From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mga04.intel.com (mga04.intel.com [192.55.52.120]) by mx.groups.io with SMTP id smtpd.web10.5983.1686728728702248820 for ; Wed, 14 Jun 2023 00:45:29 -0700 Authentication-Results: mx.groups.io; dkim=fail reason="unable to parse pub key" header.i=@intel.com header.s=intel header.b=fFU5AuU6; spf=pass (domain: intel.com, ip: 192.55.52.120, mailfrom: jiewen.yao@intel.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1686728728; x=1718264728; h=from:to:subject:date:message-id:references:in-reply-to: mime-version; bh=hyzphrdUX4A3Q+GkoWUu181+BeMz54QpVzUXNBXsMRY=; b=fFU5AuU6TCj/I4ytQTTNkXk9tmbOEbKuYY9qid4aeOuyTajFRb4Z450K QqPINGHmXRQp86fKsB/ckc1kNhjC4vZw0mn8hlZfdNiborEXW7tJfgpAP OgsNSzMO7mj6SvvpAzuNWc62h1SuE72sHxo/mCdmxpB06Rs1hZLx5aFKd RLaLmxV5+Hw3m1GXUoB3BNqmPg9MIXGyHeuLJbaMrf0U2bI3n8C0HBXGZ pjQtGemGj1P0YMWbNWVPjV71GNUVqKTSX+4Ak0HFW3Mfupmbmh4GIp47P gaz5e1VK1W2TlOrqRULNmqiwZOn6c1h5BhFPYfsTbKIKAVKOATMPsF54d w==; X-IronPort-AV: E=McAfee;i="6600,9927,10740"; a="357425216" X-IronPort-AV: E=Sophos;i="6.00,242,1681196400"; d="scan'208,217";a="357425216" Received: from fmsmga003.fm.intel.com ([10.253.24.29]) by fmsmga104.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 14 Jun 2023 00:45:12 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10740"; a="801816756" X-IronPort-AV: E=Sophos;i="6.00,242,1681196400"; d="scan'208,217";a="801816756" Received: from orsmsx603.amr.corp.intel.com ([10.22.229.16]) by FMSMGA003.fm.intel.com with ESMTP; 14 Jun 2023 00:45:11 -0700 Received: from orsmsx601.amr.corp.intel.com (10.22.229.14) by ORSMSX603.amr.corp.intel.com (10.22.229.16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.23; Wed, 14 Jun 2023 00:45:10 -0700 Received: from ORSEDG601.ED.cps.intel.com (10.7.248.6) by orsmsx601.amr.corp.intel.com (10.22.229.14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.23 via Frontend Transport; Wed, 14 Jun 2023 00:45:10 -0700 Received: from NAM10-MW2-obe.outbound.protection.outlook.com (104.47.55.103) by edgegateway.intel.com (134.134.137.102) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2507.23; Wed, 14 Jun 2023 00:45:10 -0700 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=WXg0tNInsZ6CYmH6ZfxQPBIgEUCQ9DK8C5ggVN4376O+RX+oAbCFqgsKJwIHFGbmaEDyxGhaZ8WRcAWiSMOUEBONDw9oDAyH6tdB6yQIQENjSZ8nzVD8GMKss3COBvF7nf7dXA7rauFPykTtEss0gf5/w6WdflhEOY/kP+952zHnwQEOHahOzpCBmZY30mhz95Mt0VneNvCFjdQs/SZAg5lyO+xBvXY3gejy9EOSRxaP75u0fWf9upRsUftFRhIU7PIDbTKwXkznwxLXQfyLY59LCwiVeash7zXluyHTk1tyIBWohTlw2TXGTwym6V4w6VXGe0sap2A89H91Hs6mZw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=VX1H53ZJzgv40da8cxUmZoZhcdCzP9kQZJyDdDWfVzY=; b=NbkVM3d713CC9aSk4Np+D7Y9DtxGyFZP0qGt7GwX0VHYq+TT/iryWiqIdXaretpEu+nDdlWY8YKKlmFFBixnbUnV8ZLeDoVxbipAPq03vLwOjNbZlRAz/L1go33t3W7C8C/inbKvYBMYVa1eNGC3DFP5ODf8O2jW7opNS2xA/cXP3bL4i14W/K8A3S9FQYkSD1x1GnxSeinZna9YnLNjZminF0TDRqdhhHHvfYO6YaYYh5ZDOhz3wGLErKysTVfk6nxQjcgsgOoX+Gx/osPuWBLcZbBTxoz4+yECkUZKYm5lHKZt85VwNGe1A6F2zKZL1sMSGEEsqxYHhwEVucDjxA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com; dkim=pass header.d=intel.com; arc=none Received: from MW4PR11MB5872.namprd11.prod.outlook.com (2603:10b6:303:169::14) by MW5PR11MB5906.namprd11.prod.outlook.com (2603:10b6:303:1a0::21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6455.44; Wed, 14 Jun 2023 07:45:08 +0000 Received: from MW4PR11MB5872.namprd11.prod.outlook.com ([fe80::3caa:6866:1037:5388]) by MW4PR11MB5872.namprd11.prod.outlook.com ([fe80::3caa:6866:1037:5388%7]) with mapi id 15.20.6477.028; Wed, 14 Jun 2023 07:45:08 +0000 From: "Yao, Jiewen" To: "Li, Yi1" , "devel@edk2.groups.io" , Ard Biesheuvel , "Justen, Jordan L" , Gerd Hoffmann Subject: Re: [edk2-devel] Question about limit size of OvmfPkg NOOPT build Thread-Topic: [edk2-devel] Question about limit size of OvmfPkg NOOPT build Thread-Index: Admc+WpJwmFQu90sRoi6yeB+pAh3SQBmqaCQ Date: Wed, 14 Jun 2023 07:45:08 +0000 Message-ID: References: In-Reply-To: Accept-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=intel.com; x-ms-publictraffictype: Email x-ms-traffictypediagnostic: MW4PR11MB5872:EE_|MW5PR11MB5906:EE_ x-ms-office365-filtering-correlation-id: c2f8f8c9-63c2-4eec-c6c5-08db6cab468d x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:MW4PR11MB5872.namprd11.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230028)(366004)(346002)(39860400002)(136003)(396003)(376002)(451199021)(8936002)(8676002)(52536014)(5660300002)(76116006)(64756008)(66946007)(66446008)(66476007)(66556008)(316002)(110136005)(2906002)(19627235002)(41300700001)(966005)(71200400001)(478600001)(7696005)(55016003)(122000001)(9686003)(6506007)(83380400001)(186003)(33656002)(53546011)(26005)(82960400001)(86362001)(38100700002)(166002)(38070700005);DIR:OUT;SFP:1102; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?yy7eQTThJFOrFrIgTkGl4uMGO7s0S2PXWmacnmyp3xYtaedEv46Gwj3biohg?= =?us-ascii?Q?veYHx+ftgodXXZoxN2vngpn/LvOsyR6pr7/3KU+stx6cHI3sOCk+3AszUPP+?= =?us-ascii?Q?lCEB6ptqYlG53Euwd7PZp5xnfdmL4N7hUfeU8l0Svt/jVH2/SyEU9DAjFa3v?= =?us-ascii?Q?Nc5VCfwk2qphCf39EBypPwFzqrRm2AFatIkopiCPrpdVCxJuDtv8nv4n9GVy?= =?us-ascii?Q?od0WAW+Rto8G5drCAX+7HNWHAuHrJL0bG2H1MtvGNVc3LYyR0qC7m0b2Nmmh?= =?us-ascii?Q?HjZIX7PzT9FgDGIPqtS5+5onwuUBe37szG4sBGnTJVEOAoM8ixdOp3E3pGDE?= =?us-ascii?Q?rFERWyeBqaoe0RJ8bw58G6Bubl1OXCK10EX3VDTA9Qcy+MRKDxfd9KF3YTNV?= =?us-ascii?Q?MYDDsDc4CbGpjXBrub1LJWHCR/C2rSzGmQVL5SCxvUeHCigw19SaEwxbccs9?= =?us-ascii?Q?Dv28z4t5JZJ25kx4WIVwjLXfUfxBIgBpfLaFgB+kFkorp+V7v9Ja88twf3q1?= =?us-ascii?Q?IZFsONJ7V26tXZypuslcS6jxGR/JgvkMaBgCBc7L26vFB/1h+D58L/qD+Rjh?= =?us-ascii?Q?ZyZC6+KevnEGsSQGDqx4PgQahP+qS9vQCOJkO76i9qyttZtBno9mEvkI2RGR?= =?us-ascii?Q?M3ougJOpucVM3+i7H8XqLe/6zfzkwl9EWJAF8oEdH2lFV37BcIo5CnA5sKrZ?= =?us-ascii?Q?eNDwT7b4XArfPYVx803Q/UVpCz4pERfCbZNX15ZlbyGfe5mLtv/UJTzK2j/k?= =?us-ascii?Q?UNWHRk8zFa10stafpxcX+E7WooDD2kKZ6eZ+WNwVQmYVNd0xPcJQLpUMGmC7?= =?us-ascii?Q?cqvI0erEZlU41Z4gd/F1XRm8ZzcMYppJVG42vYjSvoo/UFE9Zc7Y3Q2UcVIf?= =?us-ascii?Q?Lnx7DNyGyuf/0JIIyOQUsdOCJ25XTvIrxMIFJho8ZdH3akYeI0qTrMb15NbS?= =?us-ascii?Q?mZeGDlDZ/4rtas5jISv3YcC0E+3WS4iT+2xTgatC122ZVjfOuNQYOt/Crw52?= =?us-ascii?Q?PmN9PmALESsm5ikMCMcA933j/cMPhBesOtsdONkBnJBx8la7R5MdA627ONrG?= =?us-ascii?Q?gGQ/G3GlYgb0GdMmtQwIiDZ2pR9Dgh1Uo0Buem9/9aBS75PJrpjmTlB3KXGI?= =?us-ascii?Q?QtDnX4kw0OBmurD5ImQn1NGA0UTw0oBrC3awCMaNiC37+OgFqbY0qjBMsnMB?= =?us-ascii?Q?lSCpOzmapWHH900rXOeOpcMgif69R0PwHpTpf2W3wJCjdg6Ia7BW11k/eVhU?= =?us-ascii?Q?SPv7fDK0JDO7xJBOENJFDDgOK1TKsx1zxChJ3Aua4quTi8y8hZr2I9okRSWR?= =?us-ascii?Q?DYLiA6KjrvSSKQVpYCk4d2IR1YPyV+B4l6emeBLxjHj0eLRd3KEiGyr7Ad2t?= =?us-ascii?Q?j584vUs2u2m9sZKAYUu5zHZXGFkwVllTb/Q3nPD0bBC7cT+lyKb3zY0xW38a?= =?us-ascii?Q?peiC/QCgFFICyncIDm4VCj+rW4ZyCPxnms2eRUHBEiw4M0JZrmWdpOOXSc9e?= =?us-ascii?Q?fT5mZSsw0Mm4FE8j7Cph37kSdUV3qJbEYrpivupux+JkQ6N08+3ok7WlYpoO?= =?us-ascii?Q?lARLa19siRuGelj/dj10m+YJXEijhLEhMPhpNI59?= MIME-Version: 1.0 X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: MW4PR11MB5872.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: c2f8f8c9-63c2-4eec-c6c5-08db6cab468d X-MS-Exchange-CrossTenant-originalarrivaltime: 14 Jun 2023 07:45:08.1738 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: AWr1u/lSFqHc0a2VncgaQldJkqH2UIzUZTWyHjyREGUq3bo6XkTdpgcrhMq+U/dBpLWrxv/eITQ4LoWqVLWH2g== X-MS-Exchange-Transport-CrossTenantHeadersStamped: MW5PR11MB5906 Return-Path: jiewen.yao@intel.com X-OriginatorOrg: intel.com Content-Language: en-US Content-Type: multipart/alternative; boundary="_000_MW4PR11MB58726C4F1E8B803E7E579BFD8C5AAMW4PR11MB5872namp_" --_000_MW4PR11MB58726C4F1E8B803E7E579BFD8C5AAMW4PR11MB5872namp_ Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable I think it is reasonable, due to big size issue in NOOPT. Thank you Yao, Jiewen From: Li, Yi1 Sent: Monday, June 12, 2023 2:53 PM To: devel@edk2.groups.io; Ard Biesheuvel ; Yao, = Jiewen ; Justen, Jordan L = ; Gerd Hoffmann Subject: [edk2-devel] Question about limit size of OvmfPkg NOOPT build Hello all, I am working on OPENSSL30 upgrade of CryptoPkg. The upgrade of the OPENSSL submodule will increase the size of binaries and= break the CI build check: PlatformCI_OvmfPkg_Ubuntu_GCC5_PR (Platform_CI O= VMF_IA32X64_FULL_NOOPT): https://github.com/tianocore/edk2/pull/4391/ The size change is hard to avoid, can we skip this build of GCC just like w= e did for VS2019? https://github.com/tianocore/edk2/blob/8314a85893f5b75baa0031a5138028188a62= 6243/OvmfPkg/PlatformCI/.azurepipelines/Windows-VS2019.yml#L112-L123 OvmfPkg/PlatformCI/.azurepipelines/Windows-VS2019.yml#L112-L123: # This currently creates a very large image which is too big for the FD= F declared range # Ovmf maintainers suggest to skip this build for now. # # OVMF_IA32X64_FULL_NOOPT: # Build.File: "$(package)/PlatformCI/PlatformBuild.py" # Build.Arch: "IA32,X64" # Build.Flags: "BLD_*_SECURE_BOOT_ENABLE=3D1 BLD_*_SMM_REQUIRE= =3D1 BLD_*_TPM2_ENABLE=3D1 BLD_*_NETWORK_TLS_ENABLE=3D1 BLD_*_NETWORK_IP6_= ENABLE=3D1 BLD_*_NETWORK_HTTP_BOOT_ENABLE=3D1" # Build.Target: "NOOPT" # Run.Flags: $(run_flags) # Run: $(should_run) Regards, Yi --_000_MW4PR11MB58726C4F1E8B803E7E579BFD8C5AAMW4PR11MB5872namp_ Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

I think it is reasonable, due to big size issue in N= OOPT.

 

Thank you

Yao, Jiewen

 

From: Li, Yi1 <yi1.li@intel.com>
Sent: Monday, June 12, 2023 2:53 PM
To: devel@edk2.groups.io; Ard Biesheuvel <ardb+tianocore@kernel.o= rg>; Yao, Jiewen <jiewen.yao@intel.com>; Justen, Jordan L <jord= an.l.justen@intel.com>; Gerd Hoffmann <kraxel@redhat.com>
Subject: [edk2-devel] Question about limit size of OvmfPkg NOOPT bui= ld

 

Hello all,

 

I am working on OPENSSL30 upgrade of CryptoPkg.=

The upgrade of the OPENSSL submodule will increase t= he size of binaries and break the CI build check: PlatformCI_OvmfPkg_Ubuntu= _GCC5_PR (Platform_CI OVMF_IA32X64_FULL_NOOPT):

https://github.c= om/tianocore/edk2/pull/4391/

 

The size change is hard to avoid, can we skip this b= uild of GCC just like we did for VS2019?

https://github.com/tianocore/edk2/blob/8314a85= 893f5b75baa0031a5138028188a626243/OvmfPkg/PlatformCI/.azurepipelines/Window= s-VS2019.yml#L112-L123

OvmfPkg/PlatformCI/.azurepipelines/Windows-VS2019.ym= l#L112-L123:

    # This currently creates a very l= arge image which is too big for the FDF declared range

    #   Ovmf maintainers su= ggest to skip this build for now.

    #

    #     &n= bsp; OVMF_IA32X64_FULL_NOOPT:

    #     &n= bsp;   Build.File: "$(package)/PlatformCI/PlatformBuild.py&q= uot;

    #     &n= bsp;   Build.Arch: "IA32,X64"

    #     &n= bsp;   Build.Flags: "BLD_*_SECURE_BOOT_ENABLE=3D1 BLD_*_SMM_= REQUIRE=3D1  BLD_*_TPM2_ENABLE=3D1 BLD_*_NETWORK_TLS_ENABLE=3D1 BLD_*_= NETWORK_IP6_ENABLE=3D1 BLD_*_NETWORK_HTTP_BOOT_ENABLE=3D1"<= /p>

    #     &n= bsp;   Build.Target: "NOOPT"

    #     &n= bsp;   Run.Flags: $(run_flags)

    #     &n= bsp;   Run: $(should_run)

 

Regards,

Yi

 

 

--_000_MW4PR11MB58726C4F1E8B803E7E579BFD8C5AAMW4PR11MB5872namp_--