[edk2-devel] [PATCH 01/22] CryptoPkg/openssl: update submodule to openssl-3.0.8
Li, Yi
yi1.li at intel.com
Mon Jun 19 08:37:56 UTC 2023
Right. We already skipped this build with VS2019, I tend to skip the GCC NOOPT build also.
https://edk2.groups.io/g/devel/topic/99477984#106001
Regards,
Yi
-----Original Message-----
From: kraxel at redhat.com <kraxel at redhat.com>
Sent: Monday, June 19, 2023 4:12 PM
To: Yao, Jiewen <jiewen.yao at intel.com>
Cc: Ard Biesheuvel <ardb at kernel.org>; devel at edk2.groups.io; Li, Yi1 <yi1.li at intel.com>; Wang, Jian J <jian.j.wang at intel.com>; Pawel Polawski <ppolawsk at redhat.com>; Lu, Xiaoyu1 <xiaoyu1.lu at intel.com>; Jiang, Guomin <guomin.jiang at intel.com>; Oliver Steffen <osteffen at redhat.com>; Justen, Jordan L <jordan.l.justen at intel.com>
Subject: Re: [edk2-devel] [PATCH 01/22] CryptoPkg/openssl: update submodule to openssl-3.0.8
On Fri, Jun 02, 2023 at 02:29:11PM +0000, Yao, Jiewen wrote:
> Thanks Ard. That is good news.
> We may try the patch to see if that will break X86.
>
> Current blocking issue seems IA32 intrinsic and OVMF size. I am not sure if Gerd has any idea on that.
Size is NOOPT only I guess? Problem is the effect of LTO is limited with optimization turned off. So building openssllib with moderate optimizations (-O1) is one option (works for gcc). Or just skip the NOOPT test builds in case openssl is included.
take care,
Gerd
-=-=-=-=-=-=-=-=-=-=-=-
Groups.io Links: You receive all messages sent to this group.
View/Reply Online (#106160): https://edk2.groups.io/g/devel/message/106160
Mute This Topic: https://groups.io/mt/97576405/1813853
Group Owner: devel+owner at edk2.groups.io
Unsubscribe: https://edk2.groups.io/g/devel/unsub [edk2-devel-archive at redhat.com]
-=-=-=-=-=-=-=-=-=-=-=-
More information about the edk2-devel-archive
mailing list