From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received-SPF: Pass (sender SPF authorized) identity=mailfrom; client-ip=209.132.183.28; helo=mx1.redhat.com; envelope-from=lersek@redhat.com; receiver=edk2-devel@lists.01.org Received: from mx1.redhat.com (mx1.redhat.com [209.132.183.28]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ml01.01.org (Postfix) with ESMTPS id BCD28220F3C23 for ; Fri, 1 Dec 2017 02:43:38 -0800 (PST) Received: from smtp.corp.redhat.com (int-mx02.intmail.prod.int.phx2.redhat.com [10.5.11.12]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id B6C99C059B6E; Fri, 1 Dec 2017 10:48:04 +0000 (UTC) Received: from lacos-laptop-7.usersys.redhat.com (ovpn-120-33.rdu2.redhat.com [10.10.120.33]) by smtp.corp.redhat.com (Postfix) with ESMTP id 8236760C89; Fri, 1 Dec 2017 10:48:03 +0000 (UTC) To: Ard Biesheuvel , Jordan Justen Cc: edk2-devel-01 , Anthony Perard , Julien Grall References: <20171130163029.19743-1-lersek@redhat.com> <151206841527.2995.813353909213222112@jljusten-skl> From: Laszlo Ersek Message-ID: <47971f82-c423-34fc-952b-8ff35f64118f@redhat.com> Date: Fri, 1 Dec 2017 11:48:02 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.4.0 MIME-Version: 1.0 In-Reply-To: X-Scanned-By: MIMEDefang 2.79 on 10.5.11.12 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.32]); Fri, 01 Dec 2017 10:48:04 +0000 (UTC) Subject: Re: [PATCH v2 0/8] OvmfPkg: add the Variable PEIM, defragment the UEFI memmap X-BeenThere: edk2-devel@lists.01.org X-Mailman-Version: 2.1.22 Precedence: list List-Id: EDK II Development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 01 Dec 2017 10:43:38 -0000 Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit On 12/01/17 09:42, Ard Biesheuvel wrote: > On 30 November 2017 at 19:00, Jordan Justen wrote: >> As I recall, this enables a modest (non-essential) improvement in >> fragmentation, at the cost of more ways to configure OVMF to hang >> during boot. (With info available via debugcon.) >> >> I would prefer if were able to always fallback and continue boot. >> Later, after GOP has started we could visibly warn the user that they >> haven't properly enabled SMM and/or flash. >> >> If we had a way to do this, I would be in favor of displaying an error >> message and delaying for 30 seconds before booting if flash has not >> been enabled. (Or, if SMM was enabled in the build, but not set on the >> command line.) >> >> At that point, I think we could start to transition to making flash an >> boot requirement for OVMF. But first we need to be able to visibly >> warn the user why they are not able to boot. >> > > That doesn't argue against this series, does it? AFAICT it only argues > against building OVMF with a non-default value for > MEM_VARSTORE_EMU_ENABLE ... which is explicitly documented in patch 8.