Right. We already skipped this build with VS2019, I tend to skip the GCC NOOPT build also. https://edk2.groups.io/g/devel/topic/99477984#106001
Regards, Yi -----Original Message----- From: kra...@redhat.com <kra...@redhat.com> Sent: Monday, June 19, 2023 4:12 PM To: Yao, Jiewen <jiewen....@intel.com> Cc: Ard Biesheuvel <a...@kernel.org>; devel@edk2.groups.io; Li, Yi1 <yi1...@intel.com>; Wang, Jian J <jian.j.w...@intel.com>; Pawel Polawski <ppola...@redhat.com>; Lu, Xiaoyu1 <xiaoyu1...@intel.com>; Jiang, Guomin <guomin.ji...@intel.com>; Oliver Steffen <ostef...@redhat.com>; Justen, Jordan L <jordan.l.jus...@intel.com> Subject: Re: [edk2-devel] [PATCH 01/22] CryptoPkg/openssl: update submodule to openssl-3.0.8 On Fri, Jun 02, 2023 at 02:29:11PM +0000, Yao, Jiewen wrote: > Thanks Ard. That is good news. > We may try the patch to see if that will break X86. > > Current blocking issue seems IA32 intrinsic and OVMF size. I am not sure if > Gerd has any idea on that. Size is NOOPT only I guess? Problem is the effect of LTO is limited with optimization turned off. So building openssllib with moderate optimizations (-O1) is one option (works for gcc). Or just skip the NOOPT test builds in case openssl is included. take care, Gerd -=-=-=-=-=-=-=-=-=-=-=- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#106160): https://edk2.groups.io/g/devel/message/106160 Mute This Topic: https://groups.io/mt/97576405/21656 Group Owner: devel+ow...@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [arch...@mail-archive.com] -=-=-=-=-=-=-=-=-=-=-=-