From: "Andrei Warkentin" <awarkentin@vmware.com>
To: "devel@edk2.groups.io" <devel@edk2.groups.io>,
Ard Biesheuvel <ard.biesheuvel@arm.com>,
Samer El-Haj-Mahmoud <samer@elhajmahmoud.com>,
"pete@akeo.ie" <pete@akeo.ie>
Cc: Leif Lindholm <leif@nuviainc.com>
Subject: Re: [edk2-devel] [edk2-platform][PATCH v1 0/4] Platform/RaspberryPi : Enable TFTP shell command
Date: Sun, 19 Apr 2020 20:21:47 +0000 [thread overview]
Message-ID: <BN6PR05MB34115242714AE5DA866E6421B9D70@BN6PR05MB3411.namprd05.prod.outlook.com> (raw)
In-Reply-To: <28ac6ff0-86eb-fde7-63f6-c1c7dc0f0724@akeo.ie>
[-- Attachment #1: Type: text/plain, Size: 4403 bytes --]
So if I understood correctly:
* If a random person off the street builds edk2 - they don't get TFTP command out of the box
* Our builds retain TFTP command
Correct?
________________________________
From: devel@edk2.groups.io <devel@edk2.groups.io> on behalf of Pete Batard via groups.io <pete=akeo.ie@groups.io>
Sent: Sunday, April 19, 2020 3:06 PM
To: devel@edk2.groups.io <devel@edk2.groups.io>; Andrei Warkentin <awarkentin@vmware.com>; Ard Biesheuvel <ard.biesheuvel@arm.com>; Samer El-Haj-Mahmoud <samer@elhajmahmoud.com>
Cc: Leif Lindholm <leif@nuviainc.com>
Subject: Re: [edk2-devel] [edk2-platform][PATCH v1 0/4] Platform/RaspberryPi : Enable TFTP shell command
Andrei,
In case this is your concern, please note that we are not removing TFTP
support at all, which is enabled for the RELEASE builds we produce and
will remain so (and which anyone can enable with the macro if they wish).
All that will be changed by the updated proposal is that the current
DEBUG ASSERT will be fixed and TFTP support will remain optional, like
it is today.
So, in this case, I don't think your concern is warranted, because we're
not actually taking any step to deprive anyone of any functionality they
might wish for, and, even with the revised patch, TFTP will remain
enabled in our RELEASE binaries, exactly as it has been before.
Regards,
/Pete
On 2020.04.19 20:56, Andrei Warkentin wrote:
> Hi folks,
>
> If we have to choose abstract goodness over functionality, why wouldn't
> we choose functionality? Functionality that's part of Tiano? The real
> world doesn't care about the TFTP command being an "unsupported hack" or
> not. So there's Tiano-specific code here. Big deal? To rephrase
> differently, why would either Pi 4 developers or Pi 4 UEFI users pay the
> cost of Tiano carrying code that somehow isn't "legit enough" to be enabled?
>
> I mean here we are again, where what goes into the code is being
> dictated by some abstract ideology instead of technical reasons?
>
> A
> ------------------------------------------------------------------------
> *From:* Pete Batard <pete@akeo.ie>
> *Sent:* Sunday, April 19, 2020 9:19 AM
> *To:* Ard Biesheuvel <ard.biesheuvel@arm.com>; Samer El-Haj-Mahmoud
> <samer@elhajmahmoud.com>; devel@edk2.groups.io <devel@edk2.groups.io>
> *Cc:* Leif Lindholm <leif@nuviainc.com>; Andrei Warkentin
> <awarkentin@vmware.com>
> *Subject:* Re: [edk2-platform][PATCH v1 0/4] Platform/RaspberryPi :
> Enable TFTP shell command
> On 2020.04.19 14:33, Ard Biesheuvel wrote:
>> On 4/19/20 3:04 PM, Samer El-Haj-Mahmoud wrote:
>>> Fix an ASSERT with the TFTP dynamic Shell command on the
>>> RPi3 and RPi4 when running DEBUG builds. Also, enable the
>>> command by default for all builds.
>>>
>>
>> Fixing the ASSERT is fine but I am reluctant to enable this by default.
>
> I'm going to second this.
>
> To answer a question Samer was asking elsewhere, this is actually part
> of the reason why TFTP is not enabled in the DEBUG builds we produce at
> https://nam04.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2Fpftf%2FRPi4&data=02%7C01%7Cawarkentin%40vmware.com%7C56cfed340a494707ab0d08d7e49d2d64%7Cb39138ca3cee4b4aa4d6cd83d9dd62f0%7C0%7C0%7C637229236035259614&sdata=Ed8iabD5ARgBBYtsWgGw2Webu7dAW5Q9ju3qyqyVzX4%3D&reserved=0
> (See build_firmware.sh), the reasoning
> being that if someone encounters an issue with RELEASE and we ask them
> to troubleshoot with the DEBUG artifact, we want to eliminate potential
> troublemakers when they try that.
>
>> It is a non-standard hack that ARM contributed in the past, and is not
>> covered by the EFI of Shell specifications. If RPi4 is intended to be a
>> showcase for UEFI on ARM done right, we should not enable this at all.
>
> Here I have to point out that RPi4 becoming a showcase because we intend
> to is not what we are pursuing (because if it was a matter of "willing"
> a showcase into existence, we would have picked a platform with a lot
> less quirks, more comprehensive documentation, and so on).
>
> Instead, we estimate that due to its price point and widespread
> availability, it *is* going to become a de facto showcase, whether
> everybody likes it or not. And that is the reason we want to treat is as
> a showcase where possible.
>
> Regards,
>
> /Pete
>
[-- Attachment #2: Type: text/html, Size: 6261 bytes --]
next prev parent reply other threads:[~2020-04-19 20:21 UTC|newest]
Thread overview: 25+ messages / expand[flat|nested] mbox.gz Atom feed top
2020-04-19 13:04 [edk2-platform][PATCH v1 0/4] Platform/RaspberryPi : Enable TFTP shell command Samer El-Haj-Mahmoud
2020-04-19 13:04 ` [edk2-platform][PATCH v1 1/4] Platform/RaspberryPi/RPi3: Fix TFTP dynamic command initialization Samer El-Haj-Mahmoud
2020-04-19 13:04 ` [edk2-platform][PATCH v1 2/4] Platform/RaspberryPi/RPi4: " Samer El-Haj-Mahmoud
2020-04-19 13:04 ` [edk2-platform][PATCH v1 3/4] Platform/RaspberryPi/RPi3: Enable TFTP command by default Samer El-Haj-Mahmoud
2020-04-19 13:04 ` [edk2-platform][PATCH v1 4/4] Platform/RaspberryPi/RPi4: " Samer El-Haj-Mahmoud
2020-04-19 13:33 ` [edk2-platform][PATCH v1 0/4] Platform/RaspberryPi : Enable TFTP shell command Ard Biesheuvel
2020-04-19 14:00 ` [edk2-devel] " Samer El-Haj-Mahmoud
2020-04-19 14:04 ` Ard Biesheuvel
2020-04-19 14:19 ` Pete Batard
2020-04-19 19:56 ` Andrei Warkentin
2020-04-19 20:06 ` [edk2-devel] " Pete Batard
2020-04-19 20:21 ` Andrei Warkentin [this message]
2020-04-19 20:24 ` Pete Batard
2020-04-19 20:42 ` Andrei Warkentin
[not found] ` <160753416257B0CA.29096@groups.io>
2020-04-19 23:50 ` Andrei Warkentin
2020-04-20 1:03 ` Andrew Fish
2020-04-20 2:41 ` Andrei Warkentin
2020-04-20 6:45 ` Ard Biesheuvel
2020-04-20 11:55 ` Pete Batard
2020-04-20 12:43 ` Ard Biesheuvel
2020-04-20 14:18 ` Pete Batard
2020-04-20 11:23 ` Leif Lindholm
2020-04-20 13:17 ` [edk2-devel] " Samer El-Haj-Mahmoud
2020-04-20 13:24 ` Ard Biesheuvel
2020-04-20 13:30 ` [edk2-devel] " Samer El-Haj-Mahmoud
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-list from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=BN6PR05MB34115242714AE5DA866E6421B9D70@BN6PR05MB3411.namprd05.prod.outlook.com \
--to=devel@edk2.groups.io \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox