[edk2-devel] [PATCH 01/22] CryptoPkg/openssl: update submodule to openssl-3.0.8

Li, Yi yi1.li at intel.com
Mon Jun 19 08:37:56 UTC 2023


Right. We already skipped this build with VS2019, I tend to skip the GCC NOOPT build also.
https://edk2.groups.io/g/devel/topic/99477984#106001

Regards,
Yi


-----Original Message-----
From: kraxel at redhat.com <kraxel at redhat.com> 
Sent: Monday, June 19, 2023 4:12 PM
To: Yao, Jiewen <jiewen.yao at intel.com>
Cc: Ard Biesheuvel <ardb at kernel.org>; devel at edk2.groups.io; Li, Yi1 <yi1.li at intel.com>; Wang, Jian J <jian.j.wang at intel.com>; Pawel Polawski <ppolawsk at redhat.com>; Lu, Xiaoyu1 <xiaoyu1.lu at intel.com>; Jiang, Guomin <guomin.jiang at intel.com>; Oliver Steffen <osteffen at redhat.com>; Justen, Jordan L <jordan.l.justen at intel.com>
Subject: Re: [edk2-devel] [PATCH 01/22] CryptoPkg/openssl: update submodule to openssl-3.0.8

On Fri, Jun 02, 2023 at 02:29:11PM +0000, Yao, Jiewen wrote:
> Thanks Ard. That is good news.
> We may try the patch to see if that will break X86.
> 
> Current blocking issue seems IA32 intrinsic and OVMF size. I am not sure if Gerd has any idea on that.

Size is NOOPT only I guess?  Problem is the effect of LTO is limited with optimization turned off.  So building openssllib with moderate optimizations (-O1) is one option (works for gcc).  Or just skip the NOOPT test builds in case openssl is included.

take care,
  Gerd



-=-=-=-=-=-=-=-=-=-=-=-
Groups.io Links: You receive all messages sent to this group.
View/Reply Online (#106160): https://edk2.groups.io/g/devel/message/106160
Mute This Topic: https://groups.io/mt/97576405/1813853
Group Owner: devel+owner at edk2.groups.io
Unsubscribe: https://edk2.groups.io/g/devel/unsub [edk2-devel-archive at redhat.com]
-=-=-=-=-=-=-=-=-=-=-=-




More information about the edk2-devel-archive mailing list