Received: by 2002:ab2:b82:0:b0:1f3:401:3cfb with SMTP id 2csp222538lqh; Wed, 27 Mar 2024 22:50:13 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCUURReNuSbeXv71av4LbVhtjQ7fYHJCnq0skYdxV/YOCq/vmttr+uUvXzJXpLZFLJWdQLAsrHrM+iIs6uCjZf0qAswa1lWJLDxT3Ri9aA== X-Google-Smtp-Source: AGHT+IHupRZcnK9dj98pAngrsvi4b3w7pultmMewb/eZNrTmVEuGKxylhN7k657Cz1zqelZ/Do3E X-Received: by 2002:a05:6a00:1408:b0:6ea:ba4e:f198 with SMTP id l8-20020a056a00140800b006eaba4ef198mr2060138pfu.9.1711605013206; Wed, 27 Mar 2024 22:50:13 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1711605013; cv=pass; d=google.com; s=arc-20160816; b=KqcHkCmQbvE8RqEGBnsdJHSm88jwVbieu7c3JXwnLO7gLcykWw8mbBxCVtZsXBp392 oCeIl+Q7Lame7yW34eIosdl+speCDoXj4E4gru+4v+w+dqbkRD++hN4wEum+xfxR8cCW vhKlyahO/pI9zut7Y3wdKGijxobbRplVkjJ21psASMt/ZFiBPcaQwr4hpPKVXvvtqTAJ XYHNVPKSyOgUgToznQBTUrgDS093x0N8BPYVB57FOqRsSpOBeIfj4Cq5JcvT88t4fYqU DlxoalHvWOGAYRjMKH4GftQ99orDIw4YKqNBVd6PSueIn7olkDepIbDT/u9bGruyKYrQ mjjA== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:list-unsubscribe:list-subscribe :list-id:precedence:dkim-signature; bh=cn31nvUNUjuzpJBbAgPyDFbqbILk+7I0RyNp0AFjRSE=; fh=RTLTbKtM3vDj7KBZSp9DoSPNY5ulwS9CsMv+ytBuqlc=; b=DIUpZrCXmh+F9ymAy2ctvwQT6b+qE6LPqVSBFe8yIwC3dCKtiOMd6t4XFG7i/PV1On o2LdgppiegypT4rR3gezCOdvwx47EhmLAqZh/zzGHn1Iy6cmXJ1SV3BfscXQ6MxGzP0N ORfv1HuxH+jtjxY1oDbVfrJ+HhpVzkhJPKi56cEncVbLcfg1/r8wBzVgf4EWtryaaOum CN+fGCkp7xq5trEpZ3Sbe++JMDC6sPSgckuI9HXlysV2eYjsBYML8kgdREj6+Rjo9E+e azXkUIBmjECAd/aO9J+fh1FhZn28RhmaHYJrl8RGlfTXjVuYN6xYA77jX0NQzUYuJbaM owkA==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=EqO1qpxd; arc=pass (i=1 spf=pass spfdomain=chromium.org dkim=pass dkdomain=chromium.org dmarc=pass fromdomain=chromium.org); spf=pass (google.com: domain of linux-kernel+bounces-122438-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-122438-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Return-Path: Received: from sv.mirrors.kernel.org (sv.mirrors.kernel.org. [2604:1380:45e3:2400::1]) by mx.google.com with ESMTPS id ei32-20020a056a0080e000b006e7243bbda7si759270pfb.367.2024.03.27.22.50.12 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 27 Mar 2024 22:50:13 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-122438-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) client-ip=2604:1380:45e3:2400::1; Authentication-Results: mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=EqO1qpxd; arc=pass (i=1 spf=pass spfdomain=chromium.org dkim=pass dkdomain=chromium.org dmarc=pass fromdomain=chromium.org); spf=pass (google.com: domain of linux-kernel+bounces-122438-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-122438-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sv.mirrors.kernel.org (Postfix) with ESMTPS id D9E11291B23 for ; Thu, 28 Mar 2024 05:50:12 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 5907C4E1C6; Thu, 28 Mar 2024 05:50:00 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=chromium.org header.i=@chromium.org header.b="EqO1qpxd" Received: from mail-lf1-f51.google.com (mail-lf1-f51.google.com [209.85.167.51]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 851B54CDEB for ; Thu, 28 Mar 2024 05:49:57 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.167.51 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1711604999; cv=none; b=ge2oceog5Tx9YGr85kKMGcCLk8NgGPpFvpMGtxHv8GmTtQKxBtugETDUZgmoKlIosfVopbwuc7x8jZtoffPckbVT8jvhupjadJDby/HWmts3JbOiRmz6DUpvOby3G7zCzwQbjElkKk5jHrH8sbC+ukeZPVmy7iXQPmnBSHLYTNU= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1711604999; c=relaxed/simple; bh=cn31nvUNUjuzpJBbAgPyDFbqbILk+7I0RyNp0AFjRSE=; h=MIME-Version:References:In-Reply-To:From:Date:Message-ID:Subject: To:Cc:Content-Type; b=n1yEjqESFZKKl3pTUyy0+HJq8dajM+4RmwKmEB8Ues57bufOnWw54vPaEZdfkPKRLeMfCjgrsnK/gdkSc2s0vNvsvkw7K9AX3dNgoxDuMfLA/9hyC8cDSIrsk+l+txjCi88Sck0dT09KX+IsuRNSV0YghD4MyBW4y1guvS1DkL4= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=chromium.org; spf=pass smtp.mailfrom=chromium.org; dkim=pass (1024-bit key) header.d=chromium.org header.i=@chromium.org header.b=EqO1qpxd; arc=none smtp.client-ip=209.85.167.51 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=chromium.org Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=chromium.org Received: by mail-lf1-f51.google.com with SMTP id 2adb3069b0e04-513d247e3c4so582736e87.0 for ; Wed, 27 Mar 2024 22:49:57 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; t=1711604996; x=1712209796; darn=vger.kernel.org; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:from:to:cc:subject:date :message-id:reply-to; bh=cn31nvUNUjuzpJBbAgPyDFbqbILk+7I0RyNp0AFjRSE=; b=EqO1qpxdgMVAy4qt4wi/S7W10sSAb99s7msAvI4h8uz8vL1JW1DivGxFbJKCO2CmVi uhno3Jc4F4VV312ZgktGxCVAHbFv3g4lC2Zs3yj0YSrA4l0ABpAZAqtVfub7B9yiEOn1 qxc2TOsTmOGR94M9neC4O67OAtULhJNcHnWm8= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1711604996; x=1712209796; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=cn31nvUNUjuzpJBbAgPyDFbqbILk+7I0RyNp0AFjRSE=; b=dYnzWbHOMRp/07Nch9SW1eaaGm7HUBIuQjO2IBW2UYavYi4z4pwyk0iR7AkXE8YuMH 6p8w6YR1fQcZECQxYJ24+uJymZJkqleNQK/03DNP6iW5olxsWyC+vAbGibWcATDmrS6A tOCBxmfAhQshcuM7MlwVGBkU8XXM+VIRLs/zDbeEWNxo+godxOroG97aCEvbL8OtPpoW +GTljYMh27xH/wCrxIVALlimH7twxG7/EkT0YtmbQ78Rbi2CPxJRzoKYp1vEPuBrSIjD dd1npE0Q6pZn/sfFsHdxGizNWohssRctlRca/EdCnNxxg0lMK1127pFpIGZB4PMQfPas 4/nw== X-Forwarded-Encrypted: i=1; AJvYcCV11S9/JHSNqyXh6aKnD+hVvYSvdLItlO/SxoQ9XDyvpG1tyhlpflM0ewpX1dlyTFnq+VfV27OtdypKyMrMYe9i92pMT45ndEKX78Qg X-Gm-Message-State: AOJu0Ywdt614GZOEeMB/HrY4yWYokllE0KQhieg5cR+aUfmF6vc/9Xyl HOB69qLttj4v6eZIUzSgL/kdYSyvv5NygkETMCDDwFyFMFL5NhgSfpM5CCiF96gtl8CPV9UP6/D 4wwlJzRIBfzEojHPGQpeUudw9NZKznb+BgNtS X-Received: by 2002:a05:6512:32bb:b0:513:dfac:b29e with SMTP id q27-20020a05651232bb00b00513dfacb29emr414742lfe.26.1711604995631; Wed, 27 Mar 2024 22:49:55 -0700 (PDT) Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 References: <1710418312-6559-1-git-send-email-quic_amrianan@quicinc.com> <1710418312-6559-3-git-send-email-quic_amrianan@quicinc.com> <20240316-germinate-browsing-6865db3a44d7@spud> <20240316-herring-skies-6ee1d4a9c0d2@spud> In-Reply-To: From: Chen-Yu Tsai Date: Thu, 28 Mar 2024 13:49:44 +0800 Message-ID: Subject: Re: [PATCH v2 2/2] dt-bindings: qcom: Update DT bindings for multiple DT To: Doug Anderson , Amrit Anand Cc: Conor Dooley , Caleb Connolly , robh@kernel.org, krzysztof.kozlowski+dt@linaro.org, conor+dt@kernel.org, agross@kernel.org, andersson@kernel.org, konrad.dybcio@linaro.org, devicetree@vger.kernel.org, linux-kernel@vger.kernel.org, linux-arm-msm@vger.kernel.org, kernel@quicinc.com, peter.griffin@linaro.org, linux-riscv@lists.infradead.org, chrome-platform@lists.linux.dev, linux-mediatek@lists.infradead.org, Simon Glass , Julius Werner , Elliot Berman Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable On Tue, Mar 19, 2024 at 5:36=E2=80=AFAM Doug Anderson wrote: > > Hi, > > On Sat, Mar 16, 2024 at 9:51=E2=80=AFAM Conor Dooley w= rote: > > > > On Sat, Mar 16, 2024 at 04:20:03PM +0000, Conor Dooley wrote: > > > On Thu, Mar 14, 2024 at 02:20:38PM +0000, Caleb Connolly wrote: > > > > On 14/03/2024 12:11, Amrit Anand wrote: > > > > 2. A top level board-id property that isn't namespaced implies that= it > > > > isn't vendor specific, but the proposed implementation doesn't even > > > > pretend to be vendor agnostic. > > > > > > I pointed out previously that the Chromebook guys had some similar > > > issues with dtb selection when the OEM varies parts but there does no= t > > > seem to be any of them on CC here. > > > > That's maybe a bit harsh of me actually, I see that there's a > > chrome-platform address on CC, but I don't know if that's gonna reach > > the guys that work on these devices (Chen-Yu Tsai and Doug Anderson in > > particular). > > Thanks for the CC. Yeah, I don't watch the "chrome-platform" list > myself, though maybe I should... > > The Chromebook boot flow and how we've handled this so far is > documented in the kernel [1]. This method is what we've been using > (with slight modifications over the years) since the earlier ARM > Chromebooks and is, I believe, supported in both the depthcharge > loader (used in Chromebooks) and also in U-Boot, though it's possible > (?) that the U-Boot rules might vary ever so slightly. I haven't tried > using U-Boot to boot a Chromebook in years. > > The current way things work for Chromebooks involves a heavy amount of > duplication. We bundle an entire "DTB" for every relevant > board/rev/sku combination even though many of those DTBs are 99% the > same as the other ones. The DTBs have been relatively small and we > compress them so this hasn't been a massive deal, but it's always been > on the TODO list to come up with a scheme to use DT overlays. We've > also talked about bundling a device tree that has the superset of > components and then using an in-kernel driver to set the status of > some components to okay and there is some overlap there in the > possible way to represent board variants. I think Chen-Yu is going to > talk about a few of these topics next month at EOSS [2]. That's right. It's the last talk before the closing game on the last day. Elliot is also presenting the board-id proposal at EOSS [3], which is the last talk of day 2. > In terms of looking at your specific proposal, it's definitely trying > to factor in a lot more things than the current one that Chromebooks > use. The Chromebook model was "simple" enough that we could just > leverage the compatible string, though the way we leverage it has > ended up controversial over the years. Yours is definitely too > complicated to work the same way. It seems like device tree overlays > would be a better fit? I'm not an expert so maybe this is already > solved somewhere, but I'd imagine the hard part is getting everyone to > agree on how to specify stuff in the DT overlay that allows the > bootloader to know whether to overlay it or not... I think qcom,board-id + qcom,oem-id maps to our board name + SKU ID + revis= ion. The difference is probably because we make our device codenames public? We don't actually have integer identifiers for each board family, though I do see the appeal of it. So it looks like this proposal is more about identifying boards without polluting (?) the compatible namespace with all sorts of combinations and hacks like we have. > [1] https://docs.kernel.org/arch/arm/google/chromebook-boot-flow.html > [2] https://eoss24.sched.com/event/1aBGe/second-source-component-probing-= on-device-tree-platforms-chen-yu-tsai-google-llc [3] https://eoss24.sched.com/event/1aBFy/shipping-multiple-devicetrees-how-= to-identify-which-dtb-is-for-my-board-elliot-berman-qualcomm