does in theory, nobody is using that in the real world.

> Our board does not use ACPI, but under virtualization, the Linaro UEFI/EDK2
> blobs for QEMU use ACPI exclusively, as do recent "ARM Server"/SBSA boards I
> believe. Your APM Mustang certainly pre-dates the 'mainstream' ARM64 switch to
> ACPI.

I have only been running it as a virtual machine on the Mustang and not
natively. So potentially it won't run there either because I upgraded my machine
to EFI and I guess that needs ACPI on bare-metal. But I am not sure. Didn't test
it.

> CONFIG_ACPI=y will not prevent the kernel working on boards that use the
> FDT/Device tree method, just that an ACPI device table will be used instead of
> FDT if it exists.
> 
> Here is the set of options I use (I think these are the arm64 defaults) that
> work with EDK2:
> 
https://gitlab.com/traversetech/traverse-kernel-patches/blob/kernel-4-14/kernel-config#L4102

You can edit the kernel configuration if you want and then rebuild the whole
distribution. Eventually this will give you an image that runs.

I am not sure what we can test without hardware here. Maybe Arne can say
something about that.

But thanks for looking into things so far!

Best,
-Michael

> 
> efi: Getting EFI parameters from FDT:
> efi: EFI v2.60 by EDK II
> efi:  SMBIOS 3.0=0x5bdb0000  ACPI 2.0=0x585b0000  MEMATTR=0x58e27018
> cma: Reserved 8 MiB at 0x000000005f800000
> Failed to find device node for boot cpu
> missing boot CPU MPIDR, not enabling secondaries
> ..
> Kernel panic - not syncing: No interrupt controller found.
> CPU: 0 PID: 0 Comm: swapper/0 Not tainted 4.14.50-ipfire #1
> Call trace:
> [<ffffff800808b078>] dump_backtrace+0x0/0x288
> [<ffffff800808b324>] show_stack+0x24/0x30
> [<ffffff80088dc108>] dump_stack+0x9c/0xbc
> [<ffffff80080a7b14>] panic+0x140/0x29c
> [<ffffff8008e07c30>] init_IRQ+0x1c8/0x208
> [<ffffff8008e016c4>] start_kernel+0x33c/0x5a0
> Rebooting in 10 seconds..
> Reboot failed -- System halted
> 
> Full boot log attached.
> 
> Cheers,
> Matt
> 
> 
> On 26/7/18, 7:50 pm, "Michael Tremer" <michael.tremer(a)ipfire.org> wrote:
> 
>     -----BEGIN PGP SIGNED MESSAGE-----
>     Hash: SHA512
>     
>     Hello guys,
>     
>     so here is a quick status update on aarch64 & EFI:
>     
>     * EFI: We have a separate branch with a bootloader that runs in EFI
>     mode for x86_64 and aarch64. We won't support 32 bit x86 and EFI.
>     
>     It seems to be running quite okay on most hardware, although we haven't
>     really tested enough yet to say if is ready for production. All in all
>     we might merge it for Core 124, but since there was no feedback
>     whatsoever it is hard to make that decision, yet.
>     
>     * aarch64: We got a booting kernel and userland. It runs on the RPi 3
>     with a little bit of manual configuration of the bootloader. Generally
>     I do not want to support any SBCs, but Arne used this one for testing
>     at least.
>     
>     Since we don't have any other hardware and especially nothing that
>     supports EFI, we haven't brought the two things together, but are
>     looking forward to do this soon.
>     
>     I have launched a virtual machine with both, aarch64 and EFI on the APM
>     Mustang that I have available and it is running well. It is fast, it is
>     stable and we don't expect a big backlog of bugs that we need to solve
>     before this is ready to be shipped.
>     
>     So, that is the July update from my side. Please feel free to ask any
>     questions if there are any.
>     
>     Best,
>     - -Michael
>     
>     On Mon, 2018-06-18 at 18:11 +0200, Peter Müller wrote:
>     > Hello,
>     > 
>     > this looks quite good - I am strongly interested. :-)
>     > 
>     > Best regards,
>     > Peter Müller
>     > 
>     > > On Mon, 2018-06-18 at 09:40 +1000, Mathew McBride wrote:
>     > > > Hi Peter,
>     > > > There are two crypto options on our board:
>     > > > - ARMv8 Cryptography instructions (similar to AES-NI on x86)
>     > > > - Freescale SEC/CAAM engine (a 'hardware accelerator' that can do
> many
>     > > > TLS,IPSec etc. operations)
>     > > > I am certain that an RNG is part of the SEC engine, but I need to
> check the
>     > > > driver status on Linux.
>     > > > 
>     > > > /proc/crypto output for those interested:
>     > > > https://gist.github.com/mcbridematt/11f14c78ed4e35e97adf2f027010e374
>     > > 
>     > > Wow, that is a very extensive list of supported ciphers and hashes as
> well as
>     > > the combination of HMAC + cipher mode.
>     > > 
>     > > IPsec in the kernel will basically be not consuming any CPU cycles for
> crypto.
>     > > 
>     > > Best,
>     > > -Michael
>     > > 
>     > > > 
>     > > > Regards,
>     > > > Mathew 
>     > > > 
>     > > > On 15/6/18, 3:09 am, "Peter Müller" <peter.mueller(a)link38.eu>
> wrote:
>     > > > 
>     > > >     Hello,
>     > > >     
>     > > >     this board sounds very interesting indeed (trustworthy hardware
> - yay!).
>     > > >     However, after reading the datasheet it did not became clear to
> me if it
>     > > >     has some built-in random number generator and/or cryptography
>     > > > acceleration.
>     > > >     
>     > > >     Apart from some low-level backdoors (baked into USB, ...
> firmware chips)
>     > > >     it seems like this is suitable for security relevant devices.
> Looking
>     > > >     forward to hear some experiences with IPFire on it. :-)
>     > > >     
>     > > >     Best regards,
>     > > >     Peter Müller
>     > > >     
>     > > >     > Hey Matt,
>     > > >     > 
>     > > >     > On Mon, 2018-05-28 at 20:32 +1000, Mathew McBride wrote:
>     > > >     >> Hi Michael,
>     > > >     >>
>     > > >     >> Just in response to your questions:
>     > > >     >> On 25/5/18, 11:10 pm, "Michael Tremer" <
> michael.tremer(a)ipfire.org>
>     > > > wrote:
>     > > >     >>     
>     > > >     >>     
>     > > >     >>     I think you hardware is good enough for a builder. But I
> still am
>     > > > not sure
>     > > >     >> what
>     > > >     >>     to expect from the CPU. It will be faster than a
> Raspberry Pi, but
>     > > > not a
>     > > >     >>     Mustang.
>     > > >     >>     
>     > > >     >> We did some benchmarks with the Phoronix test suite a while
> ago, this
>     > > > will
>     > > >     >> give you an idea:
>     > > >     >> http://openbenchmarking.org/result/1708303-TR-
>     > > >     >> 1703199RI93&obr_hgv=Traverse+LS1043+Prototype
>     > > >     > 
>     > > >     > I had a look at that. And yes indeed, it is a bit hard to
> figure out the
>     > > >     > performance by the CPU name alone for most ARM SoCs. There is
> no
>     > > > branding in
>     > > >     > order of performance (or similar) like Intel has.
>     > > >     > 
>     > > >     > That might actually turn out to be a bigger marketing problem,
> but we
>     > > > will see
>     > > >     > that in the future.
>     > > >     > 
>     > > >     >> To give an idea of the Cortex (ARM designed)-based core
> performance:
>     > > >     >>
>     > > >     >> The LS1043 has the same A53 cores as the RPi3, but performs
> better due
>     > > > to
>     > > >     >> having more cache, DDR4 etc (and higher clock).
>     > > >     > 
>     > > >     > Performance is also coming from the rest of the periphery. The
> RPi has a
>     > > > slow
>     > > >     > and not very stable USB bus to talk to the network to and SD
> card
>     > > > storage. Even
>     > > >     > with a faster CPU it might very often just wait for data.
>     > > >     > 
>     > > >     > We have been trying to tell people that they should look out
> for some
>     > > > specific
>     > > >     > features like cache and good single-core performance.
>     > > >     > 
>     > > >     >> A72 is about double A53 in performance (and power
> consumption!) per
>     > > > MHz, as
>     > > >     >> A72 is a modern out-of-order speculative core (it did get hit
> with the
>     > > >     >> Meltdown/Spectre issue).
>     > > >     > 
>     > > >     > Yes, wouldn't mind to have some systems based on that one
> since the A53
>     > > > will be
>     > > >     > too slow for really large enterprise deployments.
>     > > >     > 
>     > > >     >> The latest gen of ARM64 server cores would all be well above
> A72, your
>     > > > Mustang
>     > > >     >> is probably around the A72 level.
>     > > >     >>
>     > > >     >> In general, ARM network SoCs try to work 'smarter' instead of
> 'harder',
>     > > > so the
>     > > >     >> high network performance comes from having very good network
> silicon,
>     > > > taking
>     > > >     >> advantage of crypto accelerators etc.
>     > > >     > 
>     > > >     > I prefer the NICs in the SoC which gives great performance.
> The
>     > > > disadvantage
>     > > >     > only is that they sometimes to odd configurations like 5x 1G
> and 1x 10G
>     > > > in this
>     > > >     > case which I don't really understand. The only use-case that
> makes sense
>     > > > to me
>     > > >     > is a server but for that the CPU is too slow and people would
> probably
>     > > > go for a
>     > > >     > A72-class CPU.
>     > > >     > 
>     > > >     >>     > There is a TrustZone firmware running in the ring/EL
> above the
>     > > > OS, for
>     > > >     >> the NXP
>     > > >     >>     > Layerscape/QorIQ SoC's this firmware is open source,
> and not
>     > > > strictly
>     > > >     >> required
>     > > >     >>     > to run the system (it gets loaded by u-boot after power
> on).
>     > > >     >>     
>     > > >     >>     What does the firmware do?
>     > > >     >> It implements some vendor-specific power-management
> extensions (PSCI),
>     > > > as well
>     > > >     >> as some TPM-like functions.
>     > > >     >> NXP provides a good overview: 
> https://github.com/qoriq-open-source/ppa-
>     > > > generic
>     > > >     >> /blob/integration/ReleaseNotes.txt
>     > > >     >> I am not a security expert, but it could be a good test
> environment for
>     > > > secure
>     > > >     >> boot, private key storage and other things.
>     > > >     > 
>     > > >     > Great that this is entirely open.
>     > > >     > 
>     > > >     > -Michael
>     > > >     > 
>     > > >     >>
>     > > >     >>     
>     > > >     >> Cheers,
>     > > >     >> Matt
>     > > >     >>  
>     > > >     >>
>     > > >     >>
>     > > >     
>     > > >     -- 
>     > > >     "We don't care.  We don't have to.  We're the Phone Company."
>     > > >     
>     > > >     
>     > > > 
>     > > > 
>     > 
>     > 
>     -----BEGIN PGP SIGNATURE-----
>     
>     iQIzBAEBCgAdFiEE5/rW5l3GGe2ypktxgHnw/2+QCQcFAltZmUsACgkQgHnw/2+Q
>     CQcNfw//VkhXWguNNy/rsjeNLxNlzkJaeb9VXVar6vaTwvq6CcjgNtoRHJcsYU5t
>     Pk550WufwCeWk1b8VjmGrO1AAfMow/aXVfYJ+wlR0vpi/pwiX596wt1PLcGYMlCB
>     Ye8Zz4N1FjR1wh8Mqv1aH9AAYhzAKp80GM3bAxU4IRaENutMpdLnOpL9/tiMeoNs
>     hK9P9skFobvMVQxi+BoF8aWVJrpuVlNP56a/JE/8CVB85El7YnqxLixoDuL1GHjN
>     6E4CSqtLM8OY9morx32yxd9XvvanxiivAlCnzu8vII8OMuf050fGDV/WHTMlXNEc
>     S/C5Uua3tcGRInsf2LwPuZ3nMHL4nVIvLUMioMVeCEjoLftQOGgOUK/gV7AOYoy8
>     WicItyGRduY3IxB79LkRRKy7nZyRTeUm9zxEqsNmT6MquQDhrNa9hQB5LB2N3ZQv
>     L7CHgeXxtHt5F7n7PQJaICCf0Zl0BM4yP8NK5bpK8YVYP30s8dQxWBbhEuYDO241
>     ryYIaZ6Xv3cOEH7Md97+2aMsuyXepI/ZW/wpFI//MlkOXoWHNKLDyigmy5rPbQNW
>     gHIyp7xGOTYOoZPh/jii9dYDwQWNvNMESzC+AsYkBWLmyTYtsexIYts3FIXxunp8
>     9sqknx/jvhYNsR+9F8htZ9lAhI9fgqqGe9wBPp+blDRE/VNa+Jc=
>     =khkX
>     -----END PGP SIGNATURE-----
>     
>     
> 


  reply	other threads:[~2018-08-20 15:11 UTC|newest]

Thread overview: 18+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
     [not found] <c51182f4-9958-4b76-83e0-9a8affa81038@traverse.com.au>
2018-05-24  1:32 ` Mathew McBride
2018-05-24 10:31   ` Michael Tremer
2018-05-24 11:02     ` Mathew McBride
2018-05-24 14:44       ` Michael Tremer
2018-05-25  2:45         ` Mathew McBride
2018-05-25 13:10           ` Michael Tremer
2018-05-28 10:32             ` Mathew McBride
2018-05-28 11:15               ` Michael Tremer
2018-06-14 17:08                 ` Peter Müller
2018-06-17 23:40                   ` Mathew McBride
2018-06-18 11:23                     ` Michael Tremer
2018-06-18 16:11                       ` Peter Müller
2018-07-26  9:50                         ` Michael Tremer
2018-08-04 18:31                           ` Peter Müller
2018-08-19  8:54                           ` Mathew McBride
2018-08-20 15:11                             ` Michael Tremer [this message]
2018-05-23  2:46 Guy Ellis
2018-05-23  9:58 ` Michael Tremer

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=dae3469cae510ff5e4baf201c2fe40adbec29a6e.camel@ipfire.org \
    --to=michael.tremer@ipfire.org \
    --cc=development@lists.ipfire.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox