From: Laszlo Ersek <lersek@redhat.com>
To: Jordan Justen <jordan.l.justen@intel.com>,
edk2-devel-01 <edk2-devel@lists.01.org>
Cc: Gary Ching-Pang Lin <glin@suse.com>
Subject: Re: [PATCH 2/3] OvmfPkg: introduce FD_SIZE_4MB (mainly) for Windows HCK
Date: Mon, 1 May 2017 20:40:58 +0200 [thread overview]
Message-ID: <88d156c9-c18e-c4e8-b9a3-641a1b6b4102@redhat.com> (raw)
In-Reply-To: <149365940885.25909.1007719045522991203@jljusten-skl>
On 05/01/17 19:23, Jordan Justen wrote:
> On 2017-05-01 03:51:42, Laszlo Ersek wrote:
>> On 04/30/17 23:16, Jordan Justen wrote:
>>> On 2017-04-30 07:42:36, Laszlo Ersek wrote:
>>>
>>>> $ build \
>>>> -b DEBUG \
>>>> -a IA32 -a X64 \
>>>> -p OvmfPkg/OvmfPkgIa32X64.dsc \
>>>> -t GCC48 \
>>>> -D SMM_REQUIRE \
>>>> -D SECURE_BOOT_ENABLE \
>>>> -D HTTP_BOOT_ENABLE \
>>>> -D NETWORK_IP6_ENABLE \
>>>> -D TLS_ENABLE
>>>
>>> Do you enable the last 3 in your production builds? I didn't think it
>>> was the case, but it would change things...
>>
>> That's a very good question, and I expected it.
>>
>> Any sane person being responsible for supporting a package will strive
>> very hard to minimize the features enabled in the package, in order to
>> minimize the problem surface / support burden. I tend to consider myself
>> a sane person, so no, HTTP_BOOT_ENABLE, NETWORK_IP6_ENABLE, and
>> TLS_ENABLE are not turned on.
>>
>> (TLS_ENABLE carries even more weight, because it increases the security
>> attack surface, so turning *that* off is very desirable.)
>>
>> *But*, I certainly want to keep the *ability* to turn these features on
>> (and maybe later features, in 2-3 years' time) if a customer or a
>> partner requests it.
>
> It sounds like you don't expect to 'support' this. At least not to the
> same level as the rest of the firmware.
I hope never to have to support these, but at some point into the future
of RHEL7, I might have no choice.
> I think it is fine to say, if you want to enable these, you may have
> to disable debug on some other features,
As I explained earlier, universal DEBUG coverage is a requirement for
supportability.
(
Example: in parallel to this discussion, our virt QE reported an
independent issue, namely an out-of-SMRAM condition with 240+ VCPUs.
https://bugzilla.redhat.com/show_bug.cgi?id=1447027
The out-of-SMRAM condition is caught by an ASSERT() only. It is in
"UefiCpuPkg/PiSmmCpuDxeSmm/X64/PageTbl.c", function SetStaticPageTable():
212 PageDirectoryEntry = AllocatePageTableMemory (1);
213 ASSERT(PageDirectoryEntry != NULL);
214 ZeroMem (PageDirectoryEntry, EFI_PAGES_TO_SIZE(1));
I find it plausible that if this memory allocation fails, then the
firmware has really no way to continue -- that's okay. But, the ASSERT()
disappears in a RELEASE build -- not okay. Memory allocation failures
should never be handled with *just* an ASSERT().
I hope you appreciate my insistence on DEBUG a bit more, through this
real-life example.
)
> or remove some other features.
Removing features on purpose can be called "offensive regression" in an
enterprise distro, and it is the antithesis of why people decide to pay
for enterprise support.
> In other words, at this point I don't think the size of these should
> be added into the equation for how 'full' the 2MB image is.
I think at this point it is clear that these patches are not appropriate
for upstream OvmfPkg. That's an acceptable closure for me -- while I
would have preferred to get the patches in, the real moral imperative
for me is to *try* the upstreaming at least, whenever I think the
patches are applicable to upstream. I think we've had an honest and
thorough discussion on this -- thank you very much for taking the time!
(Especially over the weekend!)
The current upstream 2MB build should continue working for everyday
purposes.
Cheers
Laszlo
next prev parent reply other threads:[~2017-05-01 18:41 UTC|newest]
Thread overview: 20+ messages / expand[flat|nested] mbox.gz Atom feed top
2017-04-29 20:14 [PATCH 0/3] OvmfPkg: add FD_SIZE_4MB for Windows HCK SB tests, and for future proofing Laszlo Ersek
2017-04-29 20:14 ` [PATCH 1/3] OvmfPkg/OvmfPkg.fdf.inc: extract VARS_LIVE_SIZE and VARS_SPARE_SIZE macros Laszlo Ersek
2017-04-29 20:14 ` [PATCH 2/3] OvmfPkg: introduce FD_SIZE_4MB (mainly) for Windows HCK Laszlo Ersek
2017-04-30 0:48 ` Jordan Justen
2017-04-30 14:42 ` Laszlo Ersek
2017-04-30 21:16 ` Jordan Justen
2017-05-01 10:51 ` Laszlo Ersek
2017-05-01 17:15 ` Jordan Justen
2017-05-01 17:23 ` Jordan Justen
2017-05-01 18:40 ` Laszlo Ersek [this message]
2017-05-01 19:20 ` Jordan Justen
2017-05-01 23:07 ` Laszlo Ersek
2017-05-01 23:38 ` Jordan Justen
2017-05-02 14:39 ` Laszlo Ersek
2017-05-02 18:22 ` Jordan Justen
2017-05-02 19:31 ` Laszlo Ersek
2017-05-02 21:45 ` Jordan Justen
2017-05-03 13:46 ` Laszlo Ersek
2017-05-01 0:06 ` Laszlo Ersek
2017-04-29 20:15 ` [PATCH 3/3] OvmfPkg: raise max variable size (auth & non-auth) to 33KB for FD_SIZE_4MB Laszlo Ersek
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-list from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=88d156c9-c18e-c4e8-b9a3-641a1b6b4102@redhat.com \
--to=devel@edk2.groups.io \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox