From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from NAM12-BN8-obe.outbound.protection.outlook.com (NAM12-BN8-obe.outbound.protection.outlook.com [40.107.237.84]) by mx.groups.io with SMTP id smtpd.web10.5886.1587327709356731535 for ; Sun, 19 Apr 2020 13:21:49 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@vmware.com header.s=selector2 header.b=b8RvVGfL; spf=pass (domain: vmware.com, ip: 40.107.237.84, mailfrom: awarkentin@vmware.com) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=ip0TrcJ09FktAnMotQZxOmr4CcPH/P/nrP8MlKplOUxAYBuONbWSRrC48YUu+jeBxyr5z70fFk0GVdnU4W+C3J/ITIi3VbL6qbzPi/IC3I1czSfYzMSZwgWySh1ExGgKEGAsozqG8YFjNGQSUHhTeFc9SJF0y1/Vb4r7GxBtncc99PNyWMrIN/zD6MXuOGRsuA6gwoNvqPTU7Zde+2oDZNUcssZ81pi+8b889yVsV6la9rjeThaEumBW5XGDXLGCgEsE/srQBDQnH8AfTCDx297qjNcECFAQ3D+RewNOt6HtN4vOAgcL+x+N+/BzQajYvGT0iZbDGzGZ3hK2Ck/HAA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=3SFHRz+tho4eJJCko+jy1htWxkI341S3Mi4PIjdAri0=; b=hT14GCQIeZ3ze8A2VngnKcmcosGv0FYp2h1ykmLehdBBgfjNmSHz3TKmahPMsKgQb0GUb2xpCeCbxHpCCyfD4xkkaSykRe7OUl3iNn+I0BZsctXWRcEoT8Zz542245SGFciiL77I/q094z2La9VSxRHJjosPAGJYg38/NGKz+k2kz4Yk01MmQ2fsoAn7oqO2QOkLISkO155iOUYrL42UaJHJgaR4gds720mQjTEKdcRFq+/PA/o7HUQKShB+tO9DS/OvycarRwxriDtyjpelfP/Mwp+V61HP+HJxatXPxGrrHIiM//BK/JYwgGz4IVmYqRBNGH0LEnIzeDajcIF7lg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=vmware.com; dmarc=pass action=none header.from=vmware.com; dkim=pass header.d=vmware.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=vmware.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=3SFHRz+tho4eJJCko+jy1htWxkI341S3Mi4PIjdAri0=; b=b8RvVGfLqOliMCVRBA70VnWo33DukSjsOvoCgfsBIHYM1AkMVuNOFMbtn/WdTnpfdJUul90IG9jwGiyV/8RjyAng+TaHzC9PJSQCbLfAlVvO5tQkI5DmOAVCIk/aIlfLC/QziwEM1jk3t+7bW80i867S6T+jkp+3X70HoQimZCg= Received: from BN6PR05MB3411.namprd05.prod.outlook.com (2603:10b6:405:43::23) by BN6PR05MB3411.namprd05.prod.outlook.com (2603:10b6:405:43::23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2921.20; Sun, 19 Apr 2020 20:21:47 +0000 Received: from BN6PR05MB3411.namprd05.prod.outlook.com ([fe80::5df3:40e3:521a:7f84]) by BN6PR05MB3411.namprd05.prod.outlook.com ([fe80::5df3:40e3:521a:7f84%5]) with mapi id 15.20.2921.027; Sun, 19 Apr 2020 20:21:47 +0000 From: "Andrei Warkentin" To: "devel@edk2.groups.io" , Ard Biesheuvel , Samer El-Haj-Mahmoud , "pete@akeo.ie" CC: Leif Lindholm Subject: Re: [edk2-devel] [edk2-platform][PATCH v1 0/4] Platform/RaspberryPi : Enable TFTP shell command Thread-Topic: [edk2-devel] [edk2-platform][PATCH v1 0/4] Platform/RaspberryPi : Enable TFTP shell command Thread-Index: AQHWFksLVB8KW5eI1E6krRdTNHmDgaiAcbcAgAAM2gCAAFvq3oAABP0AgAAEA+o= Date: Sun, 19 Apr 2020 20:21:47 +0000 Message-ID: References: <20200419130417.3298-1-samer@elhajmahmoud.com> <8d59e616-9910-4935-2e1f-5da75fc1d34a@arm.com> <831705c6-0915-ba1a-adc0-3078b2af1a43@akeo.ie> ,<28ac6ff0-86eb-fde7-63f6-c1c7dc0f0724@akeo.ie> In-Reply-To: <28ac6ff0-86eb-fde7-63f6-c1c7dc0f0724@akeo.ie> Accept-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: spf=none (sender IP is ) smtp.mailfrom=awarkentin@vmware.com; x-originating-ip: [98.214.99.181] x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: 15f318b3-d844-468e-bd65-08d7e49f4904 x-ms-traffictypediagnostic: BN6PR05MB3411: x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:8273; x-forefront-prvs: 0378F1E47A x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BN6PR05MB3411.namprd05.prod.outlook.com;PTR:;CAT:NONE;SFTY:;SFS:(10009020)(4636009)(346002)(136003)(366004)(376002)(396003)(39860400002)(8676002)(55016002)(4326008)(19627405001)(52536014)(71200400001)(9686003)(5660300002)(33656002)(186003)(76116006)(8936002)(966005)(53546011)(6506007)(2906002)(66476007)(66556008)(64756008)(66446008)(478600001)(86362001)(316002)(66946007)(26005)(45080400002)(81156014)(110136005)(7696005);DIR:OUT;SFP:1101; received-spf: None (protection.outlook.com: vmware.com does not designate permitted sender hosts) x-ms-exchange-senderadcheck: 1 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 x-ms-exchange-antispam-messagedata: u2UpAYSdKVxp+HBZ61PuZ1vnpyPxfj8+nYX9gLNTmSQnM05APZC8fONrw2aLJTb5/HBFXG+/Qhni3Dm6+mXQ6kl9X5bkS+jf1lV/4TJh/HoWA+cSuBRE4PuoSzhMWkGWNbA9kZJ2yuZZ+RDJc69SUg== x-ms-exchange-transport-forked: True MIME-Version: 1.0 X-OriginatorOrg: vmware.com X-MS-Exchange-CrossTenant-Network-Message-Id: 15f318b3-d844-468e-bd65-08d7e49f4904 X-MS-Exchange-CrossTenant-originalarrivaltime: 19 Apr 2020 20:21:47.0925 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: b39138ca-3cee-4b4a-a4d6-cd83d9dd62f0 X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: ulUZmpOQnadFKyUqVPKpv4vScyOsLGqA5Tn+1iGzU2ZExY9FtMtww1J3/0FYjHUEjT5UYsOHYj/G2xmWnqi+oA== X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN6PR05MB3411 Content-Language: en-US Content-Type: multipart/alternative; boundary="_000_BN6PR05MB34115242714AE5DA866E6421B9D70BN6PR05MB3411namp_" --_000_BN6PR05MB34115242714AE5DA866E6421B9D70BN6PR05MB3411namp_ Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable So if I understood correctly: * If a random person off the street builds edk2 - they don't get TFTP = command out of the box * Our builds retain TFTP command Correct? ________________________________ From: devel@edk2.groups.io on behalf of Pete Batard= via groups.io Sent: Sunday, April 19, 2020 3:06 PM To: devel@edk2.groups.io ; Andrei Warkentin ; Ard Biesheuvel ; Samer El-Haj-Mahm= oud Cc: Leif Lindholm Subject: Re: [edk2-devel] [edk2-platform][PATCH v1 0/4] Platform/Raspberry= Pi : Enable TFTP shell command Andrei, In case this is your concern, please note that we are not removing TFTP support at all, which is enabled for the RELEASE builds we produce and will remain so (and which anyone can enable with the macro if they wish). All that will be changed by the updated proposal is that the current DEBUG ASSERT will be fixed and TFTP support will remain optional, like it is today. So, in this case, I don't think your concern is warranted, because we're not actually taking any step to deprive anyone of any functionality they might wish for, and, even with the revised patch, TFTP will remain enabled in our RELEASE binaries, exactly as it has been before. Regards, /Pete On 2020.04.19 20:56, Andrei Warkentin wrote: > Hi folks, > > If we have to choose abstract goodness over functionality, why wouldn't > we choose functionality? Functionality that's part of Tiano? The real > world doesn't care about the TFTP command being an "unsupported hack" or > not. So there's Tiano-specific code here. Big deal? To rephrase > differently, why would either Pi 4 developers or Pi 4 UEFI users pay the > cost of Tiano carrying code that somehow isn't "legit enough" to be enab= led? > > I mean here we are again, where what goes into the code is being > dictated by some abstract ideology instead of technical reasons? > > A > ------------------------------------------------------------------------ > *From:* Pete Batard > *Sent:* Sunday, April 19, 2020 9:19 AM > *To:* Ard Biesheuvel ; Samer El-Haj-Mahmoud > ; devel@edk2.groups.io > *Cc:* Leif Lindholm ; Andrei Warkentin > > *Subject:* Re: [edk2-platform][PATCH v1 0/4] Platform/RaspberryPi : > Enable TFTP shell command > On 2020.04.19 14:33, Ard Biesheuvel wrote: >> On 4/19/20 3:04 PM, Samer El-Haj-Mahmoud wrote: >>> Fix an ASSERT with the TFTP dynamic Shell command on the >>> RPi3 and RPi4 when running DEBUG builds. Also, enable the >>> command by default for all builds. >>> >> >> Fixing the ASSERT is fine but I am reluctant to enable this by default. > > I'm going to second this. > > To answer a question Samer was asking elsewhere, this is actually part > of the reason why TFTP is not enabled in the DEBUG builds we produce at > https://nam04.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fgith= ub.com%2Fpftf%2FRPi4&data=3D02%7C01%7Cawarkentin%40vmware.com%7C56cfed3= 40a494707ab0d08d7e49d2d64%7Cb39138ca3cee4b4aa4d6cd83d9dd62f0%7C0%7C0%7C6372= 29236035259614&sdata=3DEd8iabD5ARgBBYtsWgGw2Webu7dAW5Q9ju3qyqyVzX4%3D&a= mp;reserved=3D0 > (See build_firmware.sh), the reasoning > being that if someone encounters an issue with RELEASE and we ask them > to troubleshoot with the DEBUG artifact, we want to eliminate potential > troublemakers when they try that. > >> It is a non-standard hack that ARM contributed in the past, and is not >> covered by the EFI of Shell specifications. If RPi4 is intended to be a >> showcase for UEFI on ARM done right, we should not enable this at all. > > Here I have to point out that RPi4 becoming a showcase because we intend > to is not what we are pursuing (because if it was a matter of "willing" > a showcase into existence, we would have picked a platform with a lot > less quirks, more comprehensive documentation, and so on). > > Instead, we estimate that due to its price point and widespread > availability, it *is* going to become a de facto showcase, whether > everybody likes it or not. And that is the reason we want to treat is as > a showcase where possible. > > Regards, > > /Pete > --_000_BN6PR05MB34115242714AE5DA866E6421B9D70BN6PR05MB3411namp_ Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable
So if I understood correctly:
  • If a random person off the street builds edk2 - they don't get TFTP co= mmand out of the box
  • Our builds retain TFTP command
Correct?

From: devel@edk2.groups.io= <devel@edk2.groups.io> on behalf of Pete Batard via groups.io <pe= te=3Dakeo.ie@groups.io>
Sent: Sunday, April 19, 2020 3:06 PM
To: devel@edk2.groups.io <devel@edk2.groups.io>; Andrei Warke= ntin <awarkentin@vmware.com>; Ard Biesheuvel <ard.biesheuvel@arm.c= om>; Samer El-Haj-Mahmoud <samer@elhajmahmoud.com>
Cc: Leif Lindholm <leif@nuviainc.com>
Subject: Re: [edk2-devel] [edk2-platform][PATCH v1 0/4] Platform/Ra= spberryPi : Enable TFTP shell command
 
Andrei,

In case this is your concern, please note that we are not removing TFTP support at all, which is enabled for the RELEASE builds we produce and will remain so (and which anyone can enable with the macro if they wish).<= br>
All that will be changed by the updated proposal is that the current
DEBUG ASSERT will be fixed and TFTP support will remain optional, like it is today.

So, in this case, I don't think your concern is warranted, because we're <= br> not actually taking any step to deprive anyone of any functionality they <= br> might wish for, and, even with the revised patch, TFTP will remain
enabled in our RELEASE binaries, exactly as it has been before.

Regards,

/Pete

On 2020.04.19 20:56, Andrei Warkentin wrote:
> Hi folks,
>
> If we have to choose abstract goodness over functionality, why wouldn= 't
> we choose functionality? Functionality that's part of Tiano? The real=
> world doesn't care about the TFTP command being an "unsupported = hack" or
> not. So there's Tiano-specific code here. Big deal? To rephrase
> differently, why would either Pi 4 developers or Pi 4 UEFI users pay = the
> cost of Tiano carrying code that somehow isn't "legit enough&quo= t; to be enabled?
>
> I mean here we are again, where what goes into the code is being
> dictated by some abstract ideology instead of technical reasons?
>
> A
> ---------------------------------------------------------------------= ---
> *From:* Pete Batard <pete@akeo.ie>
> *Sent:* Sunday, April 19, 2020 9:19 AM
> *To:* Ard Biesheuvel <ard.biesheuvel@arm.com>; Samer El-Haj-Mah= moud
> <samer@elhajmahmoud.com>; devel@edk2.groups.io <devel@edk2.g= roups.io>
> *Cc:* Leif Lindholm <leif@nuviainc.com>; Andrei Warkentin
> <awarkentin@vmware.com>
> *Subject:* Re: [edk2-platform][PATCH v1 0/4] Platform/RaspberryPi : <= br> > Enable TFTP shell command
> On 2020.04.19 14:33, Ard Biesheuvel wrote:
>> On 4/19/20 3:04 PM, Samer El-Haj-Mahmoud wrote:
>>> Fix an ASSERT with the TFTP dynamic Shell command on the
>>> RPi3 and RPi4 when running DEBUG builds. Also, enable the
>>> command by default for all builds.
>>>
>>
>> Fixing the ASSERT is fine but I am reluctant to enable this by de= fault.
>
> I'm going to second this.
>
> To answer a question Samer was asking elsewhere, this is actually par= t
> of the reason why TFTP is not enabled in the DEBUG builds we produce = at
> https://nam04.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fgithub= .com%2Fpftf%2FRPi4&amp;data=3D02%7C01%7Cawarkentin%40vmware.com%7C56cfe= d340a494707ab0d08d7e49d2d64%7Cb39138ca3cee4b4aa4d6cd83d9dd62f0%7C0%7C0%7C63= 7229236035259614&amp;sdata=3DEd8iabD5ARgBBYtsWgGw2Webu7dAW5Q9ju3qyqyVzX= 4%3D&amp;reserved=3D0
> (See build_firmware.sh), the reasoning
> being that if someone encounters an issue with RELEASE and we ask the= m
> to troubleshoot with the DEBUG artifact, we want to eliminate potenti= al
> troublemakers when they try that.
>
>> It is a non-standard hack that ARM contributed in the past, and i= s not
>> covered by the EFI of Shell specifications. If RPi4 is intended t= o be a
>> showcase for UEFI on ARM done right, we should not enable this at= all.
>
> Here I have to point out that RPi4 becoming a showcase because we int= end
> to is not what we are pursuing (because if it was a matter of "w= illing"
> a showcase into existence, we would have picked a platform with a lot=
> less quirks, more comprehensive documentation, and so on).
>
> Instead, we estimate that due to its price point and widespread
> availability, it *is* going to become a de facto showcase, whether > everybody likes it or not. And that is the reason we want to treat is= as
> a showcase where possible.
>
> Regards,
>
> /Pete
>




--_000_BN6PR05MB34115242714AE5DA866E6421B9D70BN6PR05MB3411namp_--