Reviewed-by: Bret Barkelew - Bret ________________________________ From: devel@edk2.groups.io on behalf of Michael Kubacki via groups.io Sent: Monday, April 20, 2020 12:12:14 PM To: devel@edk2.groups.io Cc: Jordan Justen ; Laszlo Ersek ; Ard Biesheuvel Subject: [EXTERNAL] [edk2-devel] [PATCH v2 4/6] OvmfPkg: Add Platform CI and configuration for Core CI From: Sean Brogan REF:https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fbugzilla.tianocore.org%2Fshow_bug.cgi%3Fid%3D2570&data=02%7C01%7Cbret.barkelew%40microsoft.com%7C65b8b6d15c7f432a603108d7e55edbb9%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637230067886270375&sdata=o9bzrzAgNtEoNczkjtAgS6F2EOsl3J07NIaBPJgvVew%3D&reserved=0 Add new Azure Pipeline definitions to build and run OvmfPkg with: * Ubuntu GCC5 * Windows VS2019 Add PyTool based build of OvmfPkg Add extdep for managing the iasl dependency Add OvmfPkg.ci.yaml for Core CI Add README.rst for status, details and instructions Cc: Jordan Justen Cc: Laszlo Ersek Cc: Ard Biesheuvel Signed-off-by: Sean Brogan Signed-off-by: Michael Kubacki --- OvmfPkg/OvmfPkg.ci.yaml | 83 +++++++ OvmfPkg/PlatformCI/.azurepipelines/Ubuntu-GCC5.yml | 133 ++++++++++ OvmfPkg/PlatformCI/.azurepipelines/Windows-VS2019.yml | 138 +++++++++++ OvmfPkg/PlatformCI/PlatformBuild.py | 254 ++++++++++++++++++++ OvmfPkg/PlatformCI/iasl_ext_dep.yaml | 21 ++ OvmfPkg/README.rst | 211 ++++++++++++++++ 6 files changed, 840 insertions(+) diff --git a/OvmfPkg/OvmfPkg.ci.yaml b/OvmfPkg/OvmfPkg.ci.yaml new file mode 100644 index 000000000000..98992f0429ff --- /dev/null +++ b/OvmfPkg/OvmfPkg.ci.yaml @@ -0,0 +1,83 @@ +## @file +# Core CI configuration for OvmfPkg +# +# OvmfPkg is part of Platform Ci for builds so this is only +# used for code analysis. +# +# Copyright (c) Microsoft Corporation +# SPDX-License-Identifier: BSD-2-Clause-Patent +## +{ + ## options defined .pytool/Plugin/CompilerPlugin + "CompilerPlugin": { + "DscPath": "" # Don't support this test + }, + + ## options defined .pytool/Plugin/HostUnitTestCompilerPlugin + "HostUnitTestCompilerPlugin": { + "DscPath": "" # Don't support this test + }, + + ## options defined .pytool/Plugin/CharEncodingCheck + "CharEncodingCheck": { + "IgnoreFiles": [] + }, + + ## options defined .pytool/Plugin/DependencyCheck + "DependencyCheck": { + "AcceptableDependencies": [ + "MdePkg/MdePkg.dec", + "MdeModulePkg/MdeModulePkg.dec", + "OvmfPkg/OvmfPkg.dec", + "NetworkPkg/NetworkPkg.dec", + "SecurityPkg/SecurityPkg.dec", + "UefiCpuPkg/UefiCpuPkg.dec", + "ShellPkg/ShellPkg.dec", + "EmbeddedPkg/EmbeddedPkg.dec", + "SourceLevelDebugPkg/SourceLevelDebugPkg.dec" + ], + # For host based unit tests + "AcceptableDependencies-HOST_APPLICATION":[ + "UnitTestFrameworkPkg/UnitTestFrameworkPkg.dec" + ], + # For UEFI shell based apps + "AcceptableDependencies-UEFI_APPLICATION":[], + "IgnoreInf": [] + }, + + ## options defined .pytool/Plugin/DscCompleteCheck + "DscCompleteCheck": { + "IgnoreInf": [""], + "DscPath": "" # Don't support this test + }, + + ## options defined .pytool/Plugin/HostUnitTestDscCompleteCheck + "HostUnitTestDscCompleteCheck": { + "IgnoreInf": [""], + "DscPath": "" # Don't support this test + }, + + ## options defined .pytool/Plugin/GuidCheck + "GuidCheck": { + "IgnoreGuidName": ["ResetVector", "XenResetVector"], # Expected duplication for gEfiFirmwareVolumeTopFileGuid + "IgnoreGuidValue": [], + "IgnoreFoldersAndFiles": [], + "IgnoreDuplicates": [], + }, + + ## options defined .pytool/Plugin/LibraryClassCheck + "LibraryClassCheck": { + "IgnoreHeaderFile": [] + }, + + ## options defined .pytool/Plugin/SpellCheck + "SpellCheck": { + "AuditOnly": True, # Fails right now with over 270 errors + "IgnoreFiles": [], # use gitignore syntax to ignore errors in matching files + "ExtendWords": [ + + ], # words to extend to the dictionary for this package + "IgnoreStandardPaths": [], # Standard Plugin defined paths that should be ignore + "AdditionalIncludePaths": [] # Additional paths to spell check (wildcards supported) + } +} diff --git a/OvmfPkg/PlatformCI/.azurepipelines/Ubuntu-GCC5.yml b/OvmfPkg/PlatformCI/.azurepipelines/Ubuntu-GCC5.yml new file mode 100644 index 000000000000..a47d273217ab --- /dev/null +++ b/OvmfPkg/PlatformCI/.azurepipelines/Ubuntu-GCC5.yml @@ -0,0 +1,133 @@ +## @file +# Azure Pipeline build file for building a platform. +# +# Platform: OVMF +# OS: Ubuntu +# Toolchain: GCC5 +# +# Copyright (c) Microsoft Corporation. +# SPDX-License-Identifier: BSD-2-Clause-Patent +## +trigger: + - master +pr: + - master + +jobs: + - job: Platform_CI + variables: + package: 'OvmfPkg' + vm_image: 'ubuntu-latest' + should_run: true + run_flags: "MAKE_STARTUP_NSH=TRUE QEMU_HEADLESS=TRUE" + + #Use matrix to speed up the build process + strategy: + matrix: + OVMF_IA32_DEBUG: + Build.File: "$(package)/PlatformCI/PlatformBuild.py" + Build.Arch: "IA32" + Build.Flags: "" + Build.Target: "DEBUG" + Run.Flags: $(run_flags) + Run: $(should_run) + OVMF_IA32_RELEASE: + Build.File: "$(package)/PlatformCI/PlatformBuild.py" + Build.Arch: "IA32" + Build.Flags: "" + Build.Target: "RELEASE" + Run.Flags: $(run_flags) + Run: $(should_run) + OVMF_IA32_NOOPT: + Build.File: "$(package)/PlatformCI/PlatformBuild.py" + Build.Arch: "IA32" + Build.Flags: "" + Build.Target: "NOOPT" + Run.Flags: $(run_flags) + Run: $(should_run) + + OVMF_X64_DEBUG: + Build.File: "$(package)/PlatformCI/PlatformBuild.py" + Build.Arch: "X64" + Build.Flags: "" + Build.Target: "DEBUG" + Run.Flags: $(run_flags) + Run: $(should_run) + OVMF_X64_RELEASE: + Build.File: "$(package)/PlatformCI/PlatformBuild.py" + Build.Arch: "X64" + Build.Flags: "" + Build.Target: "RELEASE" + Run.Flags: $(run_flags) + Run: $(should_run) + OVMF_X64_NOOPT: + Build.File: "$(package)/PlatformCI/PlatformBuild.py" + Build.Arch: "X64" + Build.Flags: "" + Build.Target: "NOOPT" + Run.Flags: $(run_flags) + Run: $(should_run) + + OVMF_IA32X64_DEBUG: + Build.File: "$(package)/PlatformCI/PlatformBuild.py" + Build.Arch: "IA32,X64" + Build.Flags: "" + Build.Target: "DEBUG" + Run.Flags: $(run_flags) + Run: $(should_run) + OVMF_IA32X64_RELEASE: + Build.File: "$(package)/PlatformCI/PlatformBuild.py" + Build.Arch: "IA32,X64" + Build.Flags: "" + Build.Target: "RELEASE" + Run.Flags: $(run_flags) + Run: $(should_run) + OVMF_IA32X64_NOOPT: + Build.File: "$(package)/PlatformCI/PlatformBuild.py" + Build.Arch: "IA32,X64" + Build.Flags: "" + Build.Target: "NOOPT" + Run.Flags: $(run_flags) + Run: $(should_run) + + OVMF_IA32X64_FULL_DEBUG: + Build.File: "$(package)/PlatformCI/PlatformBuild.py" + Build.Arch: "IA32,X64" + Build.Flags: "BLD_*_SECURE_BOOT_ENABLE=1 BLD_*_SMM_REQUIRE=1 BLD_*_TPM_ENABLE=1 BLD_*_TPM_CONFIG_ENABLE=1 BLD_*_NETWORK_TLS_ENABLE=1 BLD_*_NETWORK_IP6_ENABLE=1 BLD_*_NETWORK_HTTP_BOOT_ENABLE=1" + Build.Target: "DEBUG" + Run.Flags: $(run_flags) + Run: $(should_run) + OVMF_IA32X64_FULL_RELEASE: + Build.File: "$(package)/PlatformCI/PlatformBuild.py" + Build.Arch: "IA32,X64" + Build.Flags: "BLD_*_SECURE_BOOT_ENABLE=1 BLD_*_SMM_REQUIRE=1 BLD_*_TPM_ENABLE=1 BLD_*_TPM_CONFIG_ENABLE=1 BLD_*_NETWORK_TLS_ENABLE=1 BLD_*_NETWORK_IP6_ENABLE=1 BLD_*_NETWORK_HTTP_BOOT_ENABLE=1" + Build.Target: "RELEASE" + Run.Flags: $(run_flags) + Run: $(should_run) + OVMF_IA32X64_FULL_NOOPT: + Build.File: "$(package)/PlatformCI/PlatformBuild.py" + Build.Arch: "IA32,X64" + Build.Flags: "BLD_*_SECURE_BOOT_ENABLE=1 BLD_*_SMM_REQUIRE=1 BLD_*_TPM_ENABLE=1 BLD_*_TPM_CONFIG_ENABLE=1 BLD_*_NETWORK_TLS_ENABLE=1 BLD_*_NETWORK_IP6_ENABLE=1 BLD_*_NETWORK_HTTP_BOOT_ENABLE=1" + Build.Target: "NOOPT" + Run.Flags: $(run_flags) + Run: $(should_run) + workspace: + clean: all + + pool: + vmImage: $(vm_image) + + steps: + - template: ../../../.azurepipelines/templates/platform-build-run-steps.yml + parameters: + tool_chain_tag: GCC5 + build_pkg: $(package) + build_target: $(Build.Target) + build_arch: $(Build.Arch) + build_file: $(Build.File) + build_flags: $(Build.Flags) + run_flags: $(Run.Flags) + extra_install_step: + - bash: sudo apt-get install qemu + displayName: Install qemu + condition: and(gt(variables.pkg_count, 0), succeeded()) diff --git a/OvmfPkg/PlatformCI/.azurepipelines/Windows-VS2019.yml b/OvmfPkg/PlatformCI/.azurepipelines/Windows-VS2019.yml new file mode 100644 index 000000000000..02ed233fdb60 --- /dev/null +++ b/OvmfPkg/PlatformCI/.azurepipelines/Windows-VS2019.yml @@ -0,0 +1,138 @@ +## @file +# Azure Pipeline build file for building a platform. +# +# Platform: OVMF +# OS: Windows +# Toolchain: VS2019 +# +# Copyright (c) Microsoft Corporation. +# SPDX-License-Identifier: BSD-2-Clause-Patent +## +trigger: + - master +pr: + - master +jobs: + - job: Platform_CI + variables: + package: 'OvmfPkg' + vm_image: 'windows-latest' + should_run: true + run_flags: "MAKE_STARTUP_NSH=TRUE QEMU_HEADLESS=TRUE" + + #Use matrix to speed up the build process + strategy: + matrix: + OVMF_IA32_DEBUG: + Build.File: "$(package)/PlatformCI/PlatformBuild.py" + Build.Arch: "IA32" + Build.Flags: "" + Build.Target: "DEBUG" + Run.Flags: $(run_flags) + Run: $(should_run) + OVMF_IA32_RELEASE: + Build.File: "$(package)/PlatformCI/PlatformBuild.py" + Build.Arch: "IA32" + Build.Flags: "" + Build.Target: "RELEASE" + Run.Flags: $(run_flags) + Run: $(should_run) + OVMF_IA32_NOOPT: + Build.File: "$(package)/PlatformCI/PlatformBuild.py" + Build.Arch: "IA32" + Build.Flags: "" + Build.Target: "NOOPT" + Run.Flags: $(run_flags) + Run: $(should_run) + + OVMF_X64_DEBUG: + Build.File: "$(package)/PlatformCI/PlatformBuild.py" + Build.Arch: "X64" + Build.Flags: "" + Build.Target: "DEBUG" + Run.Flags: $(run_flags) + Run: $(should_run) + OVMF_X64_RELEASE: + Build.File: "$(package)/PlatformCI/PlatformBuild.py" + Build.Arch: "X64" + Build.Flags: "" + Build.Target: "RELEASE" + Run.Flags: $(run_flags) + Run: $(should_run) + OVMF_X64_NOOPT: + Build.File: "$(package)/PlatformCI/PlatformBuild.py" + Build.Arch: "X64" + Build.Flags: "" + Build.Target: "NOOPT" + Run.Flags: $(run_flags) + Run: $(should_run) + + OVMF_IA32X64_DEBUG: + Build.File: "$(package)/PlatformCI/PlatformBuild.py" + Build.Arch: "IA32,X64" + Build.Flags: "" + Build.Target: "DEBUG" + Run.Flags: $(run_flags) + Run: $(should_run) + OVMF_IA32X64_RELEASE: + Build.File: "$(package)/PlatformCI/PlatformBuild.py" + Build.Arch: "IA32,X64" + Build.Flags: "" + Build.Target: "RELEASE" + Run.Flags: $(run_flags) + Run: $(should_run) + OVMF_IA32X64_NOOPT: + Build.File: "$(package)/PlatformCI/PlatformBuild.py" + Build.Arch: "IA32,X64" + Build.Flags: "" + Build.Target: "NOOPT" + Run.Flags: $(run_flags) + Run: $(should_run) + + OVMF_IA32X64_FULL_DEBUG: + Build.File: "$(package)/PlatformCI/PlatformBuild.py" + Build.Arch: "IA32,X64" + Build.Flags: "BLD_*_SECURE_BOOT_ENABLE=1 BLD_*_SMM_REQUIRE=1 BLD_*_TPM_ENABLE=1 BLD_*_TPM_CONFIG_ENABLE=1 BLD_*_NETWORK_TLS_ENABLE=1 BLD_*_NETWORK_IP6_ENABLE=1 BLD_*_NETWORK_HTTP_BOOT_ENABLE=1" + Build.Target: "DEBUG" + Run.Flags: $(run_flags) + Run: $(should_run) + OVMF_IA32X64_FULL_RELEASE: + Build.File: "$(package)/PlatformCI/PlatformBuild.py" + Build.Arch: "IA32,X64" + Build.Flags: "BLD_*_SECURE_BOOT_ENABLE=1 BLD_*_SMM_REQUIRE=1 BLD_*_TPM_ENABLE=1 BLD_*_TPM_CONFIG_ENABLE=1 BLD_*_NETWORK_TLS_ENABLE=1 BLD_*_NETWORK_IP6_ENABLE=1 BLD_*_NETWORK_HTTP_BOOT_ENABLE=1" + Build.Target: "RELEASE" + Run.Flags: $(run_flags) + Run: $(should_run) + + # This currently creates a very large image which is too big for the FDF declared range + # Ovmf maintainers suggest to skip this build for now. + # + # OVMF_IA32X64_FULL_NOOPT: + # Build.File: "$(package)/PlatformCI/PlatformBuild.py" + # Build.Arch: "IA32,X64" + # Build.Flags: "BLD_*_SECURE_BOOT_ENABLE=1 BLD_*_SMM_REQUIRE=1 BLD_*_TPM_ENABLE=1 BLD_*_TPM_CONFIG_ENABLE=1 BLD_*_NETWORK_TLS_ENABLE=1 BLD_*_NETWORK_IP6_ENABLE=1 BLD_*_NETWORK_HTTP_BOOT_ENABLE=1" + # Build.Target: "NOOPT" + # Run.Flags: $(run_flags) + # Run: $(should_run) + + workspace: + clean: all + + pool: + vmImage: $(vm_image) + + steps: + - template: ../../../.azurepipelines/templates/platform-build-run-steps.yml + parameters: + tool_chain_tag: VS2019 + build_pkg: $(package) + build_target: $(Build.Target) + build_arch: $(Build.Arch) + build_file: $(Build.File) + build_flags: $(Build.Flags) + run_flags: $(Run.Flags) + extra_install_step: + - powershell: choco install qemu; Write-Host "##vso[task.prependpath]c:\Program Files\qemu" + displayName: Install QEMU and Set QEMU on path # friendly name displayed in the UI + condition: and(gt(variables.pkg_count, 0), succeeded()) + diff --git a/OvmfPkg/PlatformCI/PlatformBuild.py b/OvmfPkg/PlatformCI/PlatformBuild.py new file mode 100644 index 000000000000..627bb7b992db --- /dev/null +++ b/OvmfPkg/PlatformCI/PlatformBuild.py @@ -0,0 +1,254 @@ +# @file +# Script to Build OVMF UEFI firmware +# +# Copyright (c) Microsoft Corporation. +# SPDX-License-Identifier: BSD-2-Clause-Patent +## +import os +import logging +import io + +from edk2toolext.environment import shell_environment +from edk2toolext.environment.uefi_build import UefiBuilder +from edk2toolext.invocables.edk2_platform_build import BuildSettingsManager +from edk2toolext.invocables.edk2_setup import SetupSettingsManager, RequiredSubmodule +from edk2toolext.invocables.edk2_update import UpdateSettingsManager +from edk2toolext.invocables.edk2_pr_eval import PrEvalSettingsManager +from edk2toollib.utility_functions import RunCmd + + + # ####################################################################################### # + # Common Configuration # + # ####################################################################################### # +class CommonPlatform(): + ''' Common settings for this platform. Define static data here and use + for the different parts of stuart + ''' + PackagesSupported = ("OvmfPkg",) + ArchSupported = ("IA32", "X64") + TargetsSupported = ("DEBUG", "RELEASE", "NOOPT") + Scopes = ('ovmf', 'edk2-build') + WorkspaceRoot = os.path.realpath(os.path.join( + os.path.dirname(os.path.abspath(__file__)), "..", "..")) + + @classmethod + def GetDscName(cls, ArchCsv: str) -> str: + ''' return the DSC given the architectures requested. + + ArchCsv: csv string containing all architectures to build + ''' + dsc = "OvmfPkg" + if "IA32" in ArchCsv.upper().split(","): + dsc += "Ia32" + if "X64" in ArchCsv.upper().split(","): + dsc += "X64" + dsc += ".dsc" + return dsc + + + # ####################################################################################### # + # Configuration for Update & Setup # + # ####################################################################################### # +class SettingsManager(UpdateSettingsManager, SetupSettingsManager, PrEvalSettingsManager): + + def GetPackagesSupported(self): + ''' return iterable of edk2 packages supported by this build. + These should be edk2 workspace relative paths ''' + return CommonPlatform.PackagesSupported + + def GetArchitecturesSupported(self): + ''' return iterable of edk2 architectures supported by this build ''' + return CommonPlatform.ArchSupported + + def GetTargetsSupported(self): + ''' return iterable of edk2 target tags supported by this build ''' + return CommonPlatform.TargetsSupported + + def GetRequiredSubmodules(self): + ''' return iterable containing RequiredSubmodule objects. + If no RequiredSubmodules return an empty iterable + ''' + rs = [] + + # intentionally declare this one with recursive false to avoid overhead + rs.append(RequiredSubmodule( + "CryptoPkg/Library/OpensslLib/openssl", False)) + + # To avoid maintenance of this file for every new submodule + # lets just parse the .gitmodules and add each if not already in list. + # The GetRequiredSubmodules is designed to allow a build to optimize + # the desired submodules but it isn't necessary for this repository. + result = io.StringIO() + ret = RunCmd("git", "config --file .gitmodules --get-regexp path", workingdir=self.GetWorkspaceRoot(), outstream=result) + # Cmd output is expected to look like: + # submodule.CryptoPkg/Library/OpensslLib/openssl.path CryptoPkg/Library/OpensslLib/openssl + # submodule.SoftFloat.path ArmPkg/Library/ArmSoftFloatLib/berkeley-softfloat-3 + if ret == 0: + for line in result.getvalue().splitlines(): + _, _, path = line.partition(" ") + if path is not None: + if path not in [x.path for x in rs]: + rs.append(RequiredSubmodule(path, True)) # add it with recursive since we don't know + return rs + + def SetArchitectures(self, list_of_requested_architectures): + ''' Confirm the requests architecture list is valid and configure SettingsManager + to run only the requested architectures. + + Raise Exception if a list_of_requested_architectures is not supported + ''' + unsupported = set(list_of_requested_architectures) - set(self.GetArchitecturesSupported()) + if(len(unsupported) > 0): + errorString = ( "Unsupported Architecture Requested: " + " ".join(unsupported)) + logging.critical( errorString ) + raise Exception( errorString ) + self.ActualArchitectures = list_of_requested_architectures + + def GetWorkspaceRoot(self): + ''' get WorkspacePath ''' + return CommonPlatform.WorkspaceRoot + + def GetActiveScopes(self): + ''' return tuple containing scopes that should be active for this process ''' + return CommonPlatform.Scopes + + def FilterPackagesToTest(self, changedFilesList: list, potentialPackagesList: list) -> list: + ''' Filter other cases that this package should be built + based on changed files. This should cover things that can't + be detected as dependencies. ''' + build_these_packages = [] + possible_packages = potentialPackagesList.copy() + for f in changedFilesList: + # BaseTools files that might change the build + if "BaseTools" in f: + if os.path.splitext(f) not in [".txt", ".md"]: + build_these_packages = possible_packages + break + + # if the azure pipeline platform template file changed + if "platform-build-run-steps.yml" in f: + build_these_packages = possible_packages + break + + return build_these_packages + + def GetPlatformDscAndConfig(self) -> tuple: + ''' If a platform desires to provide its DSC then Policy 4 will evaluate if + any of the changes will be built in the dsc. + + The tuple should be (, ) + ''' + dsc = CommonPlatform.GetDscName(",".join(self.ActualArchitectures)) + return (f"OvmfPkg/{dsc}", {}) + + + # ####################################################################################### # + # Actual Configuration for Platform Build # + # ####################################################################################### # +class PlatformBuilder( UefiBuilder, BuildSettingsManager): + def __init__(self): + UefiBuilder.__init__(self) + + def AddCommandLineOptions(self, parserObj): + ''' Add command line options to the argparser ''' + parserObj.add_argument('-a', "--arch", dest="build_arch", type=str, default="IA32,X64", + help="Optional - CSV of architecture to build. IA32 will use IA32 for Pei & Dxe. " + "X64 will use X64 for both PEI and DXE. IA32,X64 will use IA32 for PEI and " + "X64 for DXE. default is IA32,X64") + + def RetrieveCommandLineOptions(self, args): + ''' Retrieve command line options from the argparser ''' + + shell_environment.GetBuildVars().SetValue("TARGET_ARCH"," ".join(args.build_arch.upper().split(",")), "From CmdLine") + dsc = CommonPlatform.GetDscName(args.build_arch) + shell_environment.GetBuildVars().SetValue("ACTIVE_PLATFORM", f"OvmfPkg/{dsc}", "From CmdLine") + + def GetWorkspaceRoot(self): + ''' get WorkspacePath ''' + return CommonPlatform.WorkspaceRoot + + def GetPackagesPath(self): + ''' Return a list of workspace relative paths that should be mapped as edk2 PackagesPath ''' + return () + + def GetActiveScopes(self): + ''' return tuple containing scopes that should be active for this process ''' + return CommonPlatform.Scopes + + def GetName(self): + ''' Get the name of the repo, platform, or product being build ''' + ''' Used for naming the log file, among others ''' + # check the startup nsh flag and if set then rename the log file. + # this helps in CI so we don't overwrite the build log since running + # uses the stuart_build command. + if(shell_environment.GetBuildVars().GetValue("MAKE_STARTUP_NSH", "FALSE") == "TRUE"): + return "OvmfPkg_With_Run" + return "OvmfPkg" + + def GetLoggingLevel(self, loggerType): + ''' Get the logging level for a given type + base == lowest logging level supported + con == Screen logging + txt == plain text file logging + md == markdown file logging + ''' + return logging.DEBUG + + def SetPlatformEnv(self): + logging.debug("PlatformBuilder SetPlatformEnv") + self.env.SetValue("PRODUCT_NAME", "OVMF", "Platform Hardcoded") + self.env.SetValue("MAKE_STARTUP_NSH", "FALSE", "Default to false") + self.env.SetValue("QEMU_HEADLESS", "FALSE", "Default to false") + return 0 + + def PlatformPreBuild(self): + return 0 + + def PlatformPostBuild(self): + return 0 + + def FlashRomImage(self): + VirtualDrive = os.path.join(self.env.GetValue("BUILD_OUTPUT_BASE"), "VirtualDrive") + os.makedirs(VirtualDrive, exist_ok=True) + OutputPath_FV = os.path.join(self.env.GetValue("BUILD_OUTPUT_BASE"), "FV") + + # + # QEMU must be on the path + # + cmd = "qemu-system-x86_64" + args = "-debugcon stdio" # write messages to stdio + args += " -global isa-debugcon.iobase=0x402" # debug messages out thru virtual io port + args += " -net none" # turn off network + args += f" -drive file=fat:rw:{VirtualDrive},format=raw,media=disk" # Mount disk with startup.nsh + + if (self.env.GetValue("QEMU_HEADLESS").upper() == "TRUE"): + args += " -display none" # no graphics + + if (self.env.GetBuildValue("SMM_REQUIRE") == "1"): + args += " -machine q35,smm=on" #,accel=(tcg|kvm)" + #args += " -m ..." + #args += " -smp ..." + args += " -global driver=cfi.pflash01,property=secure,value=on" + args += " -drive if=pflash,format=raw,unit=0,file=" + os.path.join(OutputPath_FV, "OVMF_CODE.fd") + ",readonly=on" + args += " -drive if=pflash,format=raw,unit=1,file=" + os.path.join(OutputPath_FV, "OVMF_VARS.fd") + else: + args += " -pflash " + os.path.join(OutputPath_FV, "OVMF.fd") # path to firmware + + + if (self.env.GetValue("MAKE_STARTUP_NSH").upper() == "TRUE"): + f = open(os.path.join(VirtualDrive, "startup.nsh"), "w") + f.write("BOOT SUCCESS !!! \n") + ## add commands here + f.write("reset -s\n") + f.close() + + ret = RunCmd(cmd, args) + + if ret == 0xc0000005: + #for some reason getting a c0000005 on successful return + return 0 + + return ret + + + diff --git a/OvmfPkg/PlatformCI/iasl_ext_dep.yaml b/OvmfPkg/PlatformCI/iasl_ext_dep.yaml new file mode 100644 index 000000000000..cbee0e5a5a92 --- /dev/null +++ b/OvmfPkg/PlatformCI/iasl_ext_dep.yaml @@ -0,0 +1,21 @@ +## @file +# Download iasl executable tool from a nuget.org package +# - package contains different binaries based on host +# Add the folder with the tool to the path +# +# This is only downloaded for scope ovmf thus +# should have no impact on the asl compiler used by any +# other given platform to build. +# +# Copyright (c) Microsoft Corporation. +# SPDX-License-Identifier: BSD-2-Clause-Patent +## +{ + "id": "iasl-ovmf-1", + "scope": "ovmf", + "type": "nuget", + "name": "iasl", + "source": "https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fapi.nuget.org%2Fv3%2Findex.json&data=02%7C01%7Cbret.barkelew%40microsoft.com%7C65b8b6d15c7f432a603108d7e55edbb9%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637230067886270375&sdata=QdUtNmDSJrCc0JwfLV3c0YYZhpV%2FMjW8U3C%2BJSxuZjg%3D&reserved=0", + "version": "20190215.0.0", + "flags": ["set_path", "host_specific"], +} diff --git a/OvmfPkg/README.rst b/OvmfPkg/README.rst new file mode 100644 index 000000000000..926e0f7d7f8d --- /dev/null +++ b/OvmfPkg/README.rst @@ -0,0 +1,211 @@ +======= +OvmfPkg +======= + +This README.rst summarizes the current state of Azure DevOps Platform CI +for OvmfPkg. It also describes how to *build* OvmfPkg locally using the +Pytools build system. For general documentation on OvmfPkg, refer +to the `README <./README>`_. + +Platform CI Current Status +--------------------------- + +IA32 Configuration +`````````````````` +=============== ============= ============= ============= + Toolchain DEBUG RELEASE NOOPT +=============== ============= ============= ============= +`Win VS2019`_ |ap32d| |ap32r| |ap32n| +`Ubuntu GCC5`_ |ap32du| |ap32ru| |ap32nu| +=============== ============= ============= ============= + +X64 Configuration +````````````````` +=============== ============= ============= ============= + Toolchain DEBUG RELEASE NOOPT +=============== ============= ============= ============= +`Win VS2019`_ |ap64d| |ap64r| |ap64n| +`Ubuntu GCC5`_ |ap64du| |ap64ru| |ap64nu| +=============== ============= ============= ============= + +IA32X64 Configuration +````````````````````` +PEI phase is 32-bit while DXE phase is 64-bit + +=============== ============= ============= ============= + Toolchain DEBUG RELEASE NOOPT +=============== ============= ============= ============= +`Win VS2019`_ |ap3264d| |ap3264r| |ap3264n| +`Ubuntu GCC5`_ |ap3264du| |ap3264ru| |ap3264nu| +=============== ============= ============= ============= + + +IA32X64 FULL Configuration +`````````````````````````` +PEI phase is 32-bit while DXE phase is 64-bit + +Additional Build flags: + * SECURE_BOOT_ENABLE=1 + * SMM_REQUIRE=1 + * TPM_ENABLE=1 + * TPM_CONFIG_ENABLE=1 + * NETWORK_TLS_ENABLE=1 + * NETWORK_IP6_ENABLE=1 + * NETWORK_HTTP_BOOT_ENABLE=1 + +=============== ============= ============= ============= + Toolchain DEBUG RELEASE NOOPT +=============== ============= ============= ============= +`Win VS2019`_ |ap3264fd| |ap3264fr| |ap3264fn| +`Ubuntu GCC5`_ |ap3264fdu| |ap3264fru| |ap3264fru| +=============== ============= ============= ============= + +Setup +----- + +The Usual EDK2 Build Setup +`````````````````````````` + +- `Python 3.8.x - Download & Install `_ +- `GIT - Download & Install `_ +- `GIT - Configure for EDK II `_ +- `QEMU - Download, Install, and add to your path `_ +- `EDKII Source - Download/Checkout from Github `_ + +**NOTE:** Do *not* follow the EDK II Compile Tools and Build instructions, see below... + +Differences from EDK Classic Build Setup +```````````````````````````````````````` + +- Build BaseTools using `python BaseTools/Edk2ToolsBuild.py [-t ]` + + - This replaces `edksetup Rebuild`" from the classic build system + - For Windows `` examples, refer to `Windows ToolChain Matrix `_, + defaults to `VS2017` if not specified + +- **No Action:** edksetup, Submodule initialization and manual setup of NASM and iASL are **not** required, it is handled by the Pytools build system + +Install & Configure Pytools for OvmfPkg +``````````````````````````````````````` + +* Install Pytools + + .. code-block:: bash + + pip install --upgrade -r pip-requirements.txt + +* Initialize & Update Submodules + + .. code-block:: bash + + stuart_setup -c OvmfPkg/PlatformCI/PlatformBuild.py + +* Initialize & Update Dependencies (e.g. iASL & NASM) + + .. code-block:: bash + + stuart_update -c OvmfPkg/PlatformCI/PlatformBuild.py + +Building +-------- + +OVMF has `3 versions `_. +To build them using Pytools: + +First set the `TOOL_CHAIN_TAG` via environment variable, Conf/target.txt, or pass it on the command-lines below using `TOOL_CHAIN_TAG=` syntax. + +===================== =============== +Platform Commandline +===================== =============== +OvmfPkgIa32X64.dsc `stuart_build -c OvmfPkg/PlatformCI/PlatformBuild.py [TOOL_CHAIN_TAG=]` |br| `stuart_build -c OvmfPkg/PlatformCI/PlatformBuild.py -a IA32,X64 [TOOL_CHAIN_TAG=]` +OvmfPkgIa32.dsc `stuart_build -c OvmfPkg/PlatformCI/PlatformBuild.py -a IA32 [TOOL_CHAIN_TAG=]` +OvmfPkgX64.dsc `stuart_build -c OvmfPkg/PlatformCI/PlatformBuild.py -a X64 [TOOL_CHAIN_TAG=]` +===================== =============== + +**NOTE:** configuring ACTIVE_PLATFORM and TARGET_ARCH in Conf/target.txt is **not** required. This environment +is set by PlatformBuild.py based upon the `[-a ]` parameter. + +Custom Build Options +```````````````````` + +**MAKE_STARTUP_NSH=TRUE** will output a *startup.nsh* file to the location mapped as fs0. This is used in CI in +combination with the `--FlashOnly` feature to run QEMU to the UEFI shell and then execute the contents of startup.nsh. + +**QEMU_HEADLESS=TRUE** Since CI servers run headless QEMU must be told to run with no display otherwise an error +occurs. Locally you don't need to set this. + +Passing Build Defines +````````````````````` +To pass build defines through stuart_build, prepend `BLD_*_` to the define name and pass it on the command-line. +stuart_build currently requires values to be assigned, so add a `=1` suffix for bare defines. +For example, to enable the Intel E1000 NIC, instead of the traditional "-D E1000_ENABLE", the stuart_build +command-line would be: + +.. code-block:: bash + + stuart_build -c OvmfPkg/PlatformCI/PlatformBuild.py BLD_*_E1000_ENABLE=1 + +Running QEMU Emulator +--------------------- + +QEMU can be automatically launched using stuart_build. This makes path management and quick verification easy. +QEMU must be added to your path. On Windows this is a manual process and not part of the QEMU installer. + +1. To run as part of the build but after building add the `--FlashRom` parameter. +2. To run after the build process standalone use your build command mentioned above plus `--FlashOnly`. + +**NOTE:** Logging the execution output will be in the normal stuart log as well as to your console. + +References +---------- +- `Installing Pytools `_ +- For each workspace, consider creating & using a `Python Virtual Environment `_ + + * `Sample Layout `_ + +- `stuart_build commandline parser `_ + + + + +.. =================================================================== +.. This is a bunch of directives to make the README file more readable +.. =================================================================== +.. role:: raw-html(raw) + :format: html + +.. _Bugzilla 2661: https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fbugzilla.tianocore.org%2Fshow_bug.cgi%3Fid%3D2661&data=02%7C01%7Cbret.barkelew%40microsoft.com%7C65b8b6d15c7f432a603108d7e55edbb9%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637230067886280331&sdata=uMy2xprjL5gcSs9NC%2FnwrffumV3RmQzfKzlsRzUHhN8%3D&reserved=0 + +.. _Win VS2019: https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdev.azure.com%2Ftianocore%2Fedk2-ci-play%2F_build%2Flatest%3FdefinitionId%3D38%26branchName%3Dmaster%2F&data=02%7C01%7Cbret.barkelew%40microsoft.com%7C65b8b6d15c7f432a603108d7e55edbb9%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637230067886280331&sdata=ZsVOT2rFeQhJfbdzg8K3ot7Ooh%2BwQkH6XvDBdT1PfTY%3D&reserved=0 +.. _Ubuntu GCC5: https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdev.azure.com%2Ftianocore%2Fedk2-ci-play%2F_build%2Flatest%3FdefinitionId%3D37%26branchName%3Dmaster&data=02%7C01%7Cbret.barkelew%40microsoft.com%7C65b8b6d15c7f432a603108d7e55edbb9%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637230067886280331&sdata=7vI3ytuEhSzyJ24ZyaxAH9d4Br9HnDUV2ql49k6knrU%3D&reserved=0 + +.. |ap32d| image:: https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdev.azure.com%2Ftianocore%2Fedk2-ci-play%2F_apis%2Fbuild%2Fstatus%2FOVMF%2FOVMF%2520Windows%2520VS2019%3FbranchName%3Dmaster%26jobName%3DPlatform_CI%26configuration%3DPlatform_CI%2520OVMF_IA32_DEBUG&data=02%7C01%7Cbret.barkelew%40microsoft.com%7C65b8b6d15c7f432a603108d7e55edbb9%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637230067886280331&sdata=VezJlKAAYKvAgSMOiYxj4odO5rzGDxZHhfGFhR7KLHw%3D&reserved=0 +.. |ap32du| image:: https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdev.azure.com%2Ftianocore%2Fedk2-ci-play%2F_apis%2Fbuild%2Fstatus%2FOVMF%2FOVMF%2520Ubuntu%2520GCC5%3FbranchName%3Dmaster%26jobName%3DPlatform_CI%26configuration%3DPlatform_CI%2520OVMF_IA32_DEBUG&data=02%7C01%7Cbret.barkelew%40microsoft.com%7C65b8b6d15c7f432a603108d7e55edbb9%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637230067886280331&sdata=bEeR62FvQePMo6ZevGHajSWX0g2vwJj97gGDxw%2Bz9eE%3D&reserved=0 +.. |ap32r| image:: https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdev.azure.com%2Ftianocore%2Fedk2-ci-play%2F_apis%2Fbuild%2Fstatus%2FOVMF%2FOVMF%2520Windows%2520VS2019%3FbranchName%3Dmaster%26jobName%3DPlatform_CI%26configuration%3DPlatform_CI%2520OVMF_IA32_RELEASE&data=02%7C01%7Cbret.barkelew%40microsoft.com%7C65b8b6d15c7f432a603108d7e55edbb9%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637230067886280331&sdata=VAy9LXyH0R75TgavVg6z3MK8ys0MhQA2fC%2Bsts2DqIg%3D&reserved=0 +.. |ap32ru| image:: https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdev.azure.com%2Ftianocore%2Fedk2-ci-play%2F_apis%2Fbuild%2Fstatus%2FOVMF%2FOVMF%2520Ubuntu%2520GCC5%3FbranchName%3Dmaster%26jobName%3DPlatform_CI%26configuration%3DPlatform_CI%2520OVMF_IA32_RELEASE&data=02%7C01%7Cbret.barkelew%40microsoft.com%7C65b8b6d15c7f432a603108d7e55edbb9%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637230067886280331&sdata=6CfdAyRFv1PX%2B3pEaUAaaLUSgWw2wTyDKcU2GSF5IJE%3D&reserved=0 +.. |ap32n| image:: https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdev.azure.com%2Ftianocore%2Fedk2-ci-play%2F_apis%2Fbuild%2Fstatus%2FOVMF%2FOVMF%2520Windows%2520VS2019%3FbranchName%3Dmaster%26jobName%3DPlatform_CI%26configuration%3DPlatform_CI%2520OVMF_IA32_NOOPT&data=02%7C01%7Cbret.barkelew%40microsoft.com%7C65b8b6d15c7f432a603108d7e55edbb9%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637230067886280331&sdata=l6f3jyjtKbNeATzpW5MLH3fUMYRpBNzGGDcHZOXF8oI%3D&reserved=0 +.. |ap32nu| image:: https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdev.azure.com%2Ftianocore%2Fedk2-ci-play%2F_apis%2Fbuild%2Fstatus%2FOVMF%2FOVMF%2520Ubuntu%2520GCC5%3FbranchName%3Dmaster%26jobName%3DPlatform_CI%26configuration%3DPlatform_CI%2520OVMF_IA32_NOOPT&data=02%7C01%7Cbret.barkelew%40microsoft.com%7C65b8b6d15c7f432a603108d7e55edbb9%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637230067886280331&sdata=BlFW8gd7voq9V6ZBHFStHX2%2B8tsH05NMTM4La%2BFMA7U%3D&reserved=0 + +.. |ap64d| image:: https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdev.azure.com%2Ftianocore%2Fedk2-ci-play%2F_apis%2Fbuild%2Fstatus%2FOVMF%2FOVMF%2520Windows%2520VS2019%3FbranchName%3Dmaster%26jobName%3DPlatform_CI%26configuration%3DPlatform_CI%2520OVMF_X64_DEBUG&data=02%7C01%7Cbret.barkelew%40microsoft.com%7C65b8b6d15c7f432a603108d7e55edbb9%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637230067886290287&sdata=W0ikoZbzYBhbTDT1aLM%2FAKOkOZwM2%2BWjPSwpytoah%2Fs%3D&reserved=0 +.. |ap64du| image:: https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdev.azure.com%2Ftianocore%2Fedk2-ci-play%2F_apis%2Fbuild%2Fstatus%2FOVMF%2FOVMF%2520Ubuntu%2520GCC5%3FbranchName%3Dmaster%26jobName%3DPlatform_CI%26configuration%3DPlatform_CI%2520OVMF_X64_DEBUG&data=02%7C01%7Cbret.barkelew%40microsoft.com%7C65b8b6d15c7f432a603108d7e55edbb9%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637230067886290287&sdata=Fh0yOqPV87Uf%2FaaNmIKqHfTbhSzZXZJC4aWziHkWMy8%3D&reserved=0 +.. |ap64r| image:: https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdev.azure.com%2Ftianocore%2Fedk2-ci-play%2F_apis%2Fbuild%2Fstatus%2FOVMF%2FOVMF%2520Windows%2520VS2019%3FbranchName%3Dmaster%26jobName%3DPlatform_CI%26configuration%3DPlatform_CI%2520OVMF_X64_RELEASE&data=02%7C01%7Cbret.barkelew%40microsoft.com%7C65b8b6d15c7f432a603108d7e55edbb9%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637230067886290287&sdata=3LYcbNMo7BiGBGreA1NJbtJwksXEB88wkb2fXuX75fI%3D&reserved=0 +.. |ap64ru| image:: https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdev.azure.com%2Ftianocore%2Fedk2-ci-play%2F_apis%2Fbuild%2Fstatus%2FOVMF%2FOVMF%2520Ubuntu%2520GCC5%3FbranchName%3Dmaster%26jobName%3DPlatform_CI%26configuration%3DPlatform_CI%2520OVMF_X64_RELEASE&data=02%7C01%7Cbret.barkelew%40microsoft.com%7C65b8b6d15c7f432a603108d7e55edbb9%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637230067886290287&sdata=ZNggPKnlEmzG9kpBv0jE%2FqSdPuEn5p7p1N97jysotQg%3D&reserved=0 +.. |ap64n| image:: https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdev.azure.com%2Ftianocore%2Fedk2-ci-play%2F_apis%2Fbuild%2Fstatus%2FOVMF%2FOVMF%2520Windows%2520VS2019%3FbranchName%3Dmaster%26jobName%3DPlatform_CI%26configuration%3DPlatform_CI%2520OVMF_X64_NOOPT&data=02%7C01%7Cbret.barkelew%40microsoft.com%7C65b8b6d15c7f432a603108d7e55edbb9%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637230067886290287&sdata=xicm5tRW0D2xQfv%2BJUdI6N%2B9qlYvACVGBgD5zxZjS1Q%3D&reserved=0 +.. |ap64nu| image:: https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdev.azure.com%2Ftianocore%2Fedk2-ci-play%2F_apis%2Fbuild%2Fstatus%2FOVMF%2FOVMF%2520Ubuntu%2520GCC5%3FbranchName%3Dmaster%26jobName%3DPlatform_CI%26configuration%3DPlatform_CI%2520OVMF_X64_NOOPT&data=02%7C01%7Cbret.barkelew%40microsoft.com%7C65b8b6d15c7f432a603108d7e55edbb9%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637230067886290287&sdata=sL2jMaBDeLk2QEHfL61khUpfl4wjbnnsOM%2FFiJYpijk%3D&reserved=0 + + +.. |ap3264d| image:: https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdev.azure.com%2Ftianocore%2Fedk2-ci-play%2F_apis%2Fbuild%2Fstatus%2FOVMF%2FOVMF%2520Windows%2520VS2019%3FbranchName%3Dmaster%26jobName%3DPlatform_CI%26configuration%3DPlatform_CI%2520OVMF_IA32X64_DEBUG&data=02%7C01%7Cbret.barkelew%40microsoft.com%7C65b8b6d15c7f432a603108d7e55edbb9%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637230067886290287&sdata=IbElDszvh%2FuYu1a%2FJBguHGIIu5ox0Pa%2Fh%2FdidHdp8g0%3D&reserved=0 +.. |ap3264du| image:: https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdev.azure.com%2Ftianocore%2Fedk2-ci-play%2F_apis%2Fbuild%2Fstatus%2FOVMF%2FOVMF%2520Ubuntu%2520GCC5%3FbranchName%3Dmaster%26jobName%3DPlatform_CI%26configuration%3DPlatform_CI%2520OVMF_IA32X64_DEBUG&data=02%7C01%7Cbret.barkelew%40microsoft.com%7C65b8b6d15c7f432a603108d7e55edbb9%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637230067886290287&sdata=QcHGE1NKDZ%2F7DL44kJ5BTWpBcMIJLYHk41r4VD9gblU%3D&reserved=0 +.. |ap3264r| image:: https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdev.azure.com%2Ftianocore%2Fedk2-ci-play%2F_apis%2Fbuild%2Fstatus%2FOVMF%2FOVMF%2520Windows%2520VS2019%3FbranchName%3Dmaster%26jobName%3DPlatform_CI%26configuration%3DPlatform_CI%2520OVMF_IA32X64_RELEASE&data=02%7C01%7Cbret.barkelew%40microsoft.com%7C65b8b6d15c7f432a603108d7e55edbb9%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637230067886290287&sdata=EInMEA4FmN20iq4iYggu4YV8%2BkKVK4dw%2FuqD4%2B1aQkU%3D&reserved=0 +.. |ap3264ru| image:: https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdev.azure.com%2Ftianocore%2Fedk2-ci-play%2F_apis%2Fbuild%2Fstatus%2FOVMF%2FOVMF%2520Ubuntu%2520GCC5%3FbranchName%3Dmaster%26jobName%3DPlatform_CI%26configuration%3DPlatform_CI%2520OVMF_IA32X64_RELEASE&data=02%7C01%7Cbret.barkelew%40microsoft.com%7C65b8b6d15c7f432a603108d7e55edbb9%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637230067886290287&sdata=pvBls59ZcFWZyD88bn4PvpT6RMArdqYAk3Q%2FRnR51Ro%3D&reserved=0 +.. |ap3264n| image:: https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdev.azure.com%2Ftianocore%2Fedk2-ci-play%2F_apis%2Fbuild%2Fstatus%2FOVMF%2FOVMF%2520Windows%2520VS2019%3FbranchName%3Dmaster%26jobName%3DPlatform_CI%26configuration%3DPlatform_CI%2520OVMF_IA32X64_NOOPT&data=02%7C01%7Cbret.barkelew%40microsoft.com%7C65b8b6d15c7f432a603108d7e55edbb9%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637230067886290287&sdata=8quyJSMtcpxkrL3aDuGo5UyfHP0cJYDMtfuzR3xmhaU%3D&reserved=0 +.. |ap3264nu| image:: https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdev.azure.com%2Ftianocore%2Fedk2-ci-play%2F_apis%2Fbuild%2Fstatus%2FOVMF%2FOVMF%2520Ubuntu%2520GCC5%3FbranchName%3Dmaster%26jobName%3DPlatform_CI%26configuration%3DPlatform_CI%2520OVMF_IA32X64_NOOPT&data=02%7C01%7Cbret.barkelew%40microsoft.com%7C65b8b6d15c7f432a603108d7e55edbb9%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637230067886290287&sdata=ICaiYJG1JTXewiv5vcw5801u3asvnEDKXg2DcPsHmt8%3D&reserved=0 + +.. |ap3264fd| image:: https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdev.azure.com%2Ftianocore%2Fedk2-ci-play%2F_apis%2Fbuild%2Fstatus%2FOVMF%2FOVMF%2520Windows%2520VS2019%3FbranchName%3Dmaster%26jobName%3DPlatform_CI%26configuration%3DPlatform_CI%2520OVMF_IA32X64_FULL_DEBUG&data=02%7C01%7Cbret.barkelew%40microsoft.com%7C65b8b6d15c7f432a603108d7e55edbb9%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637230067886290287&sdata=cI36u7Pbtn6l7SWQilTeZJciBQJ4wgcz9CNhSk9kX7g%3D&reserved=0 +.. |ap3264fdu| image:: https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdev.azure.com%2Ftianocore%2Fedk2-ci-play%2F_apis%2Fbuild%2Fstatus%2FOVMF%2FOVMF%2520Ubuntu%2520GCC5%3FbranchName%3Dmaster%26jobName%3DPlatform_CI%26configuration%3DPlatform_CI%2520OVMF_IA32X64_FULL_DEBUG&data=02%7C01%7Cbret.barkelew%40microsoft.com%7C65b8b6d15c7f432a603108d7e55edbb9%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637230067886290287&sdata=sdu7m75D3KS3LjmJ8wzKcPpgZY%2B%2BGmFvQpemdU3gi8Q%3D&reserved=0 +.. |ap3264fr| image:: https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdev.azure.com%2Ftianocore%2Fedk2-ci-play%2F_apis%2Fbuild%2Fstatus%2FOVMF%2FOVMF%2520Windows%2520VS2019%3FbranchName%3Dmaster%26jobName%3DPlatform_CI%26configuration%3DPlatform_CI%2520OVMF_IA32X64_FULL_RELEASE&data=02%7C01%7Cbret.barkelew%40microsoft.com%7C65b8b6d15c7f432a603108d7e55edbb9%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637230067886290287&sdata=WmsgrgrRE%2Bgj%2F%2FyZ%2FoerLsjteN6YxaWzqanQWTbHtJ8%3D&reserved=0 +.. |ap3264fru| image:: https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdev.azure.com%2Ftianocore%2Fedk2-ci-play%2F_apis%2Fbuild%2Fstatus%2FOVMF%2FOVMF%2520Ubuntu%2520GCC5%3FbranchName%3Dmaster%26jobName%3DPlatform_CI%26configuration%3DPlatform_CI%2520OVMF_IA32X64_FULL_RELEASE&data=02%7C01%7Cbret.barkelew%40microsoft.com%7C65b8b6d15c7f432a603108d7e55edbb9%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637230067886290287&sdata=sIRFirFSFm0kNPSLMgk0g2pMRV75IOyHEYJ4ybJv5l0%3D&reserved=0 +.. |ap3264fn| replace:: Fails - Wontfix - `Bugzilla 2661`_ +.. |ap3264fnu| image:: https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdev.azure.com%2Ftianocore%2Fedk2-ci-play%2F_apis%2Fbuild%2Fstatus%2FOVMF%2FOVMF%2520Ubuntu%2520GCC5%3FbranchName%3Dmaster%26jobName%3DPlatform_CI%26configuration%3DPlatform_CI%2520OVMF_IA32X64_FULL_NOOPT&data=02%7C01%7Cbret.barkelew%40microsoft.com%7C65b8b6d15c7f432a603108d7e55edbb9%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637230067886290287&sdata=D0oT%2FpwwgCxlVKP%2Bix9WJlhfwKFQEfVDNaw4e%2BZRJF8%3D&reserved=0 + +.. |br| replace:: :raw-html:`
` -- 2.16.3.windows.1