Right. We already skipped this build with VS2019, I tend to skip the GCC NOOPT 
build also.
https://edk2.groups.io/g/devel/topic/99477984#106001

Regards,
Yi


-----Original Message-----
From: kra...@redhat.com <kra...@redhat.com> 
Sent: Monday, June 19, 2023 4:12 PM
To: Yao, Jiewen <jiewen....@intel.com>
Cc: Ard Biesheuvel <a...@kernel.org>; devel@edk2.groups.io; Li, Yi1 
<yi1...@intel.com>; Wang, Jian J <jian.j.w...@intel.com>; Pawel Polawski 
<ppola...@redhat.com>; Lu, Xiaoyu1 <xiaoyu1...@intel.com>; Jiang, Guomin 
<guomin.ji...@intel.com>; Oliver Steffen <ostef...@redhat.com>; Justen, Jordan 
L <jordan.l.jus...@intel.com>
Subject: Re: [edk2-devel] [PATCH 01/22] CryptoPkg/openssl: update submodule to 
openssl-3.0.8

On Fri, Jun 02, 2023 at 02:29:11PM +0000, Yao, Jiewen wrote:
> Thanks Ard. That is good news.
> We may try the patch to see if that will break X86.
> 
> Current blocking issue seems IA32 intrinsic and OVMF size. I am not sure if 
> Gerd has any idea on that.

Size is NOOPT only I guess?  Problem is the effect of LTO is limited with 
optimization turned off.  So building openssllib with moderate optimizations 
(-O1) is one option (works for gcc).  Or just skip the NOOPT test builds in 
case openssl is included.

take care,
  Gerd



-=-=-=-=-=-=-=-=-=-=-=-
Groups.io Links: You receive all messages sent to this group.
View/Reply Online (#106160): https://edk2.groups.io/g/devel/message/106160
Mute This Topic: https://groups.io/mt/97576405/21656
Group Owner: devel+ow...@edk2.groups.io
Unsubscribe: https://edk2.groups.io/g/devel/unsub [arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-


Reply via email to