From mboxrd@z Thu Jan  1 00:00:00 1970
Return-Path: <bounce+27952+108579+7686176+12367111@groups.io>
Received: from mail02.groups.io (mail02.groups.io [66.175.222.108])
	by spool.mail.gandi.net (Postfix) with ESMTPS id A68797803DB
	for <rebecca@openfw.io>; Wed, 13 Sep 2023 11:00:53 +0000 (UTC)
DKIM-Signature: a=rsa-sha256; bh=/Rw9VVQN1uN6FO0mT6Z40PKvOPy0VrmtQwGc80u+7EA=;
 c=relaxed/simple; d=groups.io;
 h=ARC-Seal:ARC-Message-Signature:ARC-Authentication-Results:From:To:CC:Subject:Thread-Topic:Thread-Index:Date:Message-ID:References:In-Reply-To:Accept-Language:MIME-Version:Precedence:List-Subscribe:List-Help:Sender:List-Id:Mailing-List:Delivered-To:Reply-To:List-Unsubscribe-Post:List-Unsubscribe:Content-Language:Content-Type:Content-Transfer-Encoding;
 s=20140610; t=1694602852; v=1;
 b=DJ1r/48Pu+9aRhDtckddjodFZmIB+Sespc6OsaCXRkwqcOUKS3VTvjr747NW1m1WEfwKiTU9
 yxBrm+msD5dNvmfR0uSpr2Brm3mM2X64VxPjtYNaGwENQkMco0xtG0wD8XHb0k87IeTUAmoHknY
 b2XTccxHhwwLDJVZFD+DCuy0=
X-Received: by 127.0.0.2 with SMTP id Yh8cYY7687511xbMgnClBmu9; Wed, 13 Sep 2023 04:00:52 -0700
X-Received: from mgamail.intel.com (mgamail.intel.com [192.55.52.136])
 by mx.groups.io with SMTP id smtpd.web11.8932.1694602851481308563
 for <devel@edk2.groups.io>;
 Wed, 13 Sep 2023 04:00:51 -0700
X-IronPort-AV: E=McAfee;i="6600,9927,10831"; a="358061671"
X-IronPort-AV: E=Sophos;i="6.02,143,1688454000"; 
   d="scan'208";a="358061671"
X-Received: from fmsmga001.fm.intel.com ([10.253.24.23])
  by fmsmga106.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 13 Sep 2023 04:00:50 -0700
X-ExtLoop1: 1
X-IronPort-AV: E=McAfee;i="6600,9927,10831"; a="887283732"
X-IronPort-AV: E=Sophos;i="6.02,143,1688454000"; 
   d="scan'208";a="887283732"
X-Received: from fmsmsx601.amr.corp.intel.com ([10.18.126.81])
  by fmsmga001.fm.intel.com with ESMTP/TLS/AES256-GCM-SHA384; 13 Sep 2023 04:00:21 -0700
X-Received: from fmsmsx612.amr.corp.intel.com (10.18.126.92) by
 fmsmsx601.amr.corp.intel.com (10.18.126.81) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2507.32; Wed, 13 Sep 2023 04:00:50 -0700
X-Received: from fmsmsx610.amr.corp.intel.com (10.18.126.90) by
 fmsmsx612.amr.corp.intel.com (10.18.126.92) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2507.32; Wed, 13 Sep 2023 04:00:49 -0700
X-Received: from FMSEDG603.ED.cps.intel.com (10.1.192.133) by
 fmsmsx610.amr.corp.intel.com (10.18.126.90) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2507.32 via Frontend Transport; Wed, 13 Sep 2023 04:00:49 -0700
X-Received: from NAM10-BN7-obe.outbound.protection.outlook.com (104.47.70.109)
 by edgegateway.intel.com (192.55.55.68) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.1.2507.32; Wed, 13 Sep 2023 04:00:49 -0700
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=SOz33Lk8aQReIdPuFM4PJ/LYUeigmH2uaz81WGnlP50mnZdElCGUHQMya3l5aiREWVY9C7wIQXXV0Y11C6xOJ2Wnkr5qXOsn2BkLgIGIK/e5KMNWWkk9GTVzBm0XQQFUkSItIUc/IVaL2R0Vp9BV5z64ADNZ4+HlnRQb76g4Po3jQZfmZfeViTz5U3XMR/0xDavCS/UFskRFIwE5mUcuNb5jQV10WsR6SsMr4dpHubU9f3kJ51MWwfA+Y8F0Yr9nkTFdFZcsdQKMRtV5kX8ZYzJVQjNPZUV9wjhtPCcolRehkJh9selCb0dqDcHssjqXJTmziBKCXnNpw4DaXYLMcQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=/W86YTFhkp1jGB41POxM+TgdbJX5xQvXzFpaojMl/4w=;
 b=QyrRpIPooSOmOBzP2LZzobhWHkyzGUI3qEoYB/ZJSMtpReAk8+T3vm+cx0/GkDpxD3qzh9UPN3Pw/fFTDg/IkbH5Hqp8bllLcxxQw5RrlR3g3w0qiNpeoWWJ03Ka920ouFKcXbdidkqjBY8GYe6a8EEDvGAoz7fFhfIlGz16kx5FlHtXzro6PSbKHmpXqpySuosQ0znkV0RPqjqaIoDxqFNom9MgEUxTMcO7/y+dTBDQoScRa3JRerq/ByFXecngJsZbFtn67SqkGFjraxR1J1iDc+bfprtP3g5c+WD4rJSe54qmDaHbAvPwbOyv3erSqQzTcZNHk6hC6ABpSgID1Q==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com;
 dkim=pass header.d=intel.com; arc=none
X-Received: from MW4PR11MB5872.namprd11.prod.outlook.com (2603:10b6:303:169::14)
 by DS0PR11MB7384.namprd11.prod.outlook.com (2603:10b6:8:134::8) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6768.30; Wed, 13 Sep
 2023 11:00:47 +0000
X-Received: from MW4PR11MB5872.namprd11.prod.outlook.com
 ([fe80::fdf8:dc0e:db69:f35b]) by MW4PR11MB5872.namprd11.prod.outlook.com
 ([fe80::fdf8:dc0e:db69:f35b%4]) with mapi id 15.20.6768.029; Wed, 13 Sep 2023
 11:00:47 +0000
From: "Yao, Jiewen" <jiewen.yao@intel.com>
To: Laszlo Ersek <lersek@redhat.com>, Ard Biesheuvel <ardb@kernel.org>
CC: "devel@edk2.groups.io" <devel@edk2.groups.io>, Ard Biesheuvel
	<ardb+tianocore@kernel.org>, Gerd Hoffmann <kraxel@redhat.com>, "Justen,
 Jordan L" <jordan.l.justen@intel.com>
Subject: Re: [edk2-devel] [PATCH] OvmfPkg: raise DXEFV size to 14.5 MB in the traditional platform FDFs
Thread-Topic: [PATCH] OvmfPkg: raise DXEFV size to 14.5 MB in the traditional
 platform FDFs
Thread-Index: AQHZ5YQjQgCDocDKQ0GJxBlOql4CubAXSDOAgAAAdQCAAAnoAIABRPBA
Date: Wed, 13 Sep 2023 11:00:47 +0000
Message-ID: <MW4PR11MB5872EA09B26ED9CA4AD8EF9A8CF0A@MW4PR11MB5872.namprd11.prod.outlook.com>
References: <20230912141849.75147-1-lersek@redhat.com>
 <CAMj1kXGzdVWBGdti0bi9zLjTWCSZgPDQft+Lm4Ahs_Ohe-UPRQ@mail.gmail.com>
 <MW4PR11MB58723B62C733BD58B201CE268CF1A@MW4PR11MB5872.namprd11.prod.outlook.com>
 <696c06dc-f360-7d8b-b4df-b1f705c64351@redhat.com>
In-Reply-To: <696c06dc-f360-7d8b-b4df-b1f705c64351@redhat.com>
Accept-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: MW4PR11MB5872:EE_|DS0PR11MB7384:EE_
x-ms-office365-filtering-correlation-id: ea61b1d5-562c-4da3-148a-08dbb448af52
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam-message-info: oK7CrbxvzVbwV4Qjw3qv4giomxIeVl6bvLSfg+H9zO11ra7hNGhVhBrcuTCoM7zHrY3/S8heSYrE8mUcG+rV0sf3/oTIOaW1Wxz0b/WO9Sbvk5fxVIbB6wlTA8ZmyeW6dSgdjskbzvUsaQPnPZynMmgmgyiDhCiW7ngGOSZz4s3MX3oACMNeEAomQUVspI2KeMHQFuDjmGPk1wKzqcNzfWm/8LeNVXtAcQCvfz2wF3TYzCukC145VwkSOap40EKzVnpgr7/Cyd4Egq03FVq+/+ckQKCyECDtqv82DxtSG6oww6EUoIMTpuH90xzc/W5L0dyx3jXVMKv2OmnPG/dmPzP3IdJ3d5jBmKZeyYzY11O/v+RFEq2KuCjJvnjFzVIkG2aQ9Jgl3UOvAZGsZHDOPJwsyFS8SQnHnJA7CLoYpxW6Bi+VsbA6KWIq/taQncPHoTf45whTFxk3iL7yQiu45gIkwN/bC21Lfw7P2JiXmFv6u2NLI2Cgf92TbJ1b88v/LDvae7fBA/CnLpaq2oFC5Ukv+tnm+tgb34v4129ZVrBLKpH8KHJFurLHZwY/o0tI8bDIT7Tlsehm15ikukcYCIqg59qbNT8WpoSqm+1fiYGgstp0OsaWP2saURbWNAHJ
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?6fRA6Nd9UvrIv71NAZFi/mslPlE1ZcAOiLq2+gq1Z4A2Teg1ZsZTgqkEci5h?=
 =?us-ascii?Q?2Ob+4XBHnssH06fzjO0cmHKJUBbz8Ed354dMh8GeZ3Yp3T0jJWWxYc0sIFeK?=
 =?us-ascii?Q?Tq+0tw2KRjSoLcQdcR+/so9aderhNoU3ctf8qhZMc14JJK7yfFttvcShPr4u?=
 =?us-ascii?Q?ndjc61A9nNEipWF79kLwvppP28hfykl/ULrwEChl9Yhetf9gptynUhqv1VFE?=
 =?us-ascii?Q?hUAotxn/k2MkiK/bfXvK9iS0s7cOCdnQdU3mOLjQCDcrEoriUhKcT/JYRpbT?=
 =?us-ascii?Q?ZQRsdAELC1Z5971MwYyyKeuZAavnQBm1HF9uW2QdLhdYgQvGNJ5SHpy9g5+O?=
 =?us-ascii?Q?7LQ2ek7XEMIkx3iUk/KoF+0fc3U2dUOTjcTJ8Lq67nZe6g+tKXQLnu7WUUBX?=
 =?us-ascii?Q?AuCMBQqfI/XrQM0YAfobBP65MheBJ/8tIJg+ttJlVfB2ZprT3QEL0nl9TGqa?=
 =?us-ascii?Q?F7R2OY5pVl4Mb0xPslWvoW6C9Cy6WI69oJ4w3qqQ/pz6o8nWvSAzB9tMYd4F?=
 =?us-ascii?Q?wGejSoIDEEmdrCKZsBVrRTNIadwOOGBz3OUwnMHK1e6WT+/E5BTmBLJKUx0r?=
 =?us-ascii?Q?MTBSE8TRsl/wOEBcLr8cbLrGos2FiO7ejHTr+3qvhuGygIADOPKZ9gkd3KIA?=
 =?us-ascii?Q?HdtSdyeX5d3DHVCJMpam1otMnYUwwotVYh9wia0qRMOgDwNAQ6AL5f8ns1Vv?=
 =?us-ascii?Q?kvZUvk6QbmCWPShRzOFBkTLq78Xgfymq7l3lP2Be/3su/AzWQJFTnjFBqRD6?=
 =?us-ascii?Q?XroWZC5KjT+ge2T78i1xaveQWJsRh41tEbSTNiTqJY3eBr3pPxG1fE3qggaf?=
 =?us-ascii?Q?LspPw70sKztYFfBWm4nuHqhhwQO7Wp+AUoEHvfUqFUsFAvikX2kCYeFVHJDu?=
 =?us-ascii?Q?TJF9NcIyeoFiuqrECXOtLk+Lg7jChiKKbxFLcwU8yeZmpP9IeEdwJL5rC6xz?=
 =?us-ascii?Q?5RaqHim/+sB7uIQyNTnpzQb/JD2xxiDTxy4zhOXElDzDPSHj3P0MD6O+b8+G?=
 =?us-ascii?Q?L3ijbWUwfJrs/NY3jystA/iUP5kUQcuty3iAO8e6aGKptsxzKmBoTqsqlcSU?=
 =?us-ascii?Q?Z5F8YAU4wG1Qr4ANn0H0Ln7l8Iude7fUmF0zUnohG0cKnwrRhQWbrS/CiBZK?=
 =?us-ascii?Q?m0Eeaes+0usXz7L9nWzPbZ0B39Bx7kO3CaazUODm1rNcCGgMU8sCQTFI8REu?=
 =?us-ascii?Q?Kualpea5bh08R5XzYsbnqxdTpvS2C/NjJ6p0IWyjoGeZPb1pDrveoTVIRq9/?=
 =?us-ascii?Q?pcAMD6hRvI4yRK0LskB/qb085MaezTBNzra87xPBZfWCIFM1vCtOuBy9lemI?=
 =?us-ascii?Q?P1BbDkaWvwzqyVQIQvkuoj5lRZZ7V01CUs/GnHhsSL4wEcq5QxJTMqTf5E+j?=
 =?us-ascii?Q?bgPEZbyWZVgKkO46uvVt0++mgypccfynfVjLbvK1jZzrmVIMNxdVRTKlHXsw?=
 =?us-ascii?Q?eOBDIPXwXVcGeNuhOQAAEAQQ8yf5oX8q4AU3EdslHDeuuTuIV4W7IazCgVQo?=
 =?us-ascii?Q?3LQqSyv07VpJC9Qar1N8LWT/NFojf6VqgruSgyZYQKv6vzgg6PHeWY1Oo91l?=
 =?us-ascii?Q?sCmSJy416ZIA3VqBAXE=3D?=
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: MW4PR11MB5872.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: ea61b1d5-562c-4da3-148a-08dbb448af52
X-MS-Exchange-CrossTenant-originalarrivaltime: 13 Sep 2023 11:00:47.4539
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: BwcWiKCgs+KSH7thzA1Dz+3R38+RqJgggvyKV9W9ZUWyxCZ6MUyhhEkyJd+DF78/4smi1jkmGXU6TjLpjx63qg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DS0PR11MB7384
X-OriginatorOrg: intel.com
Precedence: Bulk
List-Subscribe: <mailto:devel+subscribe@edk2.groups.io>
List-Help: <mailto:devel+help@edk2.groups.io>
Sender: devel@edk2.groups.io
List-Id: <devel.edk2.groups.io>
Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io
Reply-To: devel@edk2.groups.io,jiewen.yao@intel.com
List-Unsubscribe-Post: List-Unsubscribe=One-Click
List-Unsubscribe: <https://edk2.groups.io/g/devel/leave/12367111/7686176/1913456212/plugh>
X-Gm-Message-State: 7bWmiM0pXifvNJGXC1t7AEURx7686176AA=
Content-Language: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
X-GND-Status: LEGIT
Authentication-Results: spool.mail.gandi.net;
	dkim=pass header.d=groups.io header.s=20140610 header.b="DJ1r/48P";
	arc=reject ("signature check failed: fail, {[1] = sig:microsoft.com:reject}");
	dmarc=fail reason="SPF not aligned (relaxed), DKIM not aligned (relaxed)" header.from=intel.com (policy=none);
	spf=pass (spool.mail.gandi.net: domain of bounce@groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce@groups.io

Thanks Laszlo for the detail explanation, appreciate that.

I hope people will take action when it is close to 16MiB, then.

Anyway, I am OK with this so far.

Acked-by: Jiewen Yao <Jiewen.yao@intel.com>



> -----Original Message-----
> From: Laszlo Ersek <lersek@redhat.com>
> Sent: Tuesday, September 12, 2023 11:36 PM
> To: Yao, Jiewen <jiewen.yao@intel.com>; Ard Biesheuvel <ardb@kernel.org>
> Cc: devel@edk2.groups.io; Ard Biesheuvel <ardb+tianocore@kernel.org>; Ger=
d
> Hoffmann <kraxel@redhat.com>; Justen, Jordan L <jordan.l.justen@intel.com=
>
> Subject: Re: [PATCH] OvmfPkg: raise DXEFV size to 14.5 MB in the traditio=
nal
> platform FDFs
>=20
> On 9/12/23 17:02, Yao, Jiewen wrote:
> > Hello
> > I do not object the size increase.
> >
> > I am wondering if we need to take some action to control the size.
>=20
> Yes, stop implementing new edk2 features, at least in the same one
> generic firmware binary. :)
>=20
> > Or we just increase it, again and again? Of course, more feature =3D=3D
> > more size required.
>=20
> Exactly.
>=20
> DXEFV usage used to grow by 1MB every 20 months or so.
>=20
> In particular I suspect (but have no proof) that the OpenSSL 3.0 update
> led to a size explosion. This latest increase both comes sooner and is
> larger than the previous ones.
>=20
> It could likely be mitigated by including the crypto driver in OVMF (as
> opposed to linking openssl into every driver statically). But that just
> re-raises the age-old question: how do you find the minimal openssl
> service *set*, for the crypto driver, such that at OVMF runtime, all
> service requests can be satisfied?
>=20
> (And, including the full crypto service set in the crypto DXE driver is
> much worse than the current state (=3D static linking) -- I think I once
> tested that, and the crypto DXE driver ended up so big that it
> outweighed the static linking savings on all the other DXE drivers
> combined. So trimming the feature set in the crypto DXE driver is
> essential, but I don't know how it can be made *guaranteed* safe.)
>=20
> Of course we can also say, "if you need a NOOPT build for debugging a
> particular module, then do not include superfluous feaures (with the -D
> flag) in your debug build". I.e., declare that a NOOPT build requires
> trimming the -D feature flags.
>=20
> It would diverge from the tradition, but I guess it should be possible
> too (I've not tested it though -- OpenSSL may be used so widely at this
> point in edk2 modules that removing some -D flags may not matter in
> practice, for saving space).
>=20
> > May I know if there is up-limit from VMM perspective, such as KVM?
> > E.g. Can we support more than 16MiB ? More than 128MiB?
>=20
> Well, QEMU currently has a limitation that the combined size of the
> pflash chips (binary+varstore) cannot exceed 8 MiB. But, that can be
> overridden on the command line, using the "max-fw-size" machine
> property.
>=20
> The hard limit is currently 16 MiB (see pc_machine_set_max_fw_size() in
> QEMU's "hw/i386/pc.c").
>=20
> I think HP uses a custom OVMF build that is larger than 8 MiB; see QEMU
> commit 0657c657eb37. (Note however that said limit refers to the
> *compressed* size, while here we're increasing the uncompressed size.
> More on this below:)
>=20
> But, I think there may be an earlier limit of sorts:
>=20
> We can keep increasing DXEFV for a while, because the LZMA compression
> in FVMAIN_COMPACT mitigates it. (See edk2 commit b24fca05751f for a
> schematic.) But once we outgrow the space allotted for FVMAIN_COMPACT
> (3360 KB), there could be an ugly surprise. I've not checked closely,
> but growing FVMAIN_COMPACT might lead to such PCD changes that would
> break compatibility between existent varstore files and new OVMF
> binaries (similarly to how growing the varstore is a compatibility
> breaking change). So at least Linux distros need to be aware of that.
>=20
> Right now, with this patch, my IA32X64 NOOPT build prints:
>=20
> SECFV [26%Full] 212992 (0x34000) total, 56976 (0xde90) used, 156016 (0x26=
170)
> free
> PEIFV [77%Full] 917504 (0xe0000) total, 710968 (0xad938) used, 206536
> (0x326c8) free
> DXEFV [96%Full] 15204352 (0xe80000) total, 14610736 (0xdef130) used, 5936=
16
> (0x90ed0) free
> FVMAIN_COMPACT [69%Full] 3440640 (0x348000) total, 2383312 (0x245dd0)
> used, 1057328 (0x102230) free
>=20
> So we have still quite some room in FVMAIN_COMPACT. I think it would
> allow for an absolutely huge (uncompressed) DXEFV if we wanted to grow
> the compressed FVMAIN_COMPACT to the QEMU-permitted hard limit, that is,
> nearly 16 MiB.
>=20
> Laszlo
>=20
> >
> > Thank you
> > Yao, Jiewen
> >
> >> -----Original Message-----
> >> From: Ard Biesheuvel <ardb@kernel.org>
> >> Sent: Tuesday, September 12, 2023 10:59 PM
> >> To: Laszlo Ersek <lersek@redhat.com>
> >> Cc: devel@edk2.groups.io; Ard Biesheuvel <ardb+tianocore@kernel.org>;
> Gerd
> >> Hoffmann <kraxel@redhat.com>; Yao, Jiewen <jiewen.yao@intel.com>;
> Justen,
> >> Jordan L <jordan.l.justen@intel.com>
> >> Subject: Re: [PATCH] OvmfPkg: raise DXEFV size to 14.5 MB in the tradi=
tional
> >> platform FDFs
> >>
> >> On Tue, 12 Sept 2023 at 16:19, Laszlo Ersek <lersek@redhat.com> wrote:
> >>>
> >>> My usual IA32X64 and X64 builds fail for the NOOPT target, using GCC5=
:
> >>>
> >>> - IA32X64:
> >>>
> >>>> the required fv image size 0xdef130 exceeds the set fv image size
> >>>> 0xd00000
> >>>
> >>> - X64:
> >>>
> >>>> the required fv image size 0xd8f7b8 exceeds the set fv image size
> >>>> 0xd00000
> >>>
> >>> NOOPT is important for debugging (less confusing behavior with gdb, a=
nd
> >>> much less confusing disassembly).
> >>>
> >>> Raise the DXEFV size to 14.5 MB (14 MB would work, but cut it too clo=
se
> >>> for IA32X64).
> >>>
> >>> After this patch:
> >>>
> >>> - IA32:
> >>>
> >>>> DXEFV [83%Full] 15204352 (0xe80000) total, 12718784 (0xc212c0) used,
> >>>> 2485568 (0x25ed40) free
> >>>
> >>> - IA32X64:
> >>>
> >>>> DXEFV [96%Full] 15204352 (0xe80000) total, 14610736 (0xdef130) used,
> >>>> 593616 (0x90ed0) free
> >>>
> >>> - X64:
> >>>
> >>>> DXEFV [93%Full] 15204352 (0xe80000) total, 14219192 (0xd8f7b8) used,
> >>>> 985160 (0xf0848) free
> >>>
> >> ...
> >>>
> >>> Cc: Ard Biesheuvel <ardb+tianocore@kernel.org>
> >>> Cc: Gerd Hoffmann <kraxel@redhat.com>
> >>> Cc: Jiewen Yao <jiewen.yao@intel.com>
> >>> Cc: Jordan Justen <jordan.l.justen@intel.com>
> >>> Signed-off-by: Laszlo Ersek <lersek@redhat.com>
> >>
> >> Acked-by: Ard Biesheuvel <ardb@kernel.org>
> >>
> >>> ---
> >>>  OvmfPkg/OvmfPkgIa32.fdf    | 6 +++---
> >>>  OvmfPkg/OvmfPkgIa32X64.fdf | 6 +++---
> >>>  OvmfPkg/OvmfPkgX64.fdf     | 6 +++---
> >>>  3 files changed, 9 insertions(+), 9 deletions(-)
> >>>
> >>> diff --git a/OvmfPkg/OvmfPkgIa32.fdf b/OvmfPkg/OvmfPkgIa32.fdf
> >>> index 4c9be963a74d..383613e54b14 100644
> >>> --- a/OvmfPkg/OvmfPkgIa32.fdf
> >>> +++ b/OvmfPkg/OvmfPkgIa32.fdf
> >>> @@ -62,10 +62,10 @@ [FD.OVMF_CODE]
> >>>
> >>>  [FD.MEMFD]
> >>>  BaseAddress   =3D $(MEMFD_BASE_ADDRESS)
> >>> -Size          =3D 0xE00000
> >>> +Size          =3D 0xF80000
> >>>  ErasePolarity =3D 1
> >>>  BlockSize     =3D 0x10000
> >>> -NumBlocks     =3D 0xE0
> >>> +NumBlocks     =3D 0xF8
> >>>
> >>>  0x000000|0x006000
> >>>
> >>
> gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPageTablesBase|gUefiOvmfPkgToken
> >> SpaceGuid.PcdOvmfSecPageTablesSize
> >>> @@ -86,7 +86,7 @@ [FD.MEMFD]
> >>>
> >>
> gUefiOvmfPkgTokenSpaceGuid.PcdOvmfPeiMemFvBase|gUefiOvmfPkgTokenSpa
> >> ceGuid.PcdOvmfPeiMemFvSize
> >>>  FV =3D PEIFV
> >>>
> >>> -0x100000|0xD00000
> >>> +0x100000|0xE80000
> >>>
> >>
> gUefiOvmfPkgTokenSpaceGuid.PcdOvmfDxeMemFvBase|gUefiOvmfPkgTokenSpa
> >> ceGuid.PcdOvmfDxeMemFvSize
> >>>  FV =3D DXEFV
> >>>
> >>> diff --git a/OvmfPkg/OvmfPkgIa32X64.fdf b/OvmfPkg/OvmfPkgIa32X64.fdf
> >>> index 7f599f15e341..3cec3d0c8790 100644
> >>> --- a/OvmfPkg/OvmfPkgIa32X64.fdf
> >>> +++ b/OvmfPkg/OvmfPkgIa32X64.fdf
> >>> @@ -62,10 +62,10 @@ [FD.OVMF_CODE]
> >>>
> >>>  [FD.MEMFD]
> >>>  BaseAddress   =3D $(MEMFD_BASE_ADDRESS)
> >>> -Size          =3D 0xE00000
> >>> +Size          =3D 0xF80000
> >>>  ErasePolarity =3D 1
> >>>  BlockSize     =3D 0x10000
> >>> -NumBlocks     =3D 0xE0
> >>> +NumBlocks     =3D 0xF8
> >>>
> >>>  0x000000|0x006000
> >>>
> >>
> gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPageTablesBase|gUefiOvmfPkgToken
> >> SpaceGuid.PcdOvmfSecPageTablesSize
> >>> @@ -86,7 +86,7 @@ [FD.MEMFD]
> >>>
> >>
> gUefiOvmfPkgTokenSpaceGuid.PcdOvmfPeiMemFvBase|gUefiOvmfPkgTokenSpa
> >> ceGuid.PcdOvmfPeiMemFvSize
> >>>  FV =3D PEIFV
> >>>
> >>> -0x100000|0xD00000
> >>> +0x100000|0xE80000
> >>>
> >>
> gUefiOvmfPkgTokenSpaceGuid.PcdOvmfDxeMemFvBase|gUefiOvmfPkgTokenSpa
> >> ceGuid.PcdOvmfDxeMemFvSize
> >>>  FV =3D DXEFV
> >>>
> >>> diff --git a/OvmfPkg/OvmfPkgX64.fdf b/OvmfPkg/OvmfPkgX64.fdf
> >>> index 41912fc1bece..9c35b6e848a2 100644
> >>> --- a/OvmfPkg/OvmfPkgX64.fdf
> >>> +++ b/OvmfPkg/OvmfPkgX64.fdf
> >>> @@ -62,10 +62,10 @@ [FD.OVMF_CODE]
> >>>
> >>>  [FD.MEMFD]
> >>>  BaseAddress   =3D $(MEMFD_BASE_ADDRESS)
> >>> -Size          =3D 0xE00000
> >>> +Size          =3D 0xF80000
> >>>  ErasePolarity =3D 1
> >>>  BlockSize     =3D 0x10000
> >>> -NumBlocks     =3D 0xE0
> >>> +NumBlocks     =3D 0xF8
> >>>
> >>>  0x000000|0x006000
> >>>
> >>
> gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPageTablesBase|gUefiOvmfPkgToken
> >> SpaceGuid.PcdOvmfSecPageTablesSize
> >>> @@ -101,7 +101,7 @@ [FD.MEMFD]
> >>>
> >>
> gUefiOvmfPkgTokenSpaceGuid.PcdOvmfPeiMemFvBase|gUefiOvmfPkgTokenSpa
> >> ceGuid.PcdOvmfPeiMemFvSize
> >>>  FV =3D PEIFV
> >>>
> >>> -0x100000|0xD00000
> >>> +0x100000|0xE80000
> >>>
> >>
> gUefiOvmfPkgTokenSpaceGuid.PcdOvmfDxeMemFvBase|gUefiOvmfPkgTokenSpa
> >> ceGuid.PcdOvmfDxeMemFvSize
> >>>  FV =3D DXEFV
> >>>
> >



-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-
Groups.io Links: You receive all messages sent to this group.
View/Reply Online (#108579): https://edk2.groups.io/g/devel/message/108579
Mute This Topic: https://groups.io/mt/101315785/7686176
Group Owner: devel+owner@edk2.groups.io
Unsubscribe: https://edk2.groups.io/g/devel/unsub [rebecca@openfw.io]
-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-