From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by spool.mail.gandi.net (Postfix) with ESMTPS id A68797803DB for ; Wed, 13 Sep 2023 11:00:53 +0000 (UTC) DKIM-Signature: a=rsa-sha256; bh=/Rw9VVQN1uN6FO0mT6Z40PKvOPy0VrmtQwGc80u+7EA=; c=relaxed/simple; d=groups.io; h=ARC-Seal:ARC-Message-Signature:ARC-Authentication-Results:From:To:CC:Subject:Thread-Topic:Thread-Index:Date:Message-ID:References:In-Reply-To:Accept-Language:MIME-Version:Precedence:List-Subscribe:List-Help:Sender:List-Id:Mailing-List:Delivered-To:Reply-To:List-Unsubscribe-Post:List-Unsubscribe:Content-Language:Content-Type:Content-Transfer-Encoding; s=20140610; t=1694602852; v=1; b=DJ1r/48Pu+9aRhDtckddjodFZmIB+Sespc6OsaCXRkwqcOUKS3VTvjr747NW1m1WEfwKiTU9 yxBrm+msD5dNvmfR0uSpr2Brm3mM2X64VxPjtYNaGwENQkMco0xtG0wD8XHb0k87IeTUAmoHknY b2XTccxHhwwLDJVZFD+DCuy0= X-Received: by 127.0.0.2 with SMTP id Yh8cYY7687511xbMgnClBmu9; Wed, 13 Sep 2023 04:00:52 -0700 X-Received: from mgamail.intel.com (mgamail.intel.com [192.55.52.136]) by mx.groups.io with SMTP id smtpd.web11.8932.1694602851481308563 for ; Wed, 13 Sep 2023 04:00:51 -0700 X-IronPort-AV: E=McAfee;i="6600,9927,10831"; a="358061671" X-IronPort-AV: E=Sophos;i="6.02,143,1688454000"; d="scan'208";a="358061671" X-Received: from fmsmga001.fm.intel.com ([10.253.24.23]) by fmsmga106.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 13 Sep 2023 04:00:50 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10831"; a="887283732" X-IronPort-AV: E=Sophos;i="6.02,143,1688454000"; d="scan'208";a="887283732" X-Received: from fmsmsx601.amr.corp.intel.com ([10.18.126.81]) by fmsmga001.fm.intel.com with ESMTP/TLS/AES256-GCM-SHA384; 13 Sep 2023 04:00:21 -0700 X-Received: from fmsmsx612.amr.corp.intel.com (10.18.126.92) by fmsmsx601.amr.corp.intel.com (10.18.126.81) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.32; Wed, 13 Sep 2023 04:00:50 -0700 X-Received: from fmsmsx610.amr.corp.intel.com (10.18.126.90) by fmsmsx612.amr.corp.intel.com (10.18.126.92) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.32; Wed, 13 Sep 2023 04:00:49 -0700 X-Received: from FMSEDG603.ED.cps.intel.com (10.1.192.133) by fmsmsx610.amr.corp.intel.com (10.18.126.90) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.32 via Frontend Transport; Wed, 13 Sep 2023 04:00:49 -0700 X-Received: from NAM10-BN7-obe.outbound.protection.outlook.com (104.47.70.109) by edgegateway.intel.com (192.55.55.68) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2507.32; Wed, 13 Sep 2023 04:00:49 -0700 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=SOz33Lk8aQReIdPuFM4PJ/LYUeigmH2uaz81WGnlP50mnZdElCGUHQMya3l5aiREWVY9C7wIQXXV0Y11C6xOJ2Wnkr5qXOsn2BkLgIGIK/e5KMNWWkk9GTVzBm0XQQFUkSItIUc/IVaL2R0Vp9BV5z64ADNZ4+HlnRQb76g4Po3jQZfmZfeViTz5U3XMR/0xDavCS/UFskRFIwE5mUcuNb5jQV10WsR6SsMr4dpHubU9f3kJ51MWwfA+Y8F0Yr9nkTFdFZcsdQKMRtV5kX8ZYzJVQjNPZUV9wjhtPCcolRehkJh9selCb0dqDcHssjqXJTmziBKCXnNpw4DaXYLMcQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=/W86YTFhkp1jGB41POxM+TgdbJX5xQvXzFpaojMl/4w=; b=QyrRpIPooSOmOBzP2LZzobhWHkyzGUI3qEoYB/ZJSMtpReAk8+T3vm+cx0/GkDpxD3qzh9UPN3Pw/fFTDg/IkbH5Hqp8bllLcxxQw5RrlR3g3w0qiNpeoWWJ03Ka920ouFKcXbdidkqjBY8GYe6a8EEDvGAoz7fFhfIlGz16kx5FlHtXzro6PSbKHmpXqpySuosQ0znkV0RPqjqaIoDxqFNom9MgEUxTMcO7/y+dTBDQoScRa3JRerq/ByFXecngJsZbFtn67SqkGFjraxR1J1iDc+bfprtP3g5c+WD4rJSe54qmDaHbAvPwbOyv3erSqQzTcZNHk6hC6ABpSgID1Q== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com; dkim=pass header.d=intel.com; arc=none X-Received: from MW4PR11MB5872.namprd11.prod.outlook.com (2603:10b6:303:169::14) by DS0PR11MB7384.namprd11.prod.outlook.com (2603:10b6:8:134::8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6768.30; Wed, 13 Sep 2023 11:00:47 +0000 X-Received: from MW4PR11MB5872.namprd11.prod.outlook.com ([fe80::fdf8:dc0e:db69:f35b]) by MW4PR11MB5872.namprd11.prod.outlook.com ([fe80::fdf8:dc0e:db69:f35b%4]) with mapi id 15.20.6768.029; Wed, 13 Sep 2023 11:00:47 +0000 From: "Yao, Jiewen" To: Laszlo Ersek , Ard Biesheuvel CC: "devel@edk2.groups.io" , Ard Biesheuvel , Gerd Hoffmann , "Justen, Jordan L" Subject: Re: [edk2-devel] [PATCH] OvmfPkg: raise DXEFV size to 14.5 MB in the traditional platform FDFs Thread-Topic: [PATCH] OvmfPkg: raise DXEFV size to 14.5 MB in the traditional platform FDFs Thread-Index: AQHZ5YQjQgCDocDKQ0GJxBlOql4CubAXSDOAgAAAdQCAAAnoAIABRPBA Date: Wed, 13 Sep 2023 11:00:47 +0000 Message-ID: References: <20230912141849.75147-1-lersek@redhat.com> <696c06dc-f360-7d8b-b4df-b1f705c64351@redhat.com> In-Reply-To: <696c06dc-f360-7d8b-b4df-b1f705c64351@redhat.com> Accept-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ms-publictraffictype: Email x-ms-traffictypediagnostic: MW4PR11MB5872:EE_|DS0PR11MB7384:EE_ x-ms-office365-filtering-correlation-id: ea61b1d5-562c-4da3-148a-08dbb448af52 x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam-message-info: 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 x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?6fRA6Nd9UvrIv71NAZFi/mslPlE1ZcAOiLq2+gq1Z4A2Teg1ZsZTgqkEci5h?= =?us-ascii?Q?2Ob+4XBHnssH06fzjO0cmHKJUBbz8Ed354dMh8GeZ3Yp3T0jJWWxYc0sIFeK?= =?us-ascii?Q?Tq+0tw2KRjSoLcQdcR+/so9aderhNoU3ctf8qhZMc14JJK7yfFttvcShPr4u?= =?us-ascii?Q?ndjc61A9nNEipWF79kLwvppP28hfykl/ULrwEChl9Yhetf9gptynUhqv1VFE?= =?us-ascii?Q?hUAotxn/k2MkiK/bfXvK9iS0s7cOCdnQdU3mOLjQCDcrEoriUhKcT/JYRpbT?= =?us-ascii?Q?ZQRsdAELC1Z5971MwYyyKeuZAavnQBm1HF9uW2QdLhdYgQvGNJ5SHpy9g5+O?= =?us-ascii?Q?7LQ2ek7XEMIkx3iUk/KoF+0fc3U2dUOTjcTJ8Lq67nZe6g+tKXQLnu7WUUBX?= =?us-ascii?Q?AuCMBQqfI/XrQM0YAfobBP65MheBJ/8tIJg+ttJlVfB2ZprT3QEL0nl9TGqa?= =?us-ascii?Q?F7R2OY5pVl4Mb0xPslWvoW6C9Cy6WI69oJ4w3qqQ/pz6o8nWvSAzB9tMYd4F?= =?us-ascii?Q?wGejSoIDEEmdrCKZsBVrRTNIadwOOGBz3OUwnMHK1e6WT+/E5BTmBLJKUx0r?= =?us-ascii?Q?MTBSE8TRsl/wOEBcLr8cbLrGos2FiO7ejHTr+3qvhuGygIADOPKZ9gkd3KIA?= =?us-ascii?Q?HdtSdyeX5d3DHVCJMpam1otMnYUwwotVYh9wia0qRMOgDwNAQ6AL5f8ns1Vv?= =?us-ascii?Q?kvZUvk6QbmCWPShRzOFBkTLq78Xgfymq7l3lP2Be/3su/AzWQJFTnjFBqRD6?= =?us-ascii?Q?XroWZC5KjT+ge2T78i1xaveQWJsRh41tEbSTNiTqJY3eBr3pPxG1fE3qggaf?= =?us-ascii?Q?LspPw70sKztYFfBWm4nuHqhhwQO7Wp+AUoEHvfUqFUsFAvikX2kCYeFVHJDu?= =?us-ascii?Q?TJF9NcIyeoFiuqrECXOtLk+Lg7jChiKKbxFLcwU8yeZmpP9IeEdwJL5rC6xz?= =?us-ascii?Q?5RaqHim/+sB7uIQyNTnpzQb/JD2xxiDTxy4zhOXElDzDPSHj3P0MD6O+b8+G?= =?us-ascii?Q?L3ijbWUwfJrs/NY3jystA/iUP5kUQcuty3iAO8e6aGKptsxzKmBoTqsqlcSU?= =?us-ascii?Q?Z5F8YAU4wG1Qr4ANn0H0Ln7l8Iude7fUmF0zUnohG0cKnwrRhQWbrS/CiBZK?= =?us-ascii?Q?m0Eeaes+0usXz7L9nWzPbZ0B39Bx7kO3CaazUODm1rNcCGgMU8sCQTFI8REu?= =?us-ascii?Q?Kualpea5bh08R5XzYsbnqxdTpvS2C/NjJ6p0IWyjoGeZPb1pDrveoTVIRq9/?= =?us-ascii?Q?pcAMD6hRvI4yRK0LskB/qb085MaezTBNzra87xPBZfWCIFM1vCtOuBy9lemI?= =?us-ascii?Q?P1BbDkaWvwzqyVQIQvkuoj5lRZZ7V01CUs/GnHhsSL4wEcq5QxJTMqTf5E+j?= =?us-ascii?Q?bgPEZbyWZVgKkO46uvVt0++mgypccfynfVjLbvK1jZzrmVIMNxdVRTKlHXsw?= =?us-ascii?Q?eOBDIPXwXVcGeNuhOQAAEAQQ8yf5oX8q4AU3EdslHDeuuTuIV4W7IazCgVQo?= =?us-ascii?Q?3LQqSyv07VpJC9Qar1N8LWT/NFojf6VqgruSgyZYQKv6vzgg6PHeWY1Oo91l?= =?us-ascii?Q?sCmSJy416ZIA3VqBAXE=3D?= MIME-Version: 1.0 X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: MW4PR11MB5872.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: ea61b1d5-562c-4da3-148a-08dbb448af52 X-MS-Exchange-CrossTenant-originalarrivaltime: 13 Sep 2023 11:00:47.4539 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: BwcWiKCgs+KSH7thzA1Dz+3R38+RqJgggvyKV9W9ZUWyxCZ6MUyhhEkyJd+DF78/4smi1jkmGXU6TjLpjx63qg== X-MS-Exchange-Transport-CrossTenantHeadersStamped: DS0PR11MB7384 X-OriginatorOrg: intel.com Precedence: Bulk List-Subscribe: List-Help: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,jiewen.yao@intel.com List-Unsubscribe-Post: List-Unsubscribe=One-Click List-Unsubscribe: X-Gm-Message-State: 7bWmiM0pXifvNJGXC1t7AEURx7686176AA= Content-Language: en-US Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable X-GND-Status: LEGIT Authentication-Results: spool.mail.gandi.net; dkim=pass header.d=groups.io header.s=20140610 header.b="DJ1r/48P"; arc=reject ("signature check failed: fail, {[1] = sig:microsoft.com:reject}"); dmarc=fail reason="SPF not aligned (relaxed), DKIM not aligned (relaxed)" header.from=intel.com (policy=none); spf=pass (spool.mail.gandi.net: domain of bounce@groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce@groups.io Thanks Laszlo for the detail explanation, appreciate that. I hope people will take action when it is close to 16MiB, then. Anyway, I am OK with this so far. Acked-by: Jiewen Yao > -----Original Message----- > From: Laszlo Ersek > Sent: Tuesday, September 12, 2023 11:36 PM > To: Yao, Jiewen ; Ard Biesheuvel > Cc: devel@edk2.groups.io; Ard Biesheuvel ; Ger= d > Hoffmann ; Justen, Jordan L > Subject: Re: [PATCH] OvmfPkg: raise DXEFV size to 14.5 MB in the traditio= nal > platform FDFs >=20 > On 9/12/23 17:02, Yao, Jiewen wrote: > > Hello > > I do not object the size increase. > > > > I am wondering if we need to take some action to control the size. >=20 > Yes, stop implementing new edk2 features, at least in the same one > generic firmware binary. :) >=20 > > Or we just increase it, again and again? Of course, more feature =3D=3D > > more size required. >=20 > Exactly. >=20 > DXEFV usage used to grow by 1MB every 20 months or so. >=20 > In particular I suspect (but have no proof) that the OpenSSL 3.0 update > led to a size explosion. This latest increase both comes sooner and is > larger than the previous ones. >=20 > It could likely be mitigated by including the crypto driver in OVMF (as > opposed to linking openssl into every driver statically). But that just > re-raises the age-old question: how do you find the minimal openssl > service *set*, for the crypto driver, such that at OVMF runtime, all > service requests can be satisfied? >=20 > (And, including the full crypto service set in the crypto DXE driver is > much worse than the current state (=3D static linking) -- I think I once > tested that, and the crypto DXE driver ended up so big that it > outweighed the static linking savings on all the other DXE drivers > combined. So trimming the feature set in the crypto DXE driver is > essential, but I don't know how it can be made *guaranteed* safe.) >=20 > Of course we can also say, "if you need a NOOPT build for debugging a > particular module, then do not include superfluous feaures (with the -D > flag) in your debug build". I.e., declare that a NOOPT build requires > trimming the -D feature flags. >=20 > It would diverge from the tradition, but I guess it should be possible > too (I've not tested it though -- OpenSSL may be used so widely at this > point in edk2 modules that removing some -D flags may not matter in > practice, for saving space). >=20 > > May I know if there is up-limit from VMM perspective, such as KVM? > > E.g. Can we support more than 16MiB ? More than 128MiB? >=20 > Well, QEMU currently has a limitation that the combined size of the > pflash chips (binary+varstore) cannot exceed 8 MiB. But, that can be > overridden on the command line, using the "max-fw-size" machine > property. >=20 > The hard limit is currently 16 MiB (see pc_machine_set_max_fw_size() in > QEMU's "hw/i386/pc.c"). >=20 > I think HP uses a custom OVMF build that is larger than 8 MiB; see QEMU > commit 0657c657eb37. (Note however that said limit refers to the > *compressed* size, while here we're increasing the uncompressed size. > More on this below:) >=20 > But, I think there may be an earlier limit of sorts: >=20 > We can keep increasing DXEFV for a while, because the LZMA compression > in FVMAIN_COMPACT mitigates it. (See edk2 commit b24fca05751f for a > schematic.) But once we outgrow the space allotted for FVMAIN_COMPACT > (3360 KB), there could be an ugly surprise. I've not checked closely, > but growing FVMAIN_COMPACT might lead to such PCD changes that would > break compatibility between existent varstore files and new OVMF > binaries (similarly to how growing the varstore is a compatibility > breaking change). So at least Linux distros need to be aware of that. >=20 > Right now, with this patch, my IA32X64 NOOPT build prints: >=20 > SECFV [26%Full] 212992 (0x34000) total, 56976 (0xde90) used, 156016 (0x26= 170) > free > PEIFV [77%Full] 917504 (0xe0000) total, 710968 (0xad938) used, 206536 > (0x326c8) free > DXEFV [96%Full] 15204352 (0xe80000) total, 14610736 (0xdef130) used, 5936= 16 > (0x90ed0) free > FVMAIN_COMPACT [69%Full] 3440640 (0x348000) total, 2383312 (0x245dd0) > used, 1057328 (0x102230) free >=20 > So we have still quite some room in FVMAIN_COMPACT. I think it would > allow for an absolutely huge (uncompressed) DXEFV if we wanted to grow > the compressed FVMAIN_COMPACT to the QEMU-permitted hard limit, that is, > nearly 16 MiB. >=20 > Laszlo >=20 > > > > Thank you > > Yao, Jiewen > > > >> -----Original Message----- > >> From: Ard Biesheuvel > >> Sent: Tuesday, September 12, 2023 10:59 PM > >> To: Laszlo Ersek > >> Cc: devel@edk2.groups.io; Ard Biesheuvel ; > Gerd > >> Hoffmann ; Yao, Jiewen ; > Justen, > >> Jordan L > >> Subject: Re: [PATCH] OvmfPkg: raise DXEFV size to 14.5 MB in the tradi= tional > >> platform FDFs > >> > >> On Tue, 12 Sept 2023 at 16:19, Laszlo Ersek wrote: > >>> > >>> My usual IA32X64 and X64 builds fail for the NOOPT target, using GCC5= : > >>> > >>> - IA32X64: > >>> > >>>> the required fv image size 0xdef130 exceeds the set fv image size > >>>> 0xd00000 > >>> > >>> - X64: > >>> > >>>> the required fv image size 0xd8f7b8 exceeds the set fv image size > >>>> 0xd00000 > >>> > >>> NOOPT is important for debugging (less confusing behavior with gdb, a= nd > >>> much less confusing disassembly). > >>> > >>> Raise the DXEFV size to 14.5 MB (14 MB would work, but cut it too clo= se > >>> for IA32X64). > >>> > >>> After this patch: > >>> > >>> - IA32: > >>> > >>>> DXEFV [83%Full] 15204352 (0xe80000) total, 12718784 (0xc212c0) used, > >>>> 2485568 (0x25ed40) free > >>> > >>> - IA32X64: > >>> > >>>> DXEFV [96%Full] 15204352 (0xe80000) total, 14610736 (0xdef130) used, > >>>> 593616 (0x90ed0) free > >>> > >>> - X64: > >>> > >>>> DXEFV [93%Full] 15204352 (0xe80000) total, 14219192 (0xd8f7b8) used, > >>>> 985160 (0xf0848) free > >>> > >> ... > >>> > >>> Cc: Ard Biesheuvel > >>> Cc: Gerd Hoffmann > >>> Cc: Jiewen Yao > >>> Cc: Jordan Justen > >>> Signed-off-by: Laszlo Ersek > >> > >> Acked-by: Ard Biesheuvel > >> > >>> --- > >>> OvmfPkg/OvmfPkgIa32.fdf | 6 +++--- > >>> OvmfPkg/OvmfPkgIa32X64.fdf | 6 +++--- > >>> OvmfPkg/OvmfPkgX64.fdf | 6 +++--- > >>> 3 files changed, 9 insertions(+), 9 deletions(-) > >>> > >>> diff --git a/OvmfPkg/OvmfPkgIa32.fdf b/OvmfPkg/OvmfPkgIa32.fdf > >>> index 4c9be963a74d..383613e54b14 100644 > >>> --- a/OvmfPkg/OvmfPkgIa32.fdf > >>> +++ b/OvmfPkg/OvmfPkgIa32.fdf > >>> @@ -62,10 +62,10 @@ [FD.OVMF_CODE] > >>> > >>> [FD.MEMFD] > >>> BaseAddress =3D $(MEMFD_BASE_ADDRESS) > >>> -Size =3D 0xE00000 > >>> +Size =3D 0xF80000 > >>> ErasePolarity =3D 1 > >>> BlockSize =3D 0x10000 > >>> -NumBlocks =3D 0xE0 > >>> +NumBlocks =3D 0xF8 > >>> > >>> 0x000000|0x006000 > >>> > >> > gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPageTablesBase|gUefiOvmfPkgToken > >> SpaceGuid.PcdOvmfSecPageTablesSize > >>> @@ -86,7 +86,7 @@ [FD.MEMFD] > >>> > >> > gUefiOvmfPkgTokenSpaceGuid.PcdOvmfPeiMemFvBase|gUefiOvmfPkgTokenSpa > >> ceGuid.PcdOvmfPeiMemFvSize > >>> FV =3D PEIFV > >>> > >>> -0x100000|0xD00000 > >>> +0x100000|0xE80000 > >>> > >> > gUefiOvmfPkgTokenSpaceGuid.PcdOvmfDxeMemFvBase|gUefiOvmfPkgTokenSpa > >> ceGuid.PcdOvmfDxeMemFvSize > >>> FV =3D DXEFV > >>> > >>> diff --git a/OvmfPkg/OvmfPkgIa32X64.fdf b/OvmfPkg/OvmfPkgIa32X64.fdf > >>> index 7f599f15e341..3cec3d0c8790 100644 > >>> --- a/OvmfPkg/OvmfPkgIa32X64.fdf > >>> +++ b/OvmfPkg/OvmfPkgIa32X64.fdf > >>> @@ -62,10 +62,10 @@ [FD.OVMF_CODE] > >>> > >>> [FD.MEMFD] > >>> BaseAddress =3D $(MEMFD_BASE_ADDRESS) > >>> -Size =3D 0xE00000 > >>> +Size =3D 0xF80000 > >>> ErasePolarity =3D 1 > >>> BlockSize =3D 0x10000 > >>> -NumBlocks =3D 0xE0 > >>> +NumBlocks =3D 0xF8 > >>> > >>> 0x000000|0x006000 > >>> > >> > gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPageTablesBase|gUefiOvmfPkgToken > >> SpaceGuid.PcdOvmfSecPageTablesSize > >>> @@ -86,7 +86,7 @@ [FD.MEMFD] > >>> > >> > gUefiOvmfPkgTokenSpaceGuid.PcdOvmfPeiMemFvBase|gUefiOvmfPkgTokenSpa > >> ceGuid.PcdOvmfPeiMemFvSize > >>> FV =3D PEIFV > >>> > >>> -0x100000|0xD00000 > >>> +0x100000|0xE80000 > >>> > >> > gUefiOvmfPkgTokenSpaceGuid.PcdOvmfDxeMemFvBase|gUefiOvmfPkgTokenSpa > >> ceGuid.PcdOvmfDxeMemFvSize > >>> FV =3D DXEFV > >>> > >>> diff --git a/OvmfPkg/OvmfPkgX64.fdf b/OvmfPkg/OvmfPkgX64.fdf > >>> index 41912fc1bece..9c35b6e848a2 100644 > >>> --- a/OvmfPkg/OvmfPkgX64.fdf > >>> +++ b/OvmfPkg/OvmfPkgX64.fdf > >>> @@ -62,10 +62,10 @@ [FD.OVMF_CODE] > >>> > >>> [FD.MEMFD] > >>> BaseAddress =3D $(MEMFD_BASE_ADDRESS) > >>> -Size =3D 0xE00000 > >>> +Size =3D 0xF80000 > >>> ErasePolarity =3D 1 > >>> BlockSize =3D 0x10000 > >>> -NumBlocks =3D 0xE0 > >>> +NumBlocks =3D 0xF8 > >>> > >>> 0x000000|0x006000 > >>> > >> > gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPageTablesBase|gUefiOvmfPkgToken > >> SpaceGuid.PcdOvmfSecPageTablesSize > >>> @@ -101,7 +101,7 @@ [FD.MEMFD] > >>> > >> > gUefiOvmfPkgTokenSpaceGuid.PcdOvmfPeiMemFvBase|gUefiOvmfPkgTokenSpa > >> ceGuid.PcdOvmfPeiMemFvSize > >>> FV =3D PEIFV > >>> > >>> -0x100000|0xD00000 > >>> +0x100000|0xE80000 > >>> > >> > gUefiOvmfPkgTokenSpaceGuid.PcdOvmfDxeMemFvBase|gUefiOvmfPkgTokenSpa > >> ceGuid.PcdOvmfDxeMemFvSize > >>> FV =3D DXEFV > >>> > > -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#108579): https://edk2.groups.io/g/devel/message/108579 Mute This Topic: https://groups.io/mt/101315785/7686176 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [rebecca@openfw.io] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-