From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mga11.intel.com (mga11.intel.com [192.55.52.93]) by mx.groups.io with SMTP id smtpd.web10.53099.1686552762361856645 for ; Sun, 11 Jun 2023 23:52:42 -0700 Authentication-Results: mx.groups.io; dkim=fail reason="unable to parse pub key" header.i=@intel.com header.s=intel header.b=fvCoBu1f; spf=pass (domain: intel.com, ip: 192.55.52.93, mailfrom: yi1.li@intel.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1686552762; x=1718088762; h=from:to:subject:date:message-id:mime-version; bh=pT4MaQFcB8hhvMUXoj5p33gIqh1by0PkNcAfI/3Dd40=; b=fvCoBu1fzR7m5+XYFXfsMbC/5EtQ+QJYkbVcJNcrxThCpXEIxFQaZvWV WlqOSssgcLidGB+e4SIK39raOoNqZeJnpYXrp0I51Yx6x6wXhCffkUS4z /sI8wYlJEhqk8pnkeOxL+nKWDJuxVxAWdULCGiWv2+uKMQ9J2mvAX6jgE 2iw9UgBp+TAcakc82zQVcA7MrMb6/LXStOq2K/HO/x0m/OgJSl1xwu5XU Ws56czBJUQSSX5sBppznv/ajmJDkIdRk3IgX94MSG8bdK1qdylp8MWfx4 HpjuxSvCCOC+Y6V7fi8lR1IhNw5jxYAAuA5Vnkcp2ysswWvauraiPWo+k Q==; X-IronPort-AV: E=McAfee;i="6600,9927,10738"; a="355457250" X-IronPort-AV: E=Sophos;i="6.00,236,1681196400"; d="scan'208,217";a="355457250" Received: from orsmga002.jf.intel.com ([10.7.209.21]) by fmsmga102.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 11 Jun 2023 23:52:41 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10738"; a="711089939" X-IronPort-AV: E=Sophos;i="6.00,236,1681196400"; d="scan'208,217";a="711089939" Received: from orsmsx601.amr.corp.intel.com ([10.22.229.14]) by orsmga002.jf.intel.com with ESMTP; 11 Jun 2023 23:52:41 -0700 Received: from orsmsx611.amr.corp.intel.com (10.22.229.24) by ORSMSX601.amr.corp.intel.com (10.22.229.14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.23; Sun, 11 Jun 2023 23:52:41 -0700 Received: from orsmsx602.amr.corp.intel.com (10.22.229.15) by ORSMSX611.amr.corp.intel.com (10.22.229.24) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.23; Sun, 11 Jun 2023 23:52:40 -0700 Received: from ORSEDG601.ED.cps.intel.com (10.7.248.6) by orsmsx602.amr.corp.intel.com (10.22.229.15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.23 via Frontend Transport; Sun, 11 Jun 2023 23:52:40 -0700 Received: from NAM12-BN8-obe.outbound.protection.outlook.com (104.47.55.168) by edgegateway.intel.com (134.134.137.102) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2507.23; Sun, 11 Jun 2023 23:52:39 -0700 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=PV905fnYxrTvQ+3Gb6CjAOvNJfaFsAvBMokzxUss6lOgQH7qbflhwDCEg4vVrsIF9dME5sUHaQlwPInyWQuEn3l9X1x/STBLWaOmLS+dS+u4GMl8hbRoSU2fxQ/VjjU8JK3nilc5HiLQJmh6XJm8r6cRu7f0S4qb22kNVvwVUGRXKx5cmjw0HFJVrat5PJPL4E3A9skDAd5Pm1sfJjUbv24/zHg8Yq61uIcTDiIimk57Wm2ySfeHqgcYMOlIC7vPwPy2pUzX9Q2zPMmJYXkqN4A7y4HudPIMRe5KB43aD8mWTIXbS3PXINbfhRJ7Gco+tYukYG2SvkHggys2DzUY7w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=T2ewOQ5c8Qw0dJ4BJXoqlDR4BSsm3Zw1N067M8Us4DI=; b=CQebQnx018QuI3Rm5yVI1lLkK+PGk+c6wuM16G/GiGQGGAc6tGpEHegMctb2csL0cL6GYRd9pp7QLtny+qobD19jcuGs6poNx892sAPfQt32bCmQEVbrTE0QGJcPqDTCPGp628yd2Zgb3u8Gb0xk7WQZwMQ7btC+gBTGiom/7QtbcPdQ701ojiaMuWG7yOUS1rmKCrfNtcMn9XbV4V8jbkGxRKM4d2QZ++KB788Vmv/B2FiCvoLebS+PG4tubJLTyBPcdGG+aGaKyT1KyPR4+r0XHwPqzuyepoYLcdY9ZzQsZedb2SeBkD5NfzbTN8u5t8SkzkMA5QjQyqPJmO8u6A== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com; dkim=pass header.d=intel.com; arc=none Received: from SJ1PR11MB6227.namprd11.prod.outlook.com (2603:10b6:a03:45a::10) by CH0PR11MB5218.namprd11.prod.outlook.com (2603:10b6:610:e1::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6477.29; Mon, 12 Jun 2023 06:52:37 +0000 Received: from SJ1PR11MB6227.namprd11.prod.outlook.com ([fe80::75de:e3b8:28f8:e70]) by SJ1PR11MB6227.namprd11.prod.outlook.com ([fe80::75de:e3b8:28f8:e70%6]) with mapi id 15.20.6455.034; Mon, 12 Jun 2023 06:52:37 +0000 From: "Li, Yi" To: "devel@edk2.groups.io" , Ard Biesheuvel , "Yao, Jiewen" , "Justen, Jordan L" , Gerd Hoffmann Subject: [edk2-devel] Question about limit size of OvmfPkg NOOPT build Thread-Topic: [edk2-devel] Question about limit size of OvmfPkg NOOPT build Thread-Index: Admc+WpJwmFQu90sRoi6yeB+pAh3SQ== Date: Mon, 12 Jun 2023 06:52:36 +0000 Message-ID: Accept-Language: zh-CN, en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=intel.com; x-ms-publictraffictype: Email x-ms-traffictypediagnostic: SJ1PR11MB6227:EE_|CH0PR11MB5218:EE_ x-ms-office365-filtering-correlation-id: 9dc45595-c94b-4385-584b-08db6b119b4b x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:SJ1PR11MB6227.namprd11.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230028)(376002)(366004)(39860400002)(396003)(136003)(346002)(451199021)(19627235002)(110136005)(86362001)(83380400001)(6506007)(33656002)(38070700005)(26005)(82960400001)(186003)(38100700002)(9686003)(166002)(122000001)(478600001)(71200400001)(966005)(7696005)(55016003)(2906002)(41300700001)(316002)(8936002)(8676002)(52536014)(5660300002)(64756008)(76116006)(66446008)(66946007)(66556008)(66476007);DIR:OUT;SFP:1102; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?dJwt+KqlsO1/kVXZkarra+KE+JAhNyXnzwVwPcHkBSw7g54W8IB81Zypt56Q?= =?us-ascii?Q?IAjgm2HqqYrdVnjSQ7Mq0t9ZHQEJa7I+J5MIT+5QvMz3s8SNTIJIjtwQybD4?= =?us-ascii?Q?Q2Lg1NI9noq4VInFeB35awrHZYC2dQIrJ04UW5fAEPDGUPEQWIycszpmjVf+?= =?us-ascii?Q?vmFVGQtKU5ZIkH5UIN+Ge4TN8aGG+VBOEmmhfBLgpwOqHDxfgSE+eMQQiYGg?= =?us-ascii?Q?f2cmG+IvLFdgSRpyf0KTOxm1MMX72/PwuaVQ/wy1gbV08W3eV9k6HxJ9yC8H?= =?us-ascii?Q?ki7eTd92kTk5gKWnBluf6P65lMVVNgpJJ7yKM7CpQvUNZ8fm/fOzuKsvRSrK?= =?us-ascii?Q?yCMMPoJ2IxQPlfzxa8GXE0Zw3/zlj8RHRe0DVKcG+zLm017EMX6uHZMnyCxg?= =?us-ascii?Q?YTAq6N1GBv67cRF/NKDJ2iru2e8BJvb2r/DFzgX6vfgm6i3PznMkq3f3kuz6?= =?us-ascii?Q?pbPNmbA1nhiFmx6ZgvOkTc01XFFbaMZP1TzgNVHL3fGeRTQkk5r4opZ30fzS?= =?us-ascii?Q?W/HfVnmKZWpCgEAcgD9iMAvn/00xoVVj8y++o6LLIVOCS7X1kyXFEDYg6Bpn?= =?us-ascii?Q?Ww9pAcf7QqsgUR9eHMptP604dLenB9ruyPsLT4hkN2uzDWOm4pIHIXZnPy+G?= =?us-ascii?Q?yWPTio8cR6QJoCZGHEmtAQX6wnqII3G3NNtZvEUKPHYyOEXC1NXbb2pdiPiG?= =?us-ascii?Q?w9H/vJWph8/LeGB/Au1v0lf/a1qpNf/sgnfjFvHDdTvdtk3nMk7oJp0Xr2wf?= =?us-ascii?Q?WpsQXO0RJV9ZjtNmfmSJNNr2jn2bs9oqy5rMNuOiQN+BiI70mnc7Mui1ihp5?= =?us-ascii?Q?y0F96B2mJZaWMoV93tVJ5N+oKyLxpB1bPMjVuQCMpYbOsKQ68gA5P+icEpno?= =?us-ascii?Q?id5uktYJA6I3nhQVn4s6NlkFp3U9/J9KBYH+K6mkyZd9P18kqNuu4b1+Ztwf?= =?us-ascii?Q?onCtrodyG2faWerOylbZf5ULsi7l5ArtruYTn5BqbA3vee/TEibR1Ual341B?= =?us-ascii?Q?Xe9iNeSHwFa1EhHW9DQFJkHCgx0IyCQtClRysvLvXjk/9Dzktgu//Mjk1KXi?= =?us-ascii?Q?TeDRUH93sVuq2bO7wXihGoqpw/G1qZP1vTE28l/ubr7o4Q6Osq0DZxrdJKBb?= =?us-ascii?Q?t2GeNE5Gq0vFGhCBrQZqE+DX7xBIgIrvNM2wiT/rVpX47HtLIWLsgTCqaX7V?= =?us-ascii?Q?Bcn4F2oq8uELIWpzFMv9khl8URphO7Rb/GAtH4tOG8zN1oud90b4K4AjfjBN?= =?us-ascii?Q?1oCs3wyC5PrVTXnLbbYgvGr+mZwQ6C7uydIh/s5Eu9bZeGwG6YPL+hdXckE+?= =?us-ascii?Q?BwgCcyF7h7oUARqrMPok6CX8z7oIgaoqD9poSMSEhO0WeFDnpYUqwkkMOHvs?= =?us-ascii?Q?ZfIPjWh16mNx1ypVAcfuWm7pyCMKFmOxLYNFCIcxks5Z4CfNMJVJRe4j4c9f?= =?us-ascii?Q?YuKxnfwf+fhn50D11KePzgYPbQLHH+8lhFHoTE8zQ+/LZpw2aTHCM4UvTECs?= =?us-ascii?Q?Rc5L0hcVLGsIpjsQhdZfzXRSCUYsJTjJXlLybAlk2oF/uYl09Prj+/1Fe+Q4?= =?us-ascii?Q?V1Tw31ZT7k1hduYsygM=3D?= MIME-Version: 1.0 X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: SJ1PR11MB6227.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 9dc45595-c94b-4385-584b-08db6b119b4b X-MS-Exchange-CrossTenant-originalarrivaltime: 12 Jun 2023 06:52:36.7074 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: JI55jiH9Tx+GGE0OLt6e7cHCectiLCz/j8UBmS0jpXHkiN6mYgHLtywSMpTQroCtX/jrVksyrpbNCxEzmcdUaw== X-MS-Exchange-Transport-CrossTenantHeadersStamped: CH0PR11MB5218 Return-Path: yi1.li@intel.com X-OriginatorOrg: intel.com Content-Language: en-US Content-Type: multipart/alternative; boundary="_000_SJ1PR11MB62279BAD44F8D32DBD29214BC554ASJ1PR11MB6227namp_" --_000_SJ1PR11MB62279BAD44F8D32DBD29214BC554ASJ1PR11MB6227namp_ Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Hello all, I am working on OPENSSL30 upgrade of CryptoPkg. The upgrade of the OPENSSL submodule will increase the size of binaries and= break the CI build check: PlatformCI_OvmfPkg_Ubuntu_GCC5_PR (Platform_CI O= VMF_IA32X64_FULL_NOOPT): https://github.com/tianocore/edk2/pull/4391/ The size change is hard to avoid, can we skip this build of GCC just like w= e did for VS2019? https://github.com/tianocore/edk2/blob/8314a85893f5b75baa0031a5138028188a62= 6243/OvmfPkg/PlatformCI/.azurepipelines/Windows-VS2019.yml#L112-L123 OvmfPkg/PlatformCI/.azurepipelines/Windows-VS2019.yml#L112-L123: # This currently creates a very large image which is too big for the FD= F declared range # Ovmf maintainers suggest to skip this build for now. # # OVMF_IA32X64_FULL_NOOPT: # Build.File: "$(package)/PlatformCI/PlatformBuild.py" # Build.Arch: "IA32,X64" # Build.Flags: "BLD_*_SECURE_BOOT_ENABLE=3D1 BLD_*_SMM_REQUIRE= =3D1 BLD_*_TPM2_ENABLE=3D1 BLD_*_NETWORK_TLS_ENABLE=3D1 BLD_*_NETWORK_IP6_= ENABLE=3D1 BLD_*_NETWORK_HTTP_BOOT_ENABLE=3D1" # Build.Target: "NOOPT" # Run.Flags: $(run_flags) # Run: $(should_run) Regards, Yi --_000_SJ1PR11MB62279BAD44F8D32DBD29214BC554ASJ1PR11MB6227namp_ Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

Hello all,

 

I am working on OPENSSL30 upgrade of CryptoPkg.=

The upgrade of the OPENSSL submodule will increase t= he size of binaries and break the CI build check: PlatformCI_OvmfPkg_Ubuntu= _GCC5_PR (Platform_CI OVMF_IA32X64_FULL_NOOPT):

https://github.c= om/tianocore/edk2/pull/4391/

 

The size change is hard to avoid, can we skip this b= uild of GCC just like we did for VS2019?

https://github.com/tianocore/edk2/blob/8314a85= 893f5b75baa0031a5138028188a626243/OvmfPkg/PlatformCI/.azurepipelines/Window= s-VS2019.yml#L112-L123

OvmfPkg/PlatformCI/.azurepipelines/Windows-VS2019.ym= l#L112-L123:

    # This currently creates a very l= arge image which is too big for the FDF declared range

    #   Ovmf maintainers su= ggest to skip this build for now.

    #

    #     &n= bsp; OVMF_IA32X64_FULL_NOOPT:

    #     &n= bsp;   Build.File: "$(package)/PlatformCI/PlatformBuild.py&q= uot;

    #     &n= bsp;   Build.Arch: "IA32,X64"

    #     &n= bsp;   Build.Flags: "BLD_*_SECURE_BOOT_ENABLE=3D1 BLD_*_SMM_= REQUIRE=3D1  BLD_*_TPM2_ENABLE=3D1 BLD_*_NETWORK_TLS_ENABLE=3D1 BLD_*_= NETWORK_IP6_ENABLE=3D1 BLD_*_NETWORK_HTTP_BOOT_ENABLE=3D1"<= /p>

    #     &n= bsp;   Build.Target: "NOOPT"

    #     &n= bsp;   Run.Flags: $(run_flags)

    #     &n= bsp;   Run: $(should_run)

 

Regards,

Yi

 

 

--_000_SJ1PR11MB62279BAD44F8D32DBD29214BC554ASJ1PR11MB6227namp_--