On Wed, 23 Jan 2019 at 10:55, Laszlo Er

> > That's going to be a hard thing to keep from happening over time, as
> > this is valid C :(sek <ler...@redhat.com> wrote:
>
> Hi All,
>
> On 01/23/19 04:43, Ni, Ray wrote:
> >> -----Original Message-----
> >> From: David Woodhouse <dw...@infradead.org>
> >> Sent: Wednesday, January 23, 2019 12:23 AM
> >> To: Ni, Ray <ray...@intel.com>; Gerd Hoffmann <kra...@redhat.com>;
> >> Laszlo Ersek <ler...@redhat.com>; Richardson, Brian
> >> <brian.richard...@intel.com>
> >> Cc: Justen, Jordan L <jordan.l.jus...@intel.com>; edk2-devel@lists.01.org;
> >> Kevin O'Connor <ke...@koconnor.net>; Anthony Perard
> >> <anthony.per...@citrix.com>
> >> Subject: Re: Drop CSM support in OvmfPkg?
> >>
> >> On Tue, 2019-01-22 at 16:13 +0000, Ni, Ray wrote:
> >>> David,
> >>> I'd like to re-start the discussion.
> >>> Could you please kindly explain the background/reason of adding CSM
> >>> support in OVMF?
> >>> Maybe knowing the reason can help to make further decisions of
> >>> whether to
> >>> A. keep it outside OvmfPkg
> >>> B. keep it inside OvmfPkg
> >>> C. maybe have a chance to just remove the CSM support after
> >>> revisiting
> >>
> >>
> >> The idea was to make it simple to have a single firmware image for
> >> virtual machines which would support both UEFI and Legacy boot for
> >> guests simultaneously.
> >>
> >> In libvirt there has been an alternative approach, where the BIOS image
> >> is switched between OVMF and SeaBIOS according to the configuration of
> >> the guest VM.
> >>
> >> That's fine for libvirt, but in situations where VM hosting is provided
> >> as a service, it becomes quite painful to manage the 'UEFI' vs.
> >> 'Legacy' flags on guest images and then switch firmware images
> >> accordingly. A one-size-fits-all BIOS using OVMF+CSM is very much
> >> preferable.
> >
> > David,
> > Thanks for sharing. I now understand that you do have a need of
> > CSM + UEFI OVMF image.
> > A very straightforward idea is to move all COM components you needed
> > into OvmfPkg. But Laszlo as the OvmfPkg owner may disagree with this.
> > So maybe you could set up another (github) repo and clone all the CSM 
> > components
> > there.
> > EDKII build tool supports to build firmware from multiple repos.
> > That's how we can have edk2-platforms and to-be-created edk2-app.
> > In practical, you could create a new csm repo.
> > Laszlo/Gerd who don't care about CSM can just build OVMF image from edk2 
> > repo.
> > You can build the OVMF image from edk2 and csm repo.
> >
> > We can have a call if you are ok. I can explain how that can work in 
> > details.
>
> I'm fine if we move the generic CSM components into OvmfPkg, however I'm
> going to ask David to assume reviewer responsibilities for them.
>
> Given the current format of "Maintainers.txt", we couldn't spell out the
> exact pathnames of the CSM components, so we'd add a line like
>
> R: David Woodhouse <dw...@infradead.org>
>
> under OvmfPkg. There is "prior art" for this pattern, see:
>
> R: Anthony Perard <anthony.per...@citrix.com>
> R: Julien Grall <julien.gr...@linaro.org>
>
> Because Anthony and Julien are the authority on Xen-related code under
> OvmfPkg. (See commit 337fe6a06eda, "Maintainers.txt: add Xen reviewers
> to OvmfPkg", 2017-09-26.)
>
>
> If we keep CSM support in OvmfPkg in any form at all, then I would
> prefer holding all the related stuff in the core edk2 repository (with
> the above Reviewership), over requiring people to deal with multiple
> repositories. I agree (from experience) that PACKAGES_PATH / multiple
> workspaces work fine, but in this case I think keeping one shared
> history is an advantage.
>

I don't have an opinion on whether we should keep CSM or not in
OvmfPkg. But if we do, I agree we should just move all the pieces we
rely on and that are getting dropped into OvmfPkg/ proper, rather than
keeping them on the side somewhere.
_______________________________________________
edk2-devel mailing list
edk2-devel@lists.01.org
https://lists.01.org/mailman/listinfo/edk2-devel

Reply via email to