From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail.zytor.com (terminus.zytor.com [65.50.211.136]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ml01.01.org (Postfix) with ESMTPS id EDDBF21E49BCA for ; Tue, 22 Aug 2017 10:56:17 -0700 (PDT) Received: from [10.26.0.110] (corporativo.static.gvt.net.br [177.135.97.54] (may be forged)) (authenticated bits=0) by mail.zytor.com (8.15.2/8.15.2) with ESMTPSA id v7MHuUrv017818 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NO); Tue, 22 Aug 2017 10:56:32 -0700 To: Andrew Fish Cc: "Ni, Ruiyu" , "edk2-devel@lists.01.org" , "Dong, Eric" , "Wu, Hao A" , Jordan Justen , "Gao, Liming" , Mike Kinney , Laszlo Ersek , "Zeng, Star" References: <20170820181557.28761-1-pcacjr@zytor.com> <734D49CCEBEEF84792F5B80ED585239D5B9F3CD8@SHSMSX104.ccr.corp.intel.com> From: Paulo Alcantara Message-ID: Date: Tue, 22 Aug 2017 14:56:25 -0300 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:52.0) Gecko/20100101 Thunderbird/52.3.0 MIME-Version: 1.0 In-Reply-To: Subject: Re: [PATCH v2 0/6] read-only UDF file system support X-BeenThere: edk2-devel@lists.01.org X-Mailman-Version: 2.1.22 Precedence: list List-Id: EDK II Development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 22 Aug 2017 17:56:18 -0000 Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Hi, On 8/22/2017 2:21 PM, Andrew Fish wrote: > >> On Aug 22, 2017, at 6:14 AM, Paulo Alcantara wrote: >> >> Hi, >> >> I do apologize my late replies. At the moment, I'm only able to work on this during my free time. Thank you all for the reviews! >> >> FWIW, my comments below. >> >> On 8/20/2017 11:29 PM, Ni, Ruiyu wrote: >>> Paulo, >>> 1. Could you please run the ECC check tool (BaseTools\Source\Python\Ecc\) >>> "CRC" might need to be replaced with "Crc". >>> I also noticed some TAB key in file content. >> >> Sure. >> >>> 2. Your current implementation uses HARD_DRIVE_DEVICE_PATH. >>> But with: >>> SignatureType = SIGNATURE_TYPE_UDF >>> MBRType = MBR_TYPE_PCAT >>> Signature = * >>> And later UdfDxe driver checks the SignatureType and MBRType. >>> I am not sure if it would be better to put the definitions in UEFI Spec, >>> since they are referenced by different modules. >>> I also noticed you use PARTITION_TYPE_OTHER for PartitionInfo. >>> When proposing to UEFI Spec, this also needs to be considered, >>> for example, add PARTITION_TYPE_UDF to spec. >> >> Yes - I agree with you. My only concern is that UEFI specification doesn't either support UDF or there is any interest in supporting it, so by proposing an additional type for something that shouldn't be supported, might not work out. >> >> (Andrew, any thoughts?) >> > > The enum space is owned by the UEFI spec and should never be extended outside the scope of the spec. Its not good to have an implementation running around that is not in a released spec, as it it is a future compatibility risk. > > Does the UDF actually start with a real MBR? If so is it possible to define a 32-bit MBR signature to indicate UDF. If not it should probably be a device path node like CD-ROM. No. But it's possible to create an UDF file system inside a MBR/GPT partition so it would end up having a valid HARDDRIVE_DEVICE_PATH and no fake MBR device path wouldn't be created or needed at all. The only problem is that when we find an UDF file system which isn't part of either a MBR or a GPT partition table, and then there is no matching device path for using with it. > You can all ways use the Vendor-Defined Media Device Path since it has GUID there is no risk of collision. Right. If you guys agree, I'll start using the vendor-defined device path again for all the cases where an UDF file system is found -- avoiding to break anything that's unrelated. Thanks Andrew! Paulo