From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mga02.intel.com (mga02.intel.com [134.134.136.20]) by mx.groups.io with SMTP id smtpd.web11.7639.1687259507565650767 for ; Tue, 20 Jun 2023 04:11:47 -0700 Authentication-Results: mx.groups.io; dkim=fail reason="unable to parse pub key" header.i=@intel.com header.s=intel header.b=aeL5QTTI; spf=pass (domain: intel.com, ip: 134.134.136.20, mailfrom: yi1.li@intel.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1687259507; x=1718795507; h=from:to:cc:subject:date:message-id:mime-version: content-transfer-encoding; bh=Xu1xpQ8Gw+PDDQg46GxAadrKkVLBBOOhExQnDTXsnYY=; b=aeL5QTTIdd5E2ubqZgK2FsShlGV1BiZzM9p3KPGDvkoB0tkGEVozJbcJ alLZ7lixDBRr/XrKP1frGqbVLl2kWtvn33kdVddLqr31MlwNlpZqiKQSm 1/ccsbyPRlGHZ+w3WhHZ6Jrw/LDUayxnVjpWpnuneV4LFoXXi3yfAzea7 t+4jSKU92eKPSv0nk8tsSA1lCZloRCs5XI7vHn7zurSDw4GiwS+txGdXV xAQMlOMF/Us4u+Uf805c6UpCMfRAzNWbzPmSC/fuoM67W2T2rO5MIKafz TxVDrlHolqh958qn1DPW5L7j5VkGvlTJAFcfFmET5WSaO5AKQj18wcbkp w==; X-IronPort-AV: E=McAfee;i="6600,9927,10746"; a="349562224" X-IronPort-AV: E=Sophos;i="6.00,256,1681196400"; d="scan'208";a="349562224" Received: from orsmga002.jf.intel.com ([10.7.209.21]) by orsmga101.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 20 Jun 2023 04:11:46 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10746"; a="714012628" X-IronPort-AV: E=Sophos;i="6.00,256,1681196400"; d="scan'208";a="714012628" Received: from liyi4-desktop.ccr.corp.intel.com ([10.239.153.10]) by orsmga002-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 20 Jun 2023 04:11:45 -0700 From: "Li, Yi" To: devel@edk2.groups.io Cc: Yi Li , Ard Biesheuvel , Jiewen Yao , Jordan Justen , Gerd Hoffmann Subject: [PATCH] OvmfPkg/PlatformCI: Skip GCC5_OVMF_IA32X64_FULL_NOOPT build Date: Tue, 20 Jun 2023 19:11:39 +0800 Message-Id: <20230620111139.21365-1-yi1.li@intel.com> X-Mailer: git-send-email 2.31.1.windows.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit The effect of LTO is limited with optimization turned off, and blocked the upgrade of Openssl3.0. We already skipped this build with VS2019, skip the GCC NOOPT build also. Signed-off-by: Yi Li Cc: Ard Biesheuvel Cc: Jiewen Yao Cc: Jordan Justen Cc: Gerd Hoffmann --- .../PlatformCI/.azurepipelines/Ubuntu-GCC5.yml | 17 ++++++++++------- 1 file changed, 10 insertions(+), 7 deletions(-) diff --git a/OvmfPkg/PlatformCI/.azurepipelines/Ubuntu-GCC5.yml b/OvmfPkg/PlatformCI/.azurepipelines/Ubuntu-GCC5.yml index ad43f9fad2..5809152d26 100644 --- a/OvmfPkg/PlatformCI/.azurepipelines/Ubuntu-GCC5.yml +++ b/OvmfPkg/PlatformCI/.azurepipelines/Ubuntu-GCC5.yml @@ -109,13 +109,16 @@ jobs: Build.Target: "RELEASE" Run.Flags: $(run_flags) Run: $(should_run) - OVMF_IA32X64_FULL_NOOPT: - Build.File: "$(package)/PlatformCI/PlatformBuild.py" - Build.Arch: "IA32,X64" - Build.Flags: "BLD_*_SECURE_BOOT_ENABLE=1 BLD_*_SMM_REQUIRE=1 BLD_*_TPM2_ENABLE=1 BLD_*_NETWORK_TLS_ENABLE=1 BLD_*_NETWORK_IP6_ENABLE=1 BLD_*_NETWORK_HTTP_BOOT_ENABLE=1" - Build.Target: "NOOPT" - Run.Flags: $(run_flags) - Run: $(should_run) + # This currently creates a very large image which is too big for the FDF declared range, + # skip this build for now. + # + # OVMF_IA32X64_FULL_NOOPT: + # Build.File: "$(package)/PlatformCI/PlatformBuild.py" + # Build.Arch: "IA32,X64" + # Build.Flags: "BLD_*_SECURE_BOOT_ENABLE=1 BLD_*_SMM_REQUIRE=1 BLD_*_TPM2_ENABLE=1 BLD_*_NETWORK_TLS_ENABLE=1 BLD_*_NETWORK_IP6_ENABLE=1 BLD_*_NETWORK_HTTP_BOOT_ENABLE=1" + # Build.Target: "NOOPT" + # Run.Flags: $(run_flags) + # Run: $(should_run) AMDSEV_X64_DEBUG: Build.File: "$(package)/PlatformCI/AmdSevBuild.py" -- 2.31.1.windows.1