From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from NAM10-DM6-obe.outbound.protection.outlook.com (NAM10-DM6-obe.outbound.protection.outlook.com [40.107.93.102]) by mx.groups.io with SMTP id smtpd.web11.329.1587759727296127099 for ; Fri, 24 Apr 2020 13:22:07 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@microsoft.com header.s=selector2 header.b=Jy9rJeyO; spf=pass (domain: microsoft.com, ip: 40.107.93.102, mailfrom: bret.barkelew@microsoft.com) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=SjAbFnAxXv1/4zzj4kaZuStSf8VZgfdTXv65d65Gx1HbZ2qEs/24Us3QcEs8dwucxtnLTa2yK+GRzKfPhuH2VWcY5xerxj+3Iou+I5LcQvPyiyKruBTEy5ZfrT6N5jOkc5YEO43yuZLovyaTnMteuj/S4pj+uUp1oGbseLSLmGNskZJGC8SF2ZOoP+AunEuGOwsVDhBj+waz5aqqIrjnz4M9Veefa+P3/8glyOVIqvnOGO9+0Zbmee7pcMcglMBU829MtEBPB0euR6xwjgpe0wVo3kKYyjh9DlFmNtv/d/MWLsxMngZcto1q1LqS19CC9xjEUxeSEQK0HRQ6drX1Xg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=QxO/eRjnd7/ZPoxveoCelFNWLpvw3WbcUFwpL912/9E=; b=FEFqN1P72AwRS01pkssBtMbJHqM+ZHQowKGhfPYYTXax4sYYDRegeehM6j7q70bIg9dsSPPbxZpcbK3c1G/c15b2S5e8GZS+Dwy68pFET2Hhd/DdCZE9OafcADg0ZKgXf4AQcnmQR2tRv8Nr9W+vFt6B2FErmzgxN/M/JZUOzW01yuAa+xjfp3brB0+TiniuE3oy2LtXbbiZLk9vATbeYGsuFRxSpRTAmTcoTBJXoOglwXJ7iEsLVQg52vrIlAv26hd8HGxizI4EDkUpy4D+WA8+YyJxvvuu4Bh0dtYDTKCYft9W/mbTRHWPak1T8+CjaSi+TpVpoGISm2jDnlK8pg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=microsoft.com; dmarc=pass action=none header.from=microsoft.com; dkim=pass header.d=microsoft.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=QxO/eRjnd7/ZPoxveoCelFNWLpvw3WbcUFwpL912/9E=; b=Jy9rJeyOm73ANS9OaNzxllvpQTVu+tduJJS75VfU542cv4hLT93AY/DGtu4jlbWlW5uz18q3VvqOMhMV52tb870YQ9FdtRTTQu45Mk8L2EdVFcUjWSQfYv4XLf+6OZJj52yPwyfHtvBfJDz16WVcALb6u9bYY3FR2kMx3j3wu7Q= Received: from CY4PR21MB0743.namprd21.prod.outlook.com (2603:10b6:903:b2::9) by CY4PR21MB1538.namprd21.prod.outlook.com (2603:10b6:910:8f::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2958.2; Fri, 24 Apr 2020 20:22:05 +0000 Received: from CY4PR21MB0743.namprd21.prod.outlook.com ([fe80::90d:10d9:c5bc:5318]) by CY4PR21MB0743.namprd21.prod.outlook.com ([fe80::90d:10d9:c5bc:5318%12]) with mapi id 15.20.2958.010; Fri, 24 Apr 2020 20:22:04 +0000 From: "Bret Barkelew" To: "devel@edk2.groups.io" , "michael.kubacki@outlook.com" CC: Jordan Justen , Laszlo Ersek , Ard Biesheuvel Subject: Re: [EXTERNAL] [edk2-devel] [PATCH v2 4/6] OvmfPkg: Add Platform CI and configuration for Core CI Thread-Topic: [EXTERNAL] [edk2-devel] [PATCH v2 4/6] OvmfPkg: Add Platform CI and configuration for Core CI Thread-Index: AQHWF0e6dxJjuRZrU0GyjQ4tBTxY1qiIvXZe Date: Fri, 24 Apr 2020 20:22:04 +0000 Message-ID: References: <20200420191216.24572-1-michael.kubacki@outlook.com>, In-Reply-To: Accept-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: msip_labels: MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Enabled=True;MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SiteId=72f988bf-86f1-41af-91ab-2d7cd011db47;MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SetDate=2020-04-24T20:22:01.0304439Z;MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_ContentBits=0;MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Method=Privileged authentication-results: spf=none (sender IP is ) smtp.mailfrom=Bret.Barkelew@microsoft.com; x-originating-ip: [174.21.83.205] x-ms-publictraffictype: Email x-ms-office365-filtering-ht: Tenant x-ms-office365-filtering-correlation-id: 578fe12f-3df8-47c2-96b6-08d7e88d278d x-ms-traffictypediagnostic: CY4PR21MB1538: x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:4714; x-forefront-prvs: 03838E948C x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:CY4PR21MB0743.namprd21.prod.outlook.com;PTR:;CAT:NONE;SFTY:;SFS:(4636009)(396003)(346002)(366004)(376002)(136003)(39860400002)(82950400001)(66476007)(60390400001)(66446008)(64756008)(66556008)(55016002)(66946007)(110136005)(54906003)(8936002)(316002)(83080400001)(4326008)(82960400001)(81156014)(33656002)(2906002)(26005)(8990500004)(186003)(966005)(9686003)(19627235002)(478600001)(5660300002)(30864003)(7696005)(76116006)(86362001)(8676002)(6506007)(52536014)(10290500003)(71200400001)(53546011)(579004)(559001);DIR:OUT;SFP:1102; received-spf: None (protection.outlook.com: microsoft.com does not designate permitted sender hosts) x-ms-exchange-senderadcheck: 1 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 x-ms-exchange-antispam-messagedata: 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 x-ms-exchange-transport-forked: True MIME-Version: 1.0 X-OriginatorOrg: microsoft.com X-MS-Exchange-CrossTenant-Network-Message-Id: 578fe12f-3df8-47c2-96b6-08d7e88d278d X-MS-Exchange-CrossTenant-originalarrivaltime: 24 Apr 2020 20:22:04.7053 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47 X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: PdF7VMfpV5z1k4kYVGhhnhqN2GrdkLyotDlP9a/u9Kh371jK187LXo+RZ9OLCEjy0/VTojejUU1NTYSreBvqxA== X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY4PR21MB1538 Content-Language: en-US Content-Type: multipart/alternative; boundary="_000_CY4PR21MB07432DD75FB7DCE124D2327FEFD00CY4PR21MB0743namp_" --_000_CY4PR21MB07432DD75FB7DCE124D2327FEFD00CY4PR21MB0743namp_ Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Reviewed-by: Bret Barkelew - Bret ________________________________ From: devel@edk2.groups.io on behalf of Michael Kub= acki via groups.io Sent: Monday, April 20, 2020 12:12:14 PM To: devel@edk2.groups.io Cc: Jordan Justen ; Laszlo Ersek ; Ard Biesheuvel Subject: [EXTERNAL] [edk2-devel] [PATCH v2 4/6] OvmfPkg: Add Platform CI a= nd configuration for Core CI From: Sean Brogan REF:https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fbu= gzilla.tianocore.org%2Fshow_bug.cgi%3Fid%3D2570&data=3D02%7C01%7Cbret.b= arkelew%40microsoft.com%7C65b8b6d15c7f432a603108d7e55edbb9%7C72f988bf86f141= af91ab2d7cd011db47%7C1%7C0%7C637230067886270375&sdata=3Do9bzrzAgNtEoNcz= kjtAgS6F2EOsl3J07NIaBPJgvVew%3D&reserved=3D0 Add new Azure Pipeline definitions to build and run OvmfPkg with: * Ubuntu GCC5 * Windows VS2019 Add PyTool based build of OvmfPkg Add extdep for managing the iasl dependency Add OvmfPkg.ci.yaml for Core CI Add README.rst for status, details and instructions Cc: Jordan Justen Cc: Laszlo Ersek Cc: Ard Biesheuvel Signed-off-by: Sean Brogan Signed-off-by: Michael Kubacki --- OvmfPkg/OvmfPkg.ci.yaml | 83 +++++++ OvmfPkg/PlatformCI/.azurepipelines/Ubuntu-GCC5.yml | 133 ++++++++++ OvmfPkg/PlatformCI/.azurepipelines/Windows-VS2019.yml | 138 +++++++++++ OvmfPkg/PlatformCI/PlatformBuild.py | 254 +++++++++++++= +++++++ OvmfPkg/PlatformCI/iasl_ext_dep.yaml | 21 ++ OvmfPkg/README.rst | 211 +++++++++++++= +++ 6 files changed, 840 insertions(+) diff --git a/OvmfPkg/OvmfPkg.ci.yaml b/OvmfPkg/OvmfPkg.ci.yaml new file mode 100644 index 000000000000..98992f0429ff --- /dev/null +++ b/OvmfPkg/OvmfPkg.ci.yaml @@ -0,0 +1,83 @@ +## @file +# Core CI configuration for OvmfPkg +# +# OvmfPkg is part of Platform Ci for builds so this is only +# used for code analysis. +# +# Copyright (c) Microsoft Corporation +# SPDX-License-Identifier: BSD-2-Clause-Patent +## +{ + ## options defined .pytool/Plugin/CompilerPlugin + "CompilerPlugin": { + "DscPath": "" # Don't support this test + }, + + ## options defined .pytool/Plugin/HostUnitTestCompilerPlugin + "HostUnitTestCompilerPlugin": { + "DscPath": "" # Don't support this test + }, + + ## options defined .pytool/Plugin/CharEncodingCheck + "CharEncodingCheck": { + "IgnoreFiles": [] + }, + + ## options defined .pytool/Plugin/DependencyCheck + "DependencyCheck": { + "AcceptableDependencies": [ + "MdePkg/MdePkg.dec", + "MdeModulePkg/MdeModulePkg.dec", + "OvmfPkg/OvmfPkg.dec", + "NetworkPkg/NetworkPkg.dec", + "SecurityPkg/SecurityPkg.dec", + "UefiCpuPkg/UefiCpuPkg.dec", + "ShellPkg/ShellPkg.dec", + "EmbeddedPkg/EmbeddedPkg.dec", + "SourceLevelDebugPkg/SourceLevelDebugPkg.dec" + ], + # For host based unit tests + "AcceptableDependencies-HOST_APPLICATION":[ + "UnitTestFrameworkPkg/UnitTestFrameworkPkg.dec" + ], + # For UEFI shell based apps + "AcceptableDependencies-UEFI_APPLICATION":[], + "IgnoreInf": [] + }, + + ## options defined .pytool/Plugin/DscCompleteCheck + "DscCompleteCheck": { + "IgnoreInf": [""], + "DscPath": "" # Don't support this test + }, + + ## options defined .pytool/Plugin/HostUnitTestDscCompleteCheck + "HostUnitTestDscCompleteCheck": { + "IgnoreInf": [""], + "DscPath": "" # Don't support this test + }, + + ## options defined .pytool/Plugin/GuidCheck + "GuidCheck": { + "IgnoreGuidName": ["ResetVector", "XenResetVector"], # Expected d= uplication for gEfiFirmwareVolumeTopFileGuid + "IgnoreGuidValue": [], + "IgnoreFoldersAndFiles": [], + "IgnoreDuplicates": [], + }, + + ## options defined .pytool/Plugin/LibraryClassCheck + "LibraryClassCheck": { + "IgnoreHeaderFile": [] + }, + + ## options defined .pytool/Plugin/SpellCheck + "SpellCheck": { + "AuditOnly": True, # Fails right now with over 270 erro= rs + "IgnoreFiles": [], # use gitignore syntax to ignore err= ors in matching files + "ExtendWords": [ + + ], # words to extend to the dictionary for this package + "IgnoreStandardPaths": [], # Standard Plugin defined paths that= should be ignore + "AdditionalIncludePaths": [] # Additional paths to spell check (w= ildcards supported) + } +} diff --git a/OvmfPkg/PlatformCI/.azurepipelines/Ubuntu-GCC5.yml b/OvmfPkg/= PlatformCI/.azurepipelines/Ubuntu-GCC5.yml new file mode 100644 index 000000000000..a47d273217ab --- /dev/null +++ b/OvmfPkg/PlatformCI/.azurepipelines/Ubuntu-GCC5.yml @@ -0,0 +1,133 @@ +## @file +# Azure Pipeline build file for building a platform. +# +# Platform: OVMF +# OS: Ubuntu +# Toolchain: GCC5 +# +# Copyright (c) Microsoft Corporation. +# SPDX-License-Identifier: BSD-2-Clause-Patent +## +trigger: + - master +pr: + - master + +jobs: + - job: Platform_CI + variables: + package: 'OvmfPkg' + vm_image: 'ubuntu-latest' + should_run: true + run_flags: "MAKE_STARTUP_NSH=3DTRUE QEMU_HEADLESS=3DTRUE" + + #Use matrix to speed up the build process + strategy: + matrix: + OVMF_IA32_DEBUG: + Build.File: "$(package)/PlatformCI/PlatformBuild.py" + Build.Arch: "IA32" + Build.Flags: "" + Build.Target: "DEBUG" + Run.Flags: $(run_flags) + Run: $(should_run) + OVMF_IA32_RELEASE: + Build.File: "$(package)/PlatformCI/PlatformBuild.py" + Build.Arch: "IA32" + Build.Flags: "" + Build.Target: "RELEASE" + Run.Flags: $(run_flags) + Run: $(should_run) + OVMF_IA32_NOOPT: + Build.File: "$(package)/PlatformCI/PlatformBuild.py" + Build.Arch: "IA32" + Build.Flags: "" + Build.Target: "NOOPT" + Run.Flags: $(run_flags) + Run: $(should_run) + + OVMF_X64_DEBUG: + Build.File: "$(package)/PlatformCI/PlatformBuild.py" + Build.Arch: "X64" + Build.Flags: "" + Build.Target: "DEBUG" + Run.Flags: $(run_flags) + Run: $(should_run) + OVMF_X64_RELEASE: + Build.File: "$(package)/PlatformCI/PlatformBuild.py" + Build.Arch: "X64" + Build.Flags: "" + Build.Target: "RELEASE" + Run.Flags: $(run_flags) + Run: $(should_run) + OVMF_X64_NOOPT: + Build.File: "$(package)/PlatformCI/PlatformBuild.py" + Build.Arch: "X64" + Build.Flags: "" + Build.Target: "NOOPT" + Run.Flags: $(run_flags) + Run: $(should_run) + + OVMF_IA32X64_DEBUG: + Build.File: "$(package)/PlatformCI/PlatformBuild.py" + Build.Arch: "IA32,X64" + Build.Flags: "" + Build.Target: "DEBUG" + Run.Flags: $(run_flags) + Run: $(should_run) + OVMF_IA32X64_RELEASE: + Build.File: "$(package)/PlatformCI/PlatformBuild.py" + Build.Arch: "IA32,X64" + Build.Flags: "" + Build.Target: "RELEASE" + Run.Flags: $(run_flags) + Run: $(should_run) + OVMF_IA32X64_NOOPT: + Build.File: "$(package)/PlatformCI/PlatformBuild.py" + Build.Arch: "IA32,X64" + Build.Flags: "" + Build.Target: "NOOPT" + Run.Flags: $(run_flags) + Run: $(should_run) + + OVMF_IA32X64_FULL_DEBUG: + Build.File: "$(package)/PlatformCI/PlatformBuild.py" + Build.Arch: "IA32,X64" + Build.Flags: "BLD_*_SECURE_BOOT_ENABLE=3D1 BLD_*_SMM_REQUIRE= =3D1 BLD_*_TPM_ENABLE=3D1 BLD_*_TPM_CONFIG_ENABLE=3D1 BLD_*_NETWORK_TLS_EN= ABLE=3D1 BLD_*_NETWORK_IP6_ENABLE=3D1 BLD_*_NETWORK_HTTP_BOOT_ENABLE=3D1" + Build.Target: "DEBUG" + Run.Flags: $(run_flags) + Run: $(should_run) + OVMF_IA32X64_FULL_RELEASE: + Build.File: "$(package)/PlatformCI/PlatformBuild.py" + Build.Arch: "IA32,X64" + Build.Flags: "BLD_*_SECURE_BOOT_ENABLE=3D1 BLD_*_SMM_REQUIRE= =3D1 BLD_*_TPM_ENABLE=3D1 BLD_*_TPM_CONFIG_ENABLE=3D1 BLD_*_NETWORK_TLS_EN= ABLE=3D1 BLD_*_NETWORK_IP6_ENABLE=3D1 BLD_*_NETWORK_HTTP_BOOT_ENABLE=3D1" + Build.Target: "RELEASE" + Run.Flags: $(run_flags) + Run: $(should_run) + OVMF_IA32X64_FULL_NOOPT: + Build.File: "$(package)/PlatformCI/PlatformBuild.py" + Build.Arch: "IA32,X64" + Build.Flags: "BLD_*_SECURE_BOOT_ENABLE=3D1 BLD_*_SMM_REQUIRE= =3D1 BLD_*_TPM_ENABLE=3D1 BLD_*_TPM_CONFIG_ENABLE=3D1 BLD_*_NETWORK_TLS_EN= ABLE=3D1 BLD_*_NETWORK_IP6_ENABLE=3D1 BLD_*_NETWORK_HTTP_BOOT_ENABLE=3D1" + Build.Target: "NOOPT" + Run.Flags: $(run_flags) + Run: $(should_run) + workspace: + clean: all + + pool: + vmImage: $(vm_image) + + steps: + - template: ../../../.azurepipelines/templates/platform-build-run-ste= ps.yml + parameters: + tool_chain_tag: GCC5 + build_pkg: $(package) + build_target: $(Build.Target) + build_arch: $(Build.Arch) + build_file: $(Build.File) + build_flags: $(Build.Flags) + run_flags: $(Run.Flags) + extra_install_step: + - bash: sudo apt-get install qemu + displayName: Install qemu + condition: and(gt(variables.pkg_count, 0), succeeded()) diff --git a/OvmfPkg/PlatformCI/.azurepipelines/Windows-VS2019.yml b/OvmfP= kg/PlatformCI/.azurepipelines/Windows-VS2019.yml new file mode 100644 index 000000000000..02ed233fdb60 --- /dev/null +++ b/OvmfPkg/PlatformCI/.azurepipelines/Windows-VS2019.yml @@ -0,0 +1,138 @@ +## @file +# Azure Pipeline build file for building a platform. +# +# Platform: OVMF +# OS: Windows +# Toolchain: VS2019 +# +# Copyright (c) Microsoft Corporation. +# SPDX-License-Identifier: BSD-2-Clause-Patent +## +trigger: + - master +pr: + - master +jobs: + - job: Platform_CI + variables: + package: 'OvmfPkg' + vm_image: 'windows-latest' + should_run: true + run_flags: "MAKE_STARTUP_NSH=3DTRUE QEMU_HEADLESS=3DTRUE" + + #Use matrix to speed up the build process + strategy: + matrix: + OVMF_IA32_DEBUG: + Build.File: "$(package)/PlatformCI/PlatformBuild.py" + Build.Arch: "IA32" + Build.Flags: "" + Build.Target: "DEBUG" + Run.Flags: $(run_flags) + Run: $(should_run) + OVMF_IA32_RELEASE: + Build.File: "$(package)/PlatformCI/PlatformBuild.py" + Build.Arch: "IA32" + Build.Flags: "" + Build.Target: "RELEASE" + Run.Flags: $(run_flags) + Run: $(should_run) + OVMF_IA32_NOOPT: + Build.File: "$(package)/PlatformCI/PlatformBuild.py" + Build.Arch: "IA32" + Build.Flags: "" + Build.Target: "NOOPT" + Run.Flags: $(run_flags) + Run: $(should_run) + + OVMF_X64_DEBUG: + Build.File: "$(package)/PlatformCI/PlatformBuild.py" + Build.Arch: "X64" + Build.Flags: "" + Build.Target: "DEBUG" + Run.Flags: $(run_flags) + Run: $(should_run) + OVMF_X64_RELEASE: + Build.File: "$(package)/PlatformCI/PlatformBuild.py" + Build.Arch: "X64" + Build.Flags: "" + Build.Target: "RELEASE" + Run.Flags: $(run_flags) + Run: $(should_run) + OVMF_X64_NOOPT: + Build.File: "$(package)/PlatformCI/PlatformBuild.py" + Build.Arch: "X64" + Build.Flags: "" + Build.Target: "NOOPT" + Run.Flags: $(run_flags) + Run: $(should_run) + + OVMF_IA32X64_DEBUG: + Build.File: "$(package)/PlatformCI/PlatformBuild.py" + Build.Arch: "IA32,X64" + Build.Flags: "" + Build.Target: "DEBUG" + Run.Flags: $(run_flags) + Run: $(should_run) + OVMF_IA32X64_RELEASE: + Build.File: "$(package)/PlatformCI/PlatformBuild.py" + Build.Arch: "IA32,X64" + Build.Flags: "" + Build.Target: "RELEASE" + Run.Flags: $(run_flags) + Run: $(should_run) + OVMF_IA32X64_NOOPT: + Build.File: "$(package)/PlatformCI/PlatformBuild.py" + Build.Arch: "IA32,X64" + Build.Flags: "" + Build.Target: "NOOPT" + Run.Flags: $(run_flags) + Run: $(should_run) + + OVMF_IA32X64_FULL_DEBUG: + Build.File: "$(package)/PlatformCI/PlatformBuild.py" + Build.Arch: "IA32,X64" + Build.Flags: "BLD_*_SECURE_BOOT_ENABLE=3D1 BLD_*_SMM_REQUIRE= =3D1 BLD_*_TPM_ENABLE=3D1 BLD_*_TPM_CONFIG_ENABLE=3D1 BLD_*_NETWORK_TLS_EN= ABLE=3D1 BLD_*_NETWORK_IP6_ENABLE=3D1 BLD_*_NETWORK_HTTP_BOOT_ENABLE=3D1" + Build.Target: "DEBUG" + Run.Flags: $(run_flags) + Run: $(should_run) + OVMF_IA32X64_FULL_RELEASE: + Build.File: "$(package)/PlatformCI/PlatformBuild.py" + Build.Arch: "IA32,X64" + Build.Flags: "BLD_*_SECURE_BOOT_ENABLE=3D1 BLD_*_SMM_REQUIRE= =3D1 BLD_*_TPM_ENABLE=3D1 BLD_*_TPM_CONFIG_ENABLE=3D1 BLD_*_NETWORK_TLS_EN= ABLE=3D1 BLD_*_NETWORK_IP6_ENABLE=3D1 BLD_*_NETWORK_HTTP_BOOT_ENABLE=3D1" + Build.Target: "RELEASE" + Run.Flags: $(run_flags) + Run: $(should_run) + + # This currently creates a very large image which is too big for the = FDF declared range + # Ovmf maintainers suggest to skip this build for now. + # + # OVMF_IA32X64_FULL_NOOPT: + # Build.File: "$(package)/PlatformCI/PlatformBuild.py" + # Build.Arch: "IA32,X64" + # Build.Flags: "BLD_*_SECURE_BOOT_ENABLE=3D1 BLD_*_SMM_REQUIR= E=3D1 BLD_*_TPM_ENABLE=3D1 BLD_*_TPM_CONFIG_ENABLE=3D1 BLD_*_NETWORK_TLS_EN= ABLE=3D1 BLD_*_NETWORK_IP6_ENABLE=3D1 BLD_*_NETWORK_HTTP_BOOT_ENABLE=3D1" + # Build.Target: "NOOPT" + # Run.Flags: $(run_flags) + # Run: $(should_run) + + workspace: + clean: all + + pool: + vmImage: $(vm_image) + + steps: + - template: ../../../.azurepipelines/templates/platform-build-run-ste= ps.yml + parameters: + tool_chain_tag: VS2019 + build_pkg: $(package) + build_target: $(Build.Target) + build_arch: $(Build.Arch) + build_file: $(Build.File) + build_flags: $(Build.Flags) + run_flags: $(Run.Flags) + extra_install_step: + - powershell: choco install qemu; Write-Host "##vso[task.prependp= ath]c:\Program Files\qemu" + displayName: Install QEMU and Set QEMU on path # friendly name = displayed in the UI + condition: and(gt(variables.pkg_count, 0), succeeded()) + diff --git a/OvmfPkg/PlatformCI/PlatformBuild.py b/OvmfPkg/PlatformCI/Plat= formBuild.py new file mode 100644 index 000000000000..627bb7b992db --- /dev/null +++ b/OvmfPkg/PlatformCI/PlatformBuild.py @@ -0,0 +1,254 @@ +# @file +# Script to Build OVMF UEFI firmware +# +# Copyright (c) Microsoft Corporation. +# SPDX-License-Identifier: BSD-2-Clause-Patent +## +import os +import logging +import io + +from edk2toolext.environment import shell_environment +from edk2toolext.environment.uefi_build import UefiBuilder +from edk2toolext.invocables.edk2_platform_build import BuildSettingsManag= er +from edk2toolext.invocables.edk2_setup import SetupSettingsManager, Requi= redSubmodule +from edk2toolext.invocables.edk2_update import UpdateSettingsManager +from edk2toolext.invocables.edk2_pr_eval import PrEvalSettingsManager +from edk2toollib.utility_functions import RunCmd + + + # ###################################################################= #################### # + # Common Configuration = # + # ###################################################################= #################### # +class CommonPlatform(): + ''' Common settings for this platform. Define static data here and u= se + for the different parts of stuart + ''' + PackagesSupported =3D ("OvmfPkg",) + ArchSupported =3D ("IA32", "X64") + TargetsSupported =3D ("DEBUG", "RELEASE", "NOOPT") + Scopes =3D ('ovmf', 'edk2-build') + WorkspaceRoot =3D os.path.realpath(os.path.join( + os.path.dirname(os.path.abspath(__file__)), "..", "..")) + + @classmethod + def GetDscName(cls, ArchCsv: str) -> str: + ''' return the DSC given the architectures requested. + + ArchCsv: csv string containing all architectures to build + ''' + dsc =3D "OvmfPkg" + if "IA32" in ArchCsv.upper().split(","): + dsc +=3D "Ia32" + if "X64" in ArchCsv.upper().split(","): + dsc +=3D "X64" + dsc +=3D ".dsc" + return dsc + + + # ###################################################################= #################### # + # Configuration for Update & Setup = # + # ###################################################################= #################### # +class SettingsManager(UpdateSettingsManager, SetupSettingsManager, PrEval= SettingsManager): + + def GetPackagesSupported(self): + ''' return iterable of edk2 packages supported by this build. + These should be edk2 workspace relative paths ''' + return CommonPlatform.PackagesSupported + + def GetArchitecturesSupported(self): + ''' return iterable of edk2 architectures supported by this build= ''' + return CommonPlatform.ArchSupported + + def GetTargetsSupported(self): + ''' return iterable of edk2 target tags supported by this build '= '' + return CommonPlatform.TargetsSupported + + def GetRequiredSubmodules(self): + ''' return iterable containing RequiredSubmodule objects. + If no RequiredSubmodules return an empty iterable + ''' + rs =3D [] + + # intentionally declare this one with recursive false to avoid ov= erhead + rs.append(RequiredSubmodule( + "CryptoPkg/Library/OpensslLib/openssl", False)) + + # To avoid maintenance of this file for every new submodule + # lets just parse the .gitmodules and add each if not already in = list. + # The GetRequiredSubmodules is designed to allow a build to optim= ize + # the desired submodules but it isn't necessary for this reposito= ry. + result =3D io.StringIO() + ret =3D RunCmd("git", "config --file .gitmodules --get-regexp pat= h", workingdir=3Dself.GetWorkspaceRoot(), outstream=3Dresult) + # Cmd output is expected to look like: + # submodule.CryptoPkg/Library/OpensslLib/openssl.path CryptoPkg/L= ibrary/OpensslLib/openssl + # submodule.SoftFloat.path ArmPkg/Library/ArmSoftFloatLib/berkele= y-softfloat-3 + if ret =3D=3D 0: + for line in result.getvalue().splitlines(): + _, _, path =3D line.partition(" ") + if path is not None: + if path not in [x.path for x in rs]: + rs.append(RequiredSubmodule(path, True)) # add it= with recursive since we don't know + return rs + + def SetArchitectures(self, list_of_requested_architectures): + ''' Confirm the requests architecture list is valid and configure= SettingsManager + to run only the requested architectures. + + Raise Exception if a list_of_requested_architectures is not suppo= rted + ''' + unsupported =3D set(list_of_requested_architectures) - set(self.G= etArchitecturesSupported()) + if(len(unsupported) > 0): + errorString =3D ( "Unsupported Architecture Requested: " + " = ".join(unsupported)) + logging.critical( errorString ) + raise Exception( errorString ) + self.ActualArchitectures =3D list_of_requested_architectures + + def GetWorkspaceRoot(self): + ''' get WorkspacePath ''' + return CommonPlatform.WorkspaceRoot + + def GetActiveScopes(self): + ''' return tuple containing scopes that should be active for this= process ''' + return CommonPlatform.Scopes + + def FilterPackagesToTest(self, changedFilesList: list, potentialPacka= gesList: list) -> list: + ''' Filter other cases that this package should be built + based on changed files. This should cover things that can't + be detected as dependencies. ''' + build_these_packages =3D [] + possible_packages =3D potentialPackagesList.copy() + for f in changedFilesList: + # BaseTools files that might change the build + if "BaseTools" in f: + if os.path.splitext(f) not in [".txt", ".md"]: + build_these_packages =3D possible_packages + break + + # if the azure pipeline platform template file changed + if "platform-build-run-steps.yml" in f: + build_these_packages =3D possible_packages + break + + return build_these_packages + + def GetPlatformDscAndConfig(self) -> tuple: + ''' If a platform desires to provide its DSC then Policy 4 will e= valuate if + any of the changes will be built in the dsc. + + The tuple should be (, ) + ''' + dsc =3D CommonPlatform.GetDscName(",".join(self.ActualArchitectur= es)) + return (f"OvmfPkg/{dsc}", {}) + + + # ###################################################################= #################### # + # Actual Configuration for Platform Build = # + # ###################################################################= #################### # +class PlatformBuilder( UefiBuilder, BuildSettingsManager): + def __init__(self): + UefiBuilder.__init__(self) + + def AddCommandLineOptions(self, parserObj): + ''' Add command line options to the argparser ''' + parserObj.add_argument('-a', "--arch", dest=3D"build_arch", type= =3Dstr, default=3D"IA32,X64", + help=3D"Optional - CSV of architecture to build. IA32 will u= se IA32 for Pei & Dxe. " + "X64 will use X64 for both PEI and DXE. IA32,X64 will use IA= 32 for PEI and " + "X64 for DXE. default is IA32,X64") + + def RetrieveCommandLineOptions(self, args): + ''' Retrieve command line options from the argparser ''' + + shell_environment.GetBuildVars().SetValue("TARGET_ARCH"," ".join(= args.build_arch.upper().split(",")), "From CmdLine") + dsc =3D CommonPlatform.GetDscName(args.build_arch) + shell_environment.GetBuildVars().SetValue("ACTIVE_PLATFORM", f"Ov= mfPkg/{dsc}", "From CmdLine") + + def GetWorkspaceRoot(self): + ''' get WorkspacePath ''' + return CommonPlatform.WorkspaceRoot + + def GetPackagesPath(self): + ''' Return a list of workspace relative paths that should be mapp= ed as edk2 PackagesPath ''' + return () + + def GetActiveScopes(self): + ''' return tuple containing scopes that should be active for this= process ''' + return CommonPlatform.Scopes + + def GetName(self): + ''' Get the name of the repo, platform, or product being build ''= ' + ''' Used for naming the log file, among others ''' + # check the startup nsh flag and if set then rename the log file. + # this helps in CI so we don't overwrite the build log since runn= ing + # uses the stuart_build command. + if(shell_environment.GetBuildVars().GetValue("MAKE_STARTUP_NSH", = "FALSE") =3D=3D "TRUE"): + return "OvmfPkg_With_Run" + return "OvmfPkg" + + def GetLoggingLevel(self, loggerType): + ''' Get the logging level for a given type + base =3D=3D lowest logging level supported + con =3D=3D Screen logging + txt =3D=3D plain text file logging + md =3D=3D markdown file logging + ''' + return logging.DEBUG + + def SetPlatformEnv(self): + logging.debug("PlatformBuilder SetPlatformEnv") + self.env.SetValue("PRODUCT_NAME", "OVMF", "Platform Hardcoded") + self.env.SetValue("MAKE_STARTUP_NSH", "FALSE", "Default to false"= ) + self.env.SetValue("QEMU_HEADLESS", "FALSE", "Default to false") + return 0 + + def PlatformPreBuild(self): + return 0 + + def PlatformPostBuild(self): + return 0 + + def FlashRomImage(self): + VirtualDrive =3D os.path.join(self.env.GetValue("BUILD_OUTPUT_BAS= E"), "VirtualDrive") + os.makedirs(VirtualDrive, exist_ok=3DTrue) + OutputPath_FV =3D os.path.join(self.env.GetValue("BUILD_OUTPUT_BA= SE"), "FV") + + # + # QEMU must be on the path + # + cmd =3D "qemu-system-x86_64" + args =3D "-debugcon stdio" = # write messages to stdio + args +=3D " -global isa-debugcon.iobase=3D0x402" = # debug messages out thru virtual io port + args +=3D " -net none" = # turn off network + args +=3D f" -drive file=3Dfat:rw:{VirtualDrive},format=3Draw,med= ia=3Ddisk" # Mount disk with startup.nsh + + if (self.env.GetValue("QEMU_HEADLESS").upper() =3D=3D "TRUE"): + args +=3D " -display none" # no graphics + + if (self.env.GetBuildValue("SMM_REQUIRE") =3D=3D "1"): + args +=3D " -machine q35,smm=3Don" #,accel=3D(tcg|kvm)" + #args +=3D " -m ..." + #args +=3D " -smp ..." + args +=3D " -global driver=3Dcfi.pflash01,property=3Dsecure,v= alue=3Don" + args +=3D " -drive if=3Dpflash,format=3Draw,unit=3D0,file=3D"= + os.path.join(OutputPath_FV, "OVMF_CODE.fd") + ",readonly=3Don" + args +=3D " -drive if=3Dpflash,format=3Draw,unit=3D1,file=3D"= + os.path.join(OutputPath_FV, "OVMF_VARS.fd") + else: + args +=3D " -pflash " + os.path.join(OutputPath_FV, "OVMF.fd"= ) # path to firmware + + + if (self.env.GetValue("MAKE_STARTUP_NSH").upper() =3D=3D "TRUE"): + f =3D open(os.path.join(VirtualDrive, "startup.nsh"), "w") + f.write("BOOT SUCCESS !!! \n") + ## add commands here + f.write("reset -s\n") + f.close() + + ret =3D RunCmd(cmd, args) + + if ret =3D=3D 0xc0000005: + #for some reason getting a c0000005 on successful return + return 0 + + return ret + + + diff --git a/OvmfPkg/PlatformCI/iasl_ext_dep.yaml b/OvmfPkg/PlatformCI/ias= l_ext_dep.yaml new file mode 100644 index 000000000000..cbee0e5a5a92 --- /dev/null +++ b/OvmfPkg/PlatformCI/iasl_ext_dep.yaml @@ -0,0 +1,21 @@ +## @file +# Download iasl executable tool from a nuget.org package +# - package contains different binaries based on host +# Add the folder with the tool to the path +# +# This is only downloaded for scope ovmf thus +# should have no impact on the asl compiler used by any +# other given platform to build. +# +# Copyright (c) Microsoft Corporation. +# SPDX-License-Identifier: BSD-2-Clause-Patent +## +{ + "id": "iasl-ovmf-1", + "scope": "ovmf", + "type": "nuget", + "name": "iasl", + "source": "https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%= 3A%2F%2Fapi.nuget.org%2Fv3%2Findex.json&data=3D02%7C01%7Cbret.barkelew%= 40microsoft.com%7C65b8b6d15c7f432a603108d7e55edbb9%7C72f988bf86f141af91ab2d= 7cd011db47%7C1%7C0%7C637230067886270375&sdata=3DQdUtNmDSJrCc0JwfLV3c0YY= ZhpV%2FMjW8U3C%2BJSxuZjg%3D&reserved=3D0", + "version": "20190215.0.0", + "flags": ["set_path", "host_specific"], +} diff --git a/OvmfPkg/README.rst b/OvmfPkg/README.rst new file mode 100644 index 000000000000..926e0f7d7f8d --- /dev/null +++ b/OvmfPkg/README.rst @@ -0,0 +1,211 @@ +=3D=3D=3D=3D=3D=3D=3D +OvmfPkg +=3D=3D=3D=3D=3D=3D=3D + +This README.rst summarizes the current state of Azure DevOps Platform CI +for OvmfPkg. It also describes how to *build* OvmfPkg locally using the +Pytools build system. For general documentation on OvmfPkg, refer +to the `README <./README>`_. + +Platform CI Current Status +--------------------------- + +IA32 Configuration +`````````````````` +=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D=3D=3D= = =3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D= = =3D=3D=3D=3D=3D=3D + Toolchain DEBUG RELEASE NOOPT +=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D=3D=3D= = =3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D= = =3D=3D=3D=3D=3D=3D +`Win VS2019`_ |ap32d| |ap32r| |ap32n| +`Ubuntu GCC5`_ |ap32du| |ap32ru| |ap32nu| +=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D=3D=3D= = =3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D= = =3D=3D=3D=3D=3D=3D + +X64 Configuration +````````````````` +=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D=3D=3D= = =3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D= = =3D=3D=3D=3D=3D=3D + Toolchain DEBUG RELEASE NOOPT +=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D=3D=3D= = =3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D= = =3D=3D=3D=3D=3D=3D +`Win VS2019`_ |ap64d| |ap64r| |ap64n| +`Ubuntu GCC5`_ |ap64du| |ap64ru| |ap64nu| +=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D=3D=3D= = =3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D= = =3D=3D=3D=3D=3D=3D + +IA32X64 Configuration +````````````````````` +PEI phase is 32-bit while DXE phase is 64-bit + +=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D=3D=3D= = =3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D= = =3D=3D=3D=3D=3D=3D + Toolchain DEBUG RELEASE NOOPT +=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D=3D=3D= = =3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D= = =3D=3D=3D=3D=3D=3D +`Win VS2019`_ |ap3264d| |ap3264r| |ap3264n| +`Ubuntu GCC5`_ |ap3264du| |ap3264ru| |ap3264nu| +=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D=3D=3D= = =3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D= = =3D=3D=3D=3D=3D=3D + + +IA32X64 FULL Configuration +`````````````````````````` +PEI phase is 32-bit while DXE phase is 64-bit + +Additional Build flags: + * SECURE_BOOT_ENABLE=3D1 + * SMM_REQUIRE=3D1 + * TPM_ENABLE=3D1 + * TPM_CONFIG_ENABLE=3D1 + * NETWORK_TLS_ENABLE=3D1 + * NETWORK_IP6_ENABLE=3D1 + * NETWORK_HTTP_BOOT_ENABLE=3D1 + +=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D=3D=3D= = =3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D= = =3D=3D=3D=3D=3D=3D + Toolchain DEBUG RELEASE NOOPT +=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D=3D=3D= = =3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D= = =3D=3D=3D=3D=3D=3D +`Win VS2019`_ |ap3264fd| |ap3264fr| |ap3264fn| +`Ubuntu GCC5`_ |ap3264fdu| |ap3264fru| |ap3264fru| +=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D=3D=3D= = =3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D= = =3D=3D=3D=3D=3D=3D + +Setup +----- + +The Usual EDK2 Build Setup +`````````````````````````` + +- `Python 3.8.x - Download & Install `_ +- `GIT - Download & Install `_ +- `GIT - Configure for EDK II `_ +- `QEMU - Download, Install, and add to your path `= _ +- `EDKII Source - Download/Checkout from Github `_ + +**NOTE:** Do *not* follow the EDK II Compile Tools and Build instructions= , see below... + +Differences from EDK Classic Build Setup +```````````````````````````````````````` + +- Build BaseTools using `python BaseTools/Edk2ToolsBuild.py [-t ]` + + - This replaces `edksetup Rebuild`" from the classic build system + - For Windows `` examples, refer to `Windows ToolChain Ma= trix `_, + defaults to `VS2017` if not specified + +- **No Action:** edksetup, Submodule initialization and manual setup of N= ASM and iASL are **not** required, it is handled by the Pytools build syste= m + +Install & Configure Pytools for OvmfPkg +``````````````````````````````````````` + +* Install Pytools + + .. code-block:: bash + + pip install --upgrade -r pip-requirements.txt + +* Initialize & Update Submodules + + .. code-block:: bash + + stuart_setup -c OvmfPkg/PlatformCI/PlatformBuild.py + +* Initialize & Update Dependencies (e.g. iASL & NASM) + + .. code-block:: bash + + stuart_update -c OvmfPkg/PlatformCI/PlatformBuild.py + +Building +-------- + +OVMF has `3 versions `_. +To build them using Pytools: + +First set the `TOOL_CHAIN_TAG` via environment variable, Conf/target.txt,= or pass it on the command-lines below using `TOOL_CHAIN_TAG=3D` syn= tax. + +=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D =3D=3D=3D= = =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D +Platform Commandline +=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D =3D=3D=3D= = =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D +OvmfPkgIa32X64.dsc `stuart_build -c OvmfPkg/PlatformCI/PlatformBuild.p= y [TOOL_CHAIN_TAG=3D]` |br| `stuart_build -c OvmfPkg/Platfo= rmCI/PlatformBuild.py -a IA32,X64 [TOOL_CHAIN_TAG=3D]` +OvmfPkgIa32.dsc `stuart_build -c OvmfPkg/PlatformCI/PlatformBuild.p= y -a IA32 [TOOL_CHAIN_TAG=3D]` +OvmfPkgX64.dsc `stuart_build -c OvmfPkg/PlatformCI/PlatformBuild.p= y -a X64 [TOOL_CHAIN_TAG=3D]` +=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D =3D=3D=3D= = =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D + +**NOTE:** configuring ACTIVE_PLATFORM and TARGET_ARCH in Conf/target.txt = is **not** required. This environment +is set by PlatformBuild.py based upon the `[-a ]` parameter. + +Custom Build Options +```````````````````` + +**MAKE_STARTUP_NSH=3DTRUE** will output a *startup.nsh* file to the locat= ion mapped as fs0. This is used in CI in +combination with the `--FlashOnly` feature to run QEMU to the UEFI shell = and then execute the contents of startup.nsh. + +**QEMU_HEADLESS=3DTRUE** Since CI servers run headless QEMU must be told = to run with no display otherwise an error +occurs. Locally you don't need to set this. + +Passing Build Defines +````````````````````` +To pass build defines through stuart_build, prepend `BLD_*_` to the defin= e name and pass it on the command-line. +stuart_build currently requires values to be assigned, so add a `=3D1` su= ffix for bare defines. +For example, to enable the Intel E1000 NIC, instead of the traditional "-= D E1000_ENABLE", the stuart_build +command-line would be: + +.. code-block:: bash + + stuart_build -c OvmfPkg/PlatformCI/PlatformBuild.py BLD_*_E1000_ENABLE= =3D1 + +Running QEMU Emulator +--------------------- + +QEMU can be automatically launched using stuart_build. This makes path m= anagement and quick verification easy. +QEMU must be added to your path. On Windows this is a manual process and= not part of the QEMU installer. + +1. To run as part of the build but after building add the `--FlashRom` pa= rameter. +2. To run after the build process standalone use your build command menti= oned above plus `--FlashOnly`. + +**NOTE:** Logging the execution output will be in the normal stuart log a= s well as to your console. + +References +---------- +- `Installing Pytools `_ +- For each workspace, consider creating & using a `Python Virtual Environ= ment `_ + + * `Sample Layout `_ + +- `stuart_build commandline parser `_ + + + + +.. =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D +.. This is a bunch of directives to make the README file more readable +.. =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D +.. role:: raw-html(raw) + :format: html + +.. _Bugzilla 2661: https://nam06.safelinks.protection.outlook.com/?url=3D= https%3A%2F%2Fbugzilla.tianocore.org%2Fshow_bug.cgi%3Fid%3D2661&data=3D= 02%7C01%7Cbret.barkelew%40microsoft.com%7C65b8b6d15c7f432a603108d7e55edbb9%= 7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637230067886280331&sdata= =3DuMy2xprjL5gcSs9NC%2FnwrffumV3RmQzfKzlsRzUHhN8%3D&reserved=3D0 + +.. _Win VS2019: https://nam06.safelinks.protection.outlook.com/?url=3Dht= tps%3A%2F%2Fdev.azure.com%2Ftianocore%2Fedk2-ci-play%2F_build%2Flatest%3Fde= finitionId%3D38%26branchName%3Dmaster%2F&data=3D02%7C01%7Cbret.barkelew= %40microsoft.com%7C65b8b6d15c7f432a603108d7e55edbb9%7C72f988bf86f141af91ab2= d7cd011db47%7C1%7C0%7C637230067886280331&sdata=3DZsVOT2rFeQhJfbdzg8K3ot= 7Ooh%2BwQkH6XvDBdT1PfTY%3D&reserved=3D0 +.. _Ubuntu GCC5: https://nam06.safelinks.protection.outlook.com/?url=3Dht= tps%3A%2F%2Fdev.azure.com%2Ftianocore%2Fedk2-ci-play%2F_build%2Flatest%3Fde= finitionId%3D37%26branchName%3Dmaster&data=3D02%7C01%7Cbret.barkelew%40= microsoft.com%7C65b8b6d15c7f432a603108d7e55edbb9%7C72f988bf86f141af91ab2d7c= d011db47%7C1%7C0%7C637230067886280331&sdata=3D7vI3ytuEhSzyJ24ZyaxAH9d4B= r9HnDUV2ql49k6knrU%3D&reserved=3D0 + +.. |ap32d| image:: https://nam06.safelinks.protection.outlook.com/?url=3D= https%3A%2F%2Fdev.azure.com%2Ftianocore%2Fedk2-ci-play%2F_apis%2Fbuild%2Fst= atus%2FOVMF%2FOVMF%2520Windows%2520VS2019%3FbranchName%3Dmaster%26jobName%3= DPlatform_CI%26configuration%3DPlatform_CI%2520OVMF_IA32_DEBUG&data=3D0= 2%7C01%7Cbret.barkelew%40microsoft.com%7C65b8b6d15c7f432a603108d7e55edbb9%7= C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637230067886280331&sdata=3D= VezJlKAAYKvAgSMOiYxj4odO5rzGDxZHhfGFhR7KLHw%3D&reserved=3D0 +.. |ap32du| image:: https://nam06.safelinks.protection.outlook.com/?url= =3Dhttps%3A%2F%2Fdev.azure.com%2Ftianocore%2Fedk2-ci-play%2F_apis%2Fbuild%= 2Fstatus%2FOVMF%2FOVMF%2520Ubuntu%2520GCC5%3FbranchName%3Dmaster%26jobName%= 3DPlatform_CI%26configuration%3DPlatform_CI%2520OVMF_IA32_DEBUG&data=3D= 02%7C01%7Cbret.barkelew%40microsoft.com%7C65b8b6d15c7f432a603108d7e55edbb9%= 7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637230067886280331&sdata= =3DbEeR62FvQePMo6ZevGHajSWX0g2vwJj97gGDxw%2Bz9eE%3D&reserved=3D0 +.. |ap32r| image:: https://nam06.safelinks.protection.outlook.com/?url=3D= https%3A%2F%2Fdev.azure.com%2Ftianocore%2Fedk2-ci-play%2F_apis%2Fbuild%2Fst= atus%2FOVMF%2FOVMF%2520Windows%2520VS2019%3FbranchName%3Dmaster%26jobName%3= DPlatform_CI%26configuration%3DPlatform_CI%2520OVMF_IA32_RELEASE&data= =3D02%7C01%7Cbret.barkelew%40microsoft.com%7C65b8b6d15c7f432a603108d7e55ed= bb9%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637230067886280331&sda= ta=3DVAy9LXyH0R75TgavVg6z3MK8ys0MhQA2fC%2Bsts2DqIg%3D&reserved=3D0 +.. |ap32ru| image:: https://nam06.safelinks.protection.outlook.com/?url= =3Dhttps%3A%2F%2Fdev.azure.com%2Ftianocore%2Fedk2-ci-play%2F_apis%2Fbuild%= 2Fstatus%2FOVMF%2FOVMF%2520Ubuntu%2520GCC5%3FbranchName%3Dmaster%26jobName%= 3DPlatform_CI%26configuration%3DPlatform_CI%2520OVMF_IA32_RELEASE&data= =3D02%7C01%7Cbret.barkelew%40microsoft.com%7C65b8b6d15c7f432a603108d7e55ed= bb9%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637230067886280331&sda= ta=3D6CfdAyRFv1PX%2B3pEaUAaaLUSgWw2wTyDKcU2GSF5IJE%3D&reserved=3D0 +.. |ap32n| image:: https://nam06.safelinks.protection.outlook.com/?url=3D= https%3A%2F%2Fdev.azure.com%2Ftianocore%2Fedk2-ci-play%2F_apis%2Fbuild%2Fst= atus%2FOVMF%2FOVMF%2520Windows%2520VS2019%3FbranchName%3Dmaster%26jobName%3= DPlatform_CI%26configuration%3DPlatform_CI%2520OVMF_IA32_NOOPT&data=3D0= 2%7C01%7Cbret.barkelew%40microsoft.com%7C65b8b6d15c7f432a603108d7e55edbb9%7= C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637230067886280331&sdata=3D= l6f3jyjtKbNeATzpW5MLH3fUMYRpBNzGGDcHZOXF8oI%3D&reserved=3D0 +.. |ap32nu| image:: https://nam06.safelinks.protection.outlook.com/?url= =3Dhttps%3A%2F%2Fdev.azure.com%2Ftianocore%2Fedk2-ci-play%2F_apis%2Fbuild%= 2Fstatus%2FOVMF%2FOVMF%2520Ubuntu%2520GCC5%3FbranchName%3Dmaster%26jobName%= 3DPlatform_CI%26configuration%3DPlatform_CI%2520OVMF_IA32_NOOPT&data=3D= 02%7C01%7Cbret.barkelew%40microsoft.com%7C65b8b6d15c7f432a603108d7e55edbb9%= 7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637230067886280331&sdata= =3DBlFW8gd7voq9V6ZBHFStHX2%2B8tsH05NMTM4La%2BFMA7U%3D&reserved=3D0 + +.. |ap64d| image:: https://nam06.safelinks.protection.outlook.com/?url=3D= https%3A%2F%2Fdev.azure.com%2Ftianocore%2Fedk2-ci-play%2F_apis%2Fbuild%2Fst= atus%2FOVMF%2FOVMF%2520Windows%2520VS2019%3FbranchName%3Dmaster%26jobName%3= DPlatform_CI%26configuration%3DPlatform_CI%2520OVMF_X64_DEBUG&data=3D02= %7C01%7Cbret.barkelew%40microsoft.com%7C65b8b6d15c7f432a603108d7e55edbb9%7C= 72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637230067886290287&sdata=3DW= 0ikoZbzYBhbTDT1aLM%2FAKOkOZwM2%2BWjPSwpytoah%2Fs%3D&reserved=3D0 +.. |ap64du| image:: https://nam06.safelinks.protection.outlook.com/?url= =3Dhttps%3A%2F%2Fdev.azure.com%2Ftianocore%2Fedk2-ci-play%2F_apis%2Fbuild%= 2Fstatus%2FOVMF%2FOVMF%2520Ubuntu%2520GCC5%3FbranchName%3Dmaster%26jobName%= 3DPlatform_CI%26configuration%3DPlatform_CI%2520OVMF_X64_DEBUG&data=3D0= 2%7C01%7Cbret.barkelew%40microsoft.com%7C65b8b6d15c7f432a603108d7e55edbb9%7= C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637230067886290287&sdata=3D= Fh0yOqPV87Uf%2FaaNmIKqHfTbhSzZXZJC4aWziHkWMy8%3D&reserved=3D0 +.. |ap64r| image:: https://nam06.safelinks.protection.outlook.com/?url=3D= https%3A%2F%2Fdev.azure.com%2Ftianocore%2Fedk2-ci-play%2F_apis%2Fbuild%2Fst= atus%2FOVMF%2FOVMF%2520Windows%2520VS2019%3FbranchName%3Dmaster%26jobName%3= DPlatform_CI%26configuration%3DPlatform_CI%2520OVMF_X64_RELEASE&data=3D= 02%7C01%7Cbret.barkelew%40microsoft.com%7C65b8b6d15c7f432a603108d7e55edbb9%= 7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637230067886290287&sdata= =3D3LYcbNMo7BiGBGreA1NJbtJwksXEB88wkb2fXuX75fI%3D&reserved=3D0 +.. |ap64ru| image:: https://nam06.safelinks.protection.outlook.com/?url= =3Dhttps%3A%2F%2Fdev.azure.com%2Ftianocore%2Fedk2-ci-play%2F_apis%2Fbuild%= 2Fstatus%2FOVMF%2FOVMF%2520Ubuntu%2520GCC5%3FbranchName%3Dmaster%26jobName%= 3DPlatform_CI%26configuration%3DPlatform_CI%2520OVMF_X64_RELEASE&data= =3D02%7C01%7Cbret.barkelew%40microsoft.com%7C65b8b6d15c7f432a603108d7e55ed= bb9%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637230067886290287&sda= ta=3DZNggPKnlEmzG9kpBv0jE%2FqSdPuEn5p7p1N97jysotQg%3D&reserved=3D0 +.. |ap64n| image:: https://nam06.safelinks.protection.outlook.com/?url=3D= https%3A%2F%2Fdev.azure.com%2Ftianocore%2Fedk2-ci-play%2F_apis%2Fbuild%2Fst= atus%2FOVMF%2FOVMF%2520Windows%2520VS2019%3FbranchName%3Dmaster%26jobName%3= DPlatform_CI%26configuration%3DPlatform_CI%2520OVMF_X64_NOOPT&data=3D02= %7C01%7Cbret.barkelew%40microsoft.com%7C65b8b6d15c7f432a603108d7e55edbb9%7C= 72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637230067886290287&sdata=3Dx= icm5tRW0D2xQfv%2BJUdI6N%2B9qlYvACVGBgD5zxZjS1Q%3D&reserved=3D0 +.. |ap64nu| image:: https://nam06.safelinks.protection.outlook.com/?url= =3Dhttps%3A%2F%2Fdev.azure.com%2Ftianocore%2Fedk2-ci-play%2F_apis%2Fbuild%= 2Fstatus%2FOVMF%2FOVMF%2520Ubuntu%2520GCC5%3FbranchName%3Dmaster%26jobName%= 3DPlatform_CI%26configuration%3DPlatform_CI%2520OVMF_X64_NOOPT&data=3D0= 2%7C01%7Cbret.barkelew%40microsoft.com%7C65b8b6d15c7f432a603108d7e55edbb9%7= C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637230067886290287&sdata=3D= sL2jMaBDeLk2QEHfL61khUpfl4wjbnnsOM%2FFiJYpijk%3D&reserved=3D0 + + +.. |ap3264d| image:: https://nam06.safelinks.protection.outlook.com/?url= =3Dhttps%3A%2F%2Fdev.azure.com%2Ftianocore%2Fedk2-ci-play%2F_apis%2Fbuild%= 2Fstatus%2FOVMF%2FOVMF%2520Windows%2520VS2019%3FbranchName%3Dmaster%26jobNa= me%3DPlatform_CI%26configuration%3DPlatform_CI%2520OVMF_IA32X64_DEBUG&d= ata=3D02%7C01%7Cbret.barkelew%40microsoft.com%7C65b8b6d15c7f432a603108d7e55= edbb9%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637230067886290287&s= data=3DIbElDszvh%2FuYu1a%2FJBguHGIIu5ox0Pa%2Fh%2FdidHdp8g0%3D&reserved= =3D0 +.. |ap3264du| image:: https://nam06.safelinks.protection.outlook.com/?url= = =3Dhttps%3A%2F%2Fdev.azure.com%2Ftianocore%2Fedk2-ci-play%2F_apis%2Fbuild%= 2Fstatus%2FOVMF%2FOVMF%2520Ubuntu%2520GCC5%3FbranchName%3Dmaster%26jobName%= 3DPlatform_CI%26configuration%3DPlatform_CI%2520OVMF_IA32X64_DEBUG&data= = =3D02%7C01%7Cbret.barkelew%40microsoft.com%7C65b8b6d15c7f432a603108d7e55ed= bb9%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637230067886290287&sda= ta=3DQcHGE1NKDZ%2F7DL44kJ5BTWpBcMIJLYHk41r4VD9gblU%3D&reserved=3D0 +.. |ap3264r| image:: https://nam06.safelinks.protection.outlook.com/?url= =3Dhttps%3A%2F%2Fdev.azure.com%2Ftianocore%2Fedk2-ci-play%2F_apis%2Fbuild%= 2Fstatus%2FOVMF%2FOVMF%2520Windows%2520VS2019%3FbranchName%3Dmaster%26jobNa= me%3DPlatform_CI%26configuration%3DPlatform_CI%2520OVMF_IA32X64_RELEASE&= ;data=3D02%7C01%7Cbret.barkelew%40microsoft.com%7C65b8b6d15c7f432a603108d7e= 55edbb9%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637230067886290287&= ;sdata=3DEInMEA4FmN20iq4iYggu4YV8%2BkKVK4dw%2FuqD4%2B1aQkU%3D&reserved= =3D0 +.. |ap3264ru| image:: https://nam06.safelinks.protection.outlook.com/?url= = =3Dhttps%3A%2F%2Fdev.azure.com%2Ftianocore%2Fedk2-ci-play%2F_apis%2Fbuild%= 2Fstatus%2FOVMF%2FOVMF%2520Ubuntu%2520GCC5%3FbranchName%3Dmaster%26jobName%= 3DPlatform_CI%26configuration%3DPlatform_CI%2520OVMF_IA32X64_RELEASE&da= ta=3D02%7C01%7Cbret.barkelew%40microsoft.com%7C65b8b6d15c7f432a603108d7e55e= dbb9%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637230067886290287&sd= ata=3DpvBls59ZcFWZyD88bn4PvpT6RMArdqYAk3Q%2FRnR51Ro%3D&reserved=3D0 +.. |ap3264n| image:: https://nam06.safelinks.protection.outlook.com/?url= =3Dhttps%3A%2F%2Fdev.azure.com%2Ftianocore%2Fedk2-ci-play%2F_apis%2Fbuild%= 2Fstatus%2FOVMF%2FOVMF%2520Windows%2520VS2019%3FbranchName%3Dmaster%26jobNa= me%3DPlatform_CI%26configuration%3DPlatform_CI%2520OVMF_IA32X64_NOOPT&d= ata=3D02%7C01%7Cbret.barkelew%40microsoft.com%7C65b8b6d15c7f432a603108d7e55= edbb9%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637230067886290287&s= data=3D8quyJSMtcpxkrL3aDuGo5UyfHP0cJYDMtfuzR3xmhaU%3D&reserved=3D0 +.. |ap3264nu| image:: https://nam06.safelinks.protection.outlook.com/?url= = =3Dhttps%3A%2F%2Fdev.azure.com%2Ftianocore%2Fedk2-ci-play%2F_apis%2Fbuild%= 2Fstatus%2FOVMF%2FOVMF%2520Ubuntu%2520GCC5%3FbranchName%3Dmaster%26jobName%= 3DPlatform_CI%26configuration%3DPlatform_CI%2520OVMF_IA32X64_NOOPT&data= = =3D02%7C01%7Cbret.barkelew%40microsoft.com%7C65b8b6d15c7f432a603108d7e55ed= bb9%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637230067886290287&sda= ta=3DICaiYJG1JTXewiv5vcw5801u3asvnEDKXg2DcPsHmt8%3D&reserved=3D0 + +.. |ap3264fd| image:: https://nam06.safelinks.protection.outlook.com/?url= = =3Dhttps%3A%2F%2Fdev.azure.com%2Ftianocore%2Fedk2-ci-play%2F_apis%2Fbuild%= 2Fstatus%2FOVMF%2FOVMF%2520Windows%2520VS2019%3FbranchName%3Dmaster%26jobNa= me%3DPlatform_CI%26configuration%3DPlatform_CI%2520OVMF_IA32X64_FULL_DEBUG&= amp;data=3D02%7C01%7Cbret.barkelew%40microsoft.com%7C65b8b6d15c7f432a603108= d7e55edbb9%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637230067886290287&= amp;sdata=3DcI36u7Pbtn6l7SWQilTeZJciBQJ4wgcz9CNhSk9kX7g%3D&reserved=3D0 +.. |ap3264fdu| image:: https://nam06.safelinks.protection.outlook.com/?ur= l=3Dhttps%3A%2F%2Fdev.azure.com%2Ftianocore%2Fedk2-ci-play%2F_apis%2Fbuild%= 2Fstatus%2FOVMF%2FOVMF%2520Ubuntu%2520GCC5%3FbranchName%3Dmaster%26jobName%= 3DPlatform_CI%26configuration%3DPlatform_CI%2520OVMF_IA32X64_FULL_DEBUG&= ;data=3D02%7C01%7Cbret.barkelew%40microsoft.com%7C65b8b6d15c7f432a603108d7e= 55edbb9%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637230067886290287&= ;sdata=3Dsdu7m75D3KS3LjmJ8wzKcPpgZY%2B%2BGmFvQpemdU3gi8Q%3D&reserved=3D= 0 +.. |ap3264fr| image:: https://nam06.safelinks.protection.outlook.com/?url= = =3Dhttps%3A%2F%2Fdev.azure.com%2Ftianocore%2Fedk2-ci-play%2F_apis%2Fbuild%= 2Fstatus%2FOVMF%2FOVMF%2520Windows%2520VS2019%3FbranchName%3Dmaster%26jobNa= me%3DPlatform_CI%26configuration%3DPlatform_CI%2520OVMF_IA32X64_FULL_RELEAS= E&data=3D02%7C01%7Cbret.barkelew%40microsoft.com%7C65b8b6d15c7f432a6031= 08d7e55edbb9%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C63723006788629028= 7&sdata=3DWmsgrgrRE%2Bgj%2F%2FyZ%2FoerLsjteN6YxaWzqanQWTbHtJ8%3D&re= served=3D0 +.. |ap3264fru| image:: https://nam06.safelinks.protection.outlook.com/?ur= l=3Dhttps%3A%2F%2Fdev.azure.com%2Ftianocore%2Fedk2-ci-play%2F_apis%2Fbuild%= 2Fstatus%2FOVMF%2FOVMF%2520Ubuntu%2520GCC5%3FbranchName%3Dmaster%26jobName%= 3DPlatform_CI%26configuration%3DPlatform_CI%2520OVMF_IA32X64_FULL_RELEASE&a= mp;data=3D02%7C01%7Cbret.barkelew%40microsoft.com%7C65b8b6d15c7f432a603108d= 7e55edbb9%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637230067886290287&a= mp;sdata=3DsIRFirFSFm0kNPSLMgk0g2pMRV75IOyHEYJ4ybJv5l0%3D&reserved=3D0 +.. |ap3264fn| replace:: Fails - Wontfix - `Bugzilla 2661`_ +.. |ap3264fnu| image:: https://nam06.safelinks.protection.outlook.com/?ur= l=3Dhttps%3A%2F%2Fdev.azure.com%2Ftianocore%2Fedk2-ci-play%2F_apis%2Fbuild%= 2Fstatus%2FOVMF%2FOVMF%2520Ubuntu%2520GCC5%3FbranchName%3Dmaster%26jobName%= 3DPlatform_CI%26configuration%3DPlatform_CI%2520OVMF_IA32X64_FULL_NOOPT&= ;data=3D02%7C01%7Cbret.barkelew%40microsoft.com%7C65b8b6d15c7f432a603108d7e= 55edbb9%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637230067886290287&= ;sdata=3DD0oT%2FpwwgCxlVKP%2Bix9WJlhfwKFQEfVDNaw4e%2BZRJF8%3D&reserved= =3D0 + +.. |br| replace:: :raw-html:`
` -- 2.16.3.windows.1 --_000_CY4PR21MB07432DD75FB7DCE124D2327FEFD00CY4PR21MB0743namp_ Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

Reviewed-by: Bret Barkelew <bret.barkelew@micros= oft.com>

 

- Bret

 


From: devel@edk2.groups.io= <devel@edk2.groups.io> on behalf of Michael Kubacki via groups.io &l= t;michael.kubacki=3Doutlook.com@groups.io>
Sent: Monday, April 20, 2020 12:12:14 PM
To: devel@edk2.groups.io <devel@edk2.groups.io>
Cc: Jordan Justen <jordan.l.justen@intel.com>; Laszlo Ersek &= lt;lersek@redhat.com>; Ard Biesheuvel <ard.biesheuvel@arm.com>
Subject: [EXTERNAL] [edk2-devel] [PATCH v2 4/6] OvmfPkg: Add Platfo= rm CI and configuration for Core CI
 
From: Sean Brogan <sean.brogan@microsoft.com&g= t;

REF:https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fbu= gzilla.tianocore.org%2Fshow_bug.cgi%3Fid%3D2570&amp;data=3D02%7C01%7Cbr= et.barkelew%40microsoft.com%7C65b8b6d15c7f432a603108d7e55edbb9%7C72f988bf86= f141af91ab2d7cd011db47%7C1%7C0%7C637230067886270375&amp;sdata=3Do9bzrzA= gNtEoNczkjtAgS6F2EOsl3J07NIaBPJgvVew%3D&amp;reserved=3D0

Add new Azure Pipeline definitions to build and run OvmfPkg with:
  * Ubuntu GCC5
  * Windows VS2019
Add PyTool based build of OvmfPkg
Add extdep for managing the iasl dependency
Add OvmfPkg.ci.yaml for Core CI
Add README.rst for status, details and instructions

Cc: Jordan Justen <jordan.l.justen@intel.com>
Cc: Laszlo Ersek <lersek@redhat.com>
Cc: Ard Biesheuvel <ard.biesheuvel@arm.com>
Signed-off-by: Sean Brogan <sean.brogan@microsoft.com>
Signed-off-by: Michael Kubacki <michael.kubacki@microsoft.com>
---
 OvmfPkg/OvmfPkg.ci.yaml       &nb= sp;            =            |  83 = 3;++++++
 OvmfPkg/PlatformCI/.azurepipelines/Ubuntu-GCC5.yml   = | 133 ++++++++++
 OvmfPkg/PlatformCI/.azurepipelines/Windows-VS2019.yml | 138 += 3;+++++++++
 OvmfPkg/PlatformCI/PlatformBuild.py     &nb= sp;            = | 254 +++++++++++++= 3;++++++
 OvmfPkg/PlatformCI/iasl_ext_dep.yaml     &n= bsp;            |&nb= sp; 21 ++
 OvmfPkg/README.rst        &n= bsp;            = ;            &n= bsp;  | 211 +++++++++++= 3;++++
 6 files changed, 840 insertions(+)

diff --git a/OvmfPkg/OvmfPkg.ci.yaml b/OvmfPkg/OvmfPkg.ci.yaml
new file mode 100644
index 000000000000..98992f0429ff
--- /dev/null
+++ b/OvmfPkg/OvmfPkg.ci.yaml
@@ -0,0 +1,83 @@
+## @file
+# Core CI configuration for OvmfPkg
+#
+# OvmfPkg is part of Platform Ci for builds so this is only
+# used for code analysis.
+#
+# Copyright (c) Microsoft Corporation
+# SPDX-License-Identifier: BSD-2-Clause-Patent
+##
+{
+    ## options defined .pytool/Plugin/CompilerPlugin +    "CompilerPlugin": {
+        "DscPath": "= ;" # Don't support this test
+    },
+
+    ## options defined .pytool/Plugin/HostUnitTestComp= ilerPlugin
+    "HostUnitTestCompilerPlugin": {
+        "DscPath": "= ;" # Don't support this test
+    },
+
+    ## options defined .pytool/Plugin/CharEncodingChec= k
+    "CharEncodingCheck": {
+        "IgnoreFiles": [= ]
+    },
+
+    ## options defined .pytool/Plugin/DependencyCheck<= br> +    "DependencyCheck": {
+        "AcceptableDependenci= es": [
+            &q= uot;MdePkg/MdePkg.dec",
+            &q= uot;MdeModulePkg/MdeModulePkg.dec",
+            &q= uot;OvmfPkg/OvmfPkg.dec",
+            &q= uot;NetworkPkg/NetworkPkg.dec",
+            &q= uot;SecurityPkg/SecurityPkg.dec",
+            &q= uot;UefiCpuPkg/UefiCpuPkg.dec",
+            &q= uot;ShellPkg/ShellPkg.dec",
+            &q= uot;EmbeddedPkg/EmbeddedPkg.dec",
+            &q= uot;SourceLevelDebugPkg/SourceLevelDebugPkg.dec"
+        ],
+        # For host based unit test= s
+        "AcceptableDependenci= es-HOST_APPLICATION":[
+            &q= uot;UnitTestFrameworkPkg/UnitTestFrameworkPkg.dec"
+        ],
+        # For UEFI shell based app= s
+        "AcceptableDependenci= es-UEFI_APPLICATION":[],
+        "IgnoreInf": []<= br> +    },
+
+    ## options defined .pytool/Plugin/DscCompleteCheck=
+    "DscCompleteCheck": {
+        "IgnoreInf": [&q= uot;"],
+        "DscPath": "= ;"  # Don't support this test
+    },
+
+    ## options defined .pytool/Plugin/HostUnitTestDscC= ompleteCheck
+    "HostUnitTestDscCompleteCheck": {
+        "IgnoreInf": [&q= uot;"],
+        "DscPath": "= ;" # Don't support this test
+    },
+
+    ## options defined .pytool/Plugin/GuidCheck
+    "GuidCheck": {
+        "IgnoreGuidName"= : ["ResetVector", "XenResetVector"], # Expected duplica= tion for gEfiFirmwareVolumeTopFileGuid
+        "IgnoreGuidValue"= ;: [],
+        "IgnoreFoldersAndFile= s": [],
+        "IgnoreDuplicates&quo= t;: [],
+    },
+
+    ## options defined .pytool/Plugin/LibraryClassChec= k
+    "LibraryClassCheck": {
+        "IgnoreHeaderFile&quo= t;: []
+    },
+
+    ## options defined .pytool/Plugin/SpellCheck
+    "SpellCheck": {
+        "AuditOnly": Tru= e,           # Fails righ= t now with over 270 errors
+        "IgnoreFiles": [= ],           # use gitign= ore syntax to ignore errors in matching files
+        "ExtendWords": [=
+
+        ],    =        # words to extend to the dictionary fo= r this package
+        "IgnoreStandardPaths&= quot;: [],   # Standard Plugin defined paths that should be ignor= e
+        "AdditionalIncludePat= hs": [] # Additional paths to spell check (wildcards supported)
+    }
+}
diff --git a/OvmfPkg/PlatformCI/.azurepipelines/Ubuntu-GCC5.yml b/OvmfPkg/= PlatformCI/.azurepipelines/Ubuntu-GCC5.yml
new file mode 100644
index 000000000000..a47d273217ab
--- /dev/null
+++ b/OvmfPkg/PlatformCI/.azurepipelines/Ubuntu-GCC5.yml
@@ -0,0 +1,133 @@
+## @file
+# Azure Pipeline build file for building a platform.
+#
+# Platform: OVMF
+# OS: Ubuntu
+# Toolchain: GCC5
+#
+# Copyright (c) Microsoft Corporation.
+# SPDX-License-Identifier: BSD-2-Clause-Patent
+##
+trigger:
+  - master
+pr:
+  - master
+
+jobs:
+  - job: Platform_CI
+    variables:
+      package: 'OvmfPkg'
+      vm_image: 'ubuntu-latest'
+      should_run: true
+      run_flags: "MAKE_STARTUP_NSH=3DTR= UE QEMU_HEADLESS=3DTRUE"
+
+    #Use matrix to speed up the build process
+    strategy:
+        matrix:
+          OVMF_IA32_DEBU= G:
+            Bu= ild.File: "$(package)/PlatformCI/PlatformBuild.py"
+            Bu= ild.Arch: "IA32"
+            Bu= ild.Flags: ""
+            Bu= ild.Target: "DEBUG"
+            Ru= n.Flags: $(run_flags)
+            Ru= n: $(should_run)
+          OVMF_IA32_RELE= ASE:
+            Bu= ild.File: "$(package)/PlatformCI/PlatformBuild.py"
+            Bu= ild.Arch: "IA32"
+            Bu= ild.Flags: ""
+            Bu= ild.Target: "RELEASE"
+            Ru= n.Flags: $(run_flags)
+            Ru= n: $(should_run)
+          OVMF_IA32_NOOP= T:
+            Bu= ild.File: "$(package)/PlatformCI/PlatformBuild.py"
+            Bu= ild.Arch: "IA32"
+            Bu= ild.Flags: ""
+            Bu= ild.Target: "NOOPT"
+            Ru= n.Flags: $(run_flags)
+            Ru= n: $(should_run)
+
+          OVMF_X64_DEBUG= :
+            Bu= ild.File: "$(package)/PlatformCI/PlatformBuild.py"
+            Bu= ild.Arch: "X64"
+            Bu= ild.Flags: ""
+            Bu= ild.Target: "DEBUG"
+            Ru= n.Flags: $(run_flags)
+            Ru= n: $(should_run)
+          OVMF_X64_RELEA= SE:
+            Bu= ild.File: "$(package)/PlatformCI/PlatformBuild.py"
+            Bu= ild.Arch: "X64"
+            Bu= ild.Flags: ""
+            Bu= ild.Target: "RELEASE"
+            Ru= n.Flags: $(run_flags)
+            Ru= n: $(should_run)
+          OVMF_X64_NOOPT= :
+            Bu= ild.File: "$(package)/PlatformCI/PlatformBuild.py"
+            Bu= ild.Arch: "X64"
+            Bu= ild.Flags: ""
+            Bu= ild.Target: "NOOPT"
+            Ru= n.Flags: $(run_flags)
+            Ru= n: $(should_run)
+
+          OVMF_IA32X64_D= EBUG:
+            Bu= ild.File: "$(package)/PlatformCI/PlatformBuild.py"
+            Bu= ild.Arch: "IA32,X64"
+            Bu= ild.Flags: ""
+            Bu= ild.Target: "DEBUG"
+            Ru= n.Flags: $(run_flags)
+            Ru= n: $(should_run)
+          OVMF_IA32X64_R= ELEASE:
+            Bu= ild.File: "$(package)/PlatformCI/PlatformBuild.py"
+            Bu= ild.Arch: "IA32,X64"
+            Bu= ild.Flags: ""
+            Bu= ild.Target: "RELEASE"
+            Ru= n.Flags: $(run_flags)
+            Ru= n: $(should_run)
+          OVMF_IA32X64_N= OOPT:
+            Bu= ild.File: "$(package)/PlatformCI/PlatformBuild.py"
+            Bu= ild.Arch: "IA32,X64"
+            Bu= ild.Flags: ""
+            Bu= ild.Target: "NOOPT"
+            Ru= n.Flags: $(run_flags)
+            Ru= n: $(should_run)
+
+          OVMF_IA32X64_F= ULL_DEBUG:
+            Bu= ild.File: "$(package)/PlatformCI/PlatformBuild.py"
+            Bu= ild.Arch: "IA32,X64"
+            Bu= ild.Flags: "BLD_*_SECURE_BOOT_ENABLE=3D1 BLD_*_SMM_REQUIRE=3D1 BLD_*_T= PM_ENABLE=3D1 BLD_*_TPM_CONFIG_ENABLE=3D1 BLD_*_NETWORK_TLS_ENABLE=3D1 BLD_= *_NETWORK_IP6_ENABLE=3D1 BLD_*_NETWORK_HTTP_BOOT_ENABLE=3D1"
+            Bu= ild.Target: "DEBUG"
+            Ru= n.Flags: $(run_flags)
+            Ru= n: $(should_run)
+          OVMF_IA32X64_F= ULL_RELEASE:
+            Bu= ild.File: "$(package)/PlatformCI/PlatformBuild.py"
+            Bu= ild.Arch: "IA32,X64"
+            Bu= ild.Flags: "BLD_*_SECURE_BOOT_ENABLE=3D1 BLD_*_SMM_REQUIRE=3D1 BLD_*_T= PM_ENABLE=3D1 BLD_*_TPM_CONFIG_ENABLE=3D1 BLD_*_NETWORK_TLS_ENABLE=3D1 BLD_= *_NETWORK_IP6_ENABLE=3D1 BLD_*_NETWORK_HTTP_BOOT_ENABLE=3D1"
+            Bu= ild.Target: "RELEASE"
+            Ru= n.Flags: $(run_flags)
+            Ru= n: $(should_run)
+          OVMF_IA32X64_F= ULL_NOOPT:
+            Bu= ild.File: "$(package)/PlatformCI/PlatformBuild.py"
+            Bu= ild.Arch: "IA32,X64"
+            Bu= ild.Flags: "BLD_*_SECURE_BOOT_ENABLE=3D1 BLD_*_SMM_REQUIRE=3D1 BLD_*_T= PM_ENABLE=3D1 BLD_*_TPM_CONFIG_ENABLE=3D1 BLD_*_NETWORK_TLS_ENABLE=3D1 BLD_= *_NETWORK_IP6_ENABLE=3D1 BLD_*_NETWORK_HTTP_BOOT_ENABLE=3D1"
+            Bu= ild.Target: "NOOPT"
+            Ru= n.Flags: $(run_flags)
+            Ru= n: $(should_run)
+    workspace:
+      clean: all
+
+    pool:
+      vmImage: $(vm_image)
+
+    steps:
+    - template: ../../../.azurepipelines/templates/pla= tform-build-run-steps.yml
+      parameters:
+        tool_chain_tag: GCC5
+        build_pkg: $(package)
+        build_target: $(Build.Targ= et)
+        build_arch: $(Build.Arch)<= br> +        build_file: $(Build.File)<= br> +        build_flags: $(Build.Flags= )
+        run_flags: $(Run.Flags) +        extra_install_step:
+        - bash: sudo apt-get insta= ll qemu
+          displayName: I= nstall qemu
+          condition: and= (gt(variables.pkg_count, 0), succeeded())
diff --git a/OvmfPkg/PlatformCI/.azurepipelines/Windows-VS2019.yml b/OvmfP= kg/PlatformCI/.azurepipelines/Windows-VS2019.yml
new file mode 100644
index 000000000000..02ed233fdb60
--- /dev/null
+++ b/OvmfPkg/PlatformCI/.azurepipelines/Windows-VS2019.yml @@ -0,0 +1,138 @@
+## @file
+# Azure Pipeline build file for building a platform.
+#
+# Platform: OVMF
+# OS: Windows
+# Toolchain: VS2019
+#
+# Copyright (c) Microsoft Corporation.
+# SPDX-License-Identifier: BSD-2-Clause-Patent
+##
+trigger:
+  - master
+pr:
+  - master
+jobs:
+  - job: Platform_CI
+    variables:
+      package: 'OvmfPkg'
+      vm_image: 'windows-latest'
+      should_run: true
+      run_flags: "MAKE_STARTUP_NSH=3DTR= UE QEMU_HEADLESS=3DTRUE"
+
+    #Use matrix to speed up the build process
+    strategy:
+        matrix:
+          OVMF_IA32_DEBU= G:
+            Bu= ild.File: "$(package)/PlatformCI/PlatformBuild.py"
+            Bu= ild.Arch: "IA32"
+            Bu= ild.Flags: ""
+            Bu= ild.Target: "DEBUG"
+            Ru= n.Flags: $(run_flags)
+            Ru= n: $(should_run)
+          OVMF_IA32_RELE= ASE:
+            Bu= ild.File: "$(package)/PlatformCI/PlatformBuild.py"
+            Bu= ild.Arch: "IA32"
+            Bu= ild.Flags: ""
+            Bu= ild.Target: "RELEASE"
+            Ru= n.Flags: $(run_flags)
+            Ru= n: $(should_run)
+          OVMF_IA32_NOOP= T:
+            Bu= ild.File: "$(package)/PlatformCI/PlatformBuild.py"
+            Bu= ild.Arch: "IA32"
+            Bu= ild.Flags: ""
+            Bu= ild.Target: "NOOPT"
+            Ru= n.Flags: $(run_flags)
+            Ru= n: $(should_run)
+
+          OVMF_X64_DEBUG= :
+            Bu= ild.File: "$(package)/PlatformCI/PlatformBuild.py"
+            Bu= ild.Arch: "X64"
+            Bu= ild.Flags: ""
+            Bu= ild.Target: "DEBUG"
+            Ru= n.Flags: $(run_flags)
+            Ru= n: $(should_run)
+          OVMF_X64_RELEA= SE:
+            Bu= ild.File: "$(package)/PlatformCI/PlatformBuild.py"
+            Bu= ild.Arch: "X64"
+            Bu= ild.Flags: ""
+            Bu= ild.Target: "RELEASE"
+            Ru= n.Flags: $(run_flags)
+            Ru= n: $(should_run)
+          OVMF_X64_NOOPT= :
+            Bu= ild.File: "$(package)/PlatformCI/PlatformBuild.py"
+            Bu= ild.Arch: "X64"
+            Bu= ild.Flags: ""
+            Bu= ild.Target: "NOOPT"
+            Ru= n.Flags: $(run_flags)
+            Ru= n: $(should_run)
+
+          OVMF_IA32X64_D= EBUG:
+            Bu= ild.File: "$(package)/PlatformCI/PlatformBuild.py"
+            Bu= ild.Arch: "IA32,X64"
+            Bu= ild.Flags: ""
+            Bu= ild.Target: "DEBUG"
+            Ru= n.Flags: $(run_flags)
+            Ru= n: $(should_run)
+          OVMF_IA32X64_R= ELEASE:
+            Bu= ild.File: "$(package)/PlatformCI/PlatformBuild.py"
+            Bu= ild.Arch: "IA32,X64"
+            Bu= ild.Flags: ""
+            Bu= ild.Target: "RELEASE"
+            Ru= n.Flags: $(run_flags)
+            Ru= n: $(should_run)
+          OVMF_IA32X64_N= OOPT:
+            Bu= ild.File: "$(package)/PlatformCI/PlatformBuild.py"
+            Bu= ild.Arch: "IA32,X64"
+            Bu= ild.Flags: ""
+            Bu= ild.Target: "NOOPT"
+            Ru= n.Flags: $(run_flags)
+            Ru= n: $(should_run)
+
+          OVMF_IA32X64_F= ULL_DEBUG:
+            Bu= ild.File: "$(package)/PlatformCI/PlatformBuild.py"
+            Bu= ild.Arch: "IA32,X64"
+            Bu= ild.Flags: "BLD_*_SECURE_BOOT_ENABLE=3D1 BLD_*_SMM_REQUIRE=3D1 BLD_*_T= PM_ENABLE=3D1 BLD_*_TPM_CONFIG_ENABLE=3D1 BLD_*_NETWORK_TLS_ENABLE=3D1 BLD_= *_NETWORK_IP6_ENABLE=3D1 BLD_*_NETWORK_HTTP_BOOT_ENABLE=3D1"
+            Bu= ild.Target: "DEBUG"
+            Ru= n.Flags: $(run_flags)
+            Ru= n: $(should_run)
+          OVMF_IA32X64_F= ULL_RELEASE:
+            Bu= ild.File: "$(package)/PlatformCI/PlatformBuild.py"
+            Bu= ild.Arch: "IA32,X64"
+            Bu= ild.Flags: "BLD_*_SECURE_BOOT_ENABLE=3D1 BLD_*_SMM_REQUIRE=3D1 BLD_*_T= PM_ENABLE=3D1 BLD_*_TPM_CONFIG_ENABLE=3D1 BLD_*_NETWORK_TLS_ENABLE=3D1 BLD_= *_NETWORK_IP6_ENABLE=3D1 BLD_*_NETWORK_HTTP_BOOT_ENABLE=3D1"
+            Bu= ild.Target: "RELEASE"
+            Ru= n.Flags: $(run_flags)
+            Ru= n: $(should_run)
+
+    # This currently creates a very large image which = is too big for the FDF declared range
+    #   Ovmf maintainers suggest to skip thi= s build for now.
+    #
+    #       OVMF_IA32X64= _FULL_NOOPT:
+    #         = Build.File: "$(package)/PlatformCI/PlatformBuild.py"
+    #         = Build.Arch: "IA32,X64"
+    #         = Build.Flags: "BLD_*_SECURE_BOOT_ENABLE=3D1 BLD_*_SMM_REQUIRE=3D1 BLD_*= _TPM_ENABLE=3D1 BLD_*_TPM_CONFIG_ENABLE=3D1 BLD_*_NETWORK_TLS_ENABLE=3D1 BL= D_*_NETWORK_IP6_ENABLE=3D1 BLD_*_NETWORK_HTTP_BOOT_ENABLE=3D1"
+    #         = Build.Target: "NOOPT"
+    #         = Run.Flags: $(run_flags)
+    #         = Run: $(should_run)
+
+    workspace:
+      clean: all
+
+    pool:
+      vmImage: $(vm_image)
+
+    steps:
+    - template: ../../../.azurepipelines/templates/pla= tform-build-run-steps.yml
+      parameters:
+        tool_chain_tag: VS2019
+        build_pkg: $(package)
+        build_target: $(Build.Targ= et)
+        build_arch: $(Build.Arch)<= br> +        build_file: $(Build.File)<= br> +        build_flags: $(Build.Flags= )
+        run_flags: $(Run.Flags) +        extra_install_step:
+        - powershell: choco instal= l qemu; Write-Host "##vso[task.prependpath]c:\Program Files\qemu"=
+          displayName: I= nstall QEMU and Set QEMU on path # friendly name displayed in the UI
+          condition: and= (gt(variables.pkg_count, 0), succeeded())
+
diff --git a/OvmfPkg/PlatformCI/PlatformBuild.py b/OvmfPkg/PlatformCI/Plat= formBuild.py
new file mode 100644
index 000000000000..627bb7b992db
--- /dev/null
+++ b/OvmfPkg/PlatformCI/PlatformBuild.py
@@ -0,0 +1,254 @@
+# @file
+# Script to Build OVMF UEFI firmware
+#
+# Copyright (c) Microsoft Corporation.
+# SPDX-License-Identifier: BSD-2-Clause-Patent
+##
+import os
+import logging
+import io
+
+from edk2toolext.environment import shell_environment
+from edk2toolext.environment.uefi_build import UefiBuilder
+from edk2toolext.invocables.edk2_platform_build import BuildSettingsM= anager
+from edk2toolext.invocables.edk2_setup import SetupSettingsManager, R= equiredSubmodule
+from edk2toolext.invocables.edk2_update import UpdateSettingsManager<= br> +from edk2toolext.invocables.edk2_pr_eval import PrEvalSettingsManager=
+from edk2toollib.utility_functions import RunCmd
+
+
+    # ################################################= ####################################### #
+    #        &= nbsp;           &nbs= p;           Common Confi= guration           &= nbsp;           &nbs= p;             = #
+    # ################################################= ####################################### #
+class CommonPlatform():
+    ''' Common settings for this platform.  Defin= e static data here and use
+        for the different parts of= stuart
+    '''
+    PackagesSupported =3D ("OvmfPkg",)
+    ArchSupported =3D ("IA32", "X64&quo= t;)
+    TargetsSupported =3D ("DEBUG", "REL= EASE", "NOOPT")
+    Scopes =3D ('ovmf', 'edk2-build')
+    WorkspaceRoot =3D os.path.realpath(os.path.join( +        os.path.dirname(os.path.ab= spath(__file__)), "..", ".."))
+
+    @classmethod
+    def GetDscName(cls, ArchCsv: str) -> str:
+        ''' return the DSC given t= he architectures requested.
+
+        ArchCsv: csv string contai= ning all architectures to build
+        '''
+        dsc =3D "OvmfPkg"= ;
+        if "IA32" in Arc= hCsv.upper().split(","):
+            ds= c +=3D "Ia32"
+        if "X64" in Arch= Csv.upper().split(","):
+            ds= c +=3D "X64"
+        dsc +=3D ".dsc&qu= ot;
+        return dsc
+
+
+    # ################################################= ####################################### #
+    #        &= nbsp;           &nbs= p;    Configuration for Update & Setup   =             &nb= sp;            =     #
+    # ################################################= ####################################### #
+class SettingsManager(UpdateSettingsManager, SetupSettingsManager, Pr= EvalSettingsManager):
+
+    def GetPackagesSupported(self):
+        ''' return iterable of edk= 2 packages supported by this build.
+        These should be edk2 works= pace relative paths '''
+        return CommonPlatform.Pack= agesSupported
+
+    def GetArchitecturesSupported(self):
+        ''' return iterable of edk= 2 architectures supported by this build '''
+        return CommonPlatform.Arch= Supported
+
+    def GetTargetsSupported(self):
+        ''' return iterable of edk= 2 target tags supported by this build '''
+        return CommonPlatform.Targ= etsSupported
+
+    def GetRequiredSubmodules(self):
+        ''' return iterable contai= ning RequiredSubmodule objects.
+        If no RequiredSubmodules r= eturn an empty iterable
+        '''
+        rs =3D []
+
+        # intentionally declare th= is one with recursive false to avoid overhead
+        rs.append(RequiredSubmodul= e(
+            &q= uot;CryptoPkg/Library/OpensslLib/openssl", False))
+
+        # To avoid maintenance of = this file for every new submodule
+        # lets just parse the .git= modules and add each if not already in list.
+        # The GetRequiredSubmodule= s is designed to allow a build to optimize
+        # the desired submodules b= ut it isn't necessary for this repository.
+        result =3D io.StringIO() +        ret =3D RunCmd("git&q= uot;, "config --file .gitmodules --get-regexp path", workingdir= =3Dself.GetWorkspaceRoot(), outstream=3Dresult)
+        # Cmd output is expected t= o look like:
+        # submodule.CryptoPkg/Libr= ary/OpensslLib/openssl.path CryptoPkg/Library/OpensslLib/openssl
+        # submodule.SoftFloat.path= ArmPkg/Library/ArmSoftFloatLib/berkeley-softfloat-3
+        if ret =3D=3D 0:
+            fo= r line in result.getvalue().splitlines():
+           &nb= sp;    _, _, path =3D line.partition(" ")
+           &nb= sp;    if path is not None:
+           &nb= sp;        if path not in [x.path for x = in rs]:
+           &nb= sp;            rs.ap= pend(RequiredSubmodule(path, True)) # add it with recursive since we don't = know
+        return rs
+
+    def SetArchitectures(self, list_of_requested_archi= tectures):
+        ''' Confirm the requests a= rchitecture list is valid and configure SettingsManager
+        to run only the requested = architectures.
+
+        Raise Exception if a list_= of_requested_architectures is not supported
+        '''
+        unsupported =3D set(list_o= f_requested_architectures) - set(self.GetArchitecturesSupported())
+        if(len(unsupported) > 0= ):
+            er= rorString =3D ( "Unsupported Architecture Requested: " + &quo= t; ".join(unsupported))
+            lo= gging.critical( errorString )
+            ra= ise Exception( errorString )
+        self.ActualArchitectures = =3D list_of_requested_architectures
+
+    def GetWorkspaceRoot(self):
+        ''' get WorkspacePath '''<= br> +        return CommonPlatform.Work= spaceRoot
+
+    def GetActiveScopes(self):
+        ''' return tuple containin= g scopes that should be active for this process '''
+        return CommonPlatform.Scop= es
+
+    def FilterPackagesToTest(self, changedFilesList: l= ist, potentialPackagesList: list) -> list:
+        ''' Filter other cases tha= t this package should be built
+        based on changed files. Th= is should cover things that can't
+        be detected as dependencie= s. '''
+        build_these_packages =3D [= ]
+        possible_packages =3D pote= ntialPackagesList.copy()
+        for f in changedFilesList:=
+            # = BaseTools files that might change the build
+            if= "BaseTools" in f:
+           &nb= sp;    if os.path.splitext(f) not in [".txt", &quo= t;.md"]:
+           &nb= sp;        build_these_packages =3D poss= ible_packages
+           &nb= sp;        break
+
+            # = if the azure pipeline platform template file changed
+            if= "platform-build-run-steps.yml" in f:
+           &nb= sp;    build_these_packages =3D possible_packages
+           &nb= sp;    break
+
+        return build_these_package= s
+
+    def GetPlatformDscAndConfig(self) -> tuple:
+        ''' If a platform desires = to provide its DSC then Policy 4 will evaluate if
+        any of the changes will be= built in the dsc.
+
+        The tuple should be (<w= orkspace relative path to dsc file>, <input dictionary of dsc key val= ue pairs>)
+        '''
+        dsc =3D CommonPlatform.Get= DscName(",".join(self.ActualArchitectures))
+        return (f"OvmfPkg/{ds= c}", {})
+
+
+    # ################################################= ####################################### #
+    #        &= nbsp;           &nbs= p;    Actual Configuration for Platform Build  &nb= sp;            =           #
+    # ################################################= ####################################### #
+class PlatformBuilder( UefiBuilder, BuildSettingsManager):
+    def __init__(self):
+        UefiBuilder.__init__(self)=
+
+    def AddCommandLineOptions(self, parserObj):
+        ''' Add command line optio= ns to the argparser '''
+        parserObj.add_argument('-a= ', "--arch", dest=3D"build_arch", type=3Dstr, default= =3D"IA32,X64",
+            he= lp=3D"Optional - CSV of architecture to build.  IA32 will use IA3= 2 for Pei & Dxe. "
+            &q= uot;X64 will use X64 for both PEI and DXE.  IA32,X64 will use IA32 for= PEI and "
+            &q= uot;X64 for DXE. default is IA32,X64")
+
+    def RetrieveCommandLineOptions(self, args):
+        '''  Retrieve command= line options from the argparser '''
+
+        shell_environment.GetBuild= Vars().SetValue("TARGET_ARCH"," ".join(args.build_arch.= upper().split(",")), "From CmdLine")
+        dsc =3D CommonPlatform.Get= DscName(args.build_arch)
+        shell_environment.GetBuild= Vars().SetValue("ACTIVE_PLATFORM", f"OvmfPkg/{dsc}", &q= uot;From CmdLine")
+
+    def GetWorkspaceRoot(self):
+        ''' get WorkspacePath '''<= br> +        return CommonPlatform.Work= spaceRoot
+
+    def GetPackagesPath(self):
+        ''' Return a list of works= pace relative paths that should be mapped as edk2 PackagesPath '''
+        return ()
+
+    def GetActiveScopes(self):
+        ''' return tuple containin= g scopes that should be active for this process '''
+        return CommonPlatform.Scop= es
+
+    def GetName(self):
+        ''' Get the name of the re= po, platform, or product being build '''
+        ''' Used for naming the lo= g file, among others '''
+        # check the startup nsh fl= ag and if set then rename the log file.
+        # this helps in CI so we d= on't overwrite the build log since running
+        # uses the stuart_build co= mmand.
+        if(shell_environment.GetBu= ildVars().GetValue("MAKE_STARTUP_NSH", "FALSE") =3D=3D = "TRUE"):
+            re= turn "OvmfPkg_With_Run"
+        return "OvmfPkg"=
+
+    def GetLoggingLevel(self, loggerType):
+        ''' Get the logging level = for a given type
+        base =3D=3D lowest logging= level supported
+        con  =3D=3D Screen lo= gging
+        txt  =3D=3D plain tex= t file logging
+        md   =3D=3D mark= down file logging
+        '''
+        return logging.DEBUG
+
+    def SetPlatformEnv(self):
+        logging.debug("Platfo= rmBuilder SetPlatformEnv")
+        self.env.SetValue("PR= ODUCT_NAME", "OVMF", "Platform Hardcoded")
+        self.env.SetValue("MA= KE_STARTUP_NSH", "FALSE", "Default to false")
+        self.env.SetValue("QE= MU_HEADLESS", "FALSE", "Default to false")
+        return 0
+
+    def PlatformPreBuild(self):
+        return 0
+
+    def PlatformPostBuild(self):
+        return 0
+
+    def FlashRomImage(self):
+        VirtualDrive =3D os.path.j= oin(self.env.GetValue("BUILD_OUTPUT_BASE"), "VirtualDrive&qu= ot;)
+        os.makedirs(VirtualDrive, = exist_ok=3DTrue)
+        OutputPath_FV =3D os.path.= join(self.env.GetValue("BUILD_OUTPUT_BASE"), "FV")
+
+        #
+        # QEMU must be on the path=
+        #
+        cmd =3D "qemu-system-= x86_64"
+        args  =3D "-debu= gcon stdio"          = ;            &n= bsp;            = ;        # write messages to stdio
+        args +=3D " -glob= al isa-debugcon.iobase=3D0x402"      &nb= sp;            =      # debug messages out thru virtual io port
+        args +=3D " -net = none"           = ;            &n= bsp;            = ;            # turn = off network
+        args +=3D f" -dri= ve file=3Dfat:rw:{VirtualDrive},format=3Draw,media=3Ddisk" # Mount dis= k with startup.nsh
+
+        if (self.env.GetValue(&quo= t;QEMU_HEADLESS").upper() =3D=3D "TRUE"):
+            ar= gs +=3D " -display none"  # no graphics
+
+        if (self.env.GetBuildValue= ("SMM_REQUIRE") =3D=3D "1"):
+            ar= gs +=3D " -machine q35,smm=3Don" #,accel=3D(tcg|kvm)" +            #a= rgs +=3D " -m ..."
+            #a= rgs +=3D " -smp ..."
+            ar= gs +=3D " -global driver=3Dcfi.pflash01,property=3Dsecure,value=3D= on"
+            ar= gs +=3D " -drive if=3Dpflash,format=3Draw,unit=3D0,file=3D" &= #43; os.path.join(OutputPath_FV, "OVMF_CODE.fd") + ",rea= donly=3Don"
+            ar= gs +=3D " -drive if=3Dpflash,format=3Draw,unit=3D1,file=3D" &= #43; os.path.join(OutputPath_FV, "OVMF_VARS.fd")
+        else:
+            ar= gs +=3D " -pflash " + os.path.join(OutputPath_FV, "O= VMF.fd")    # path to firmware
+
+
+        if (self.env.GetValue(&quo= t;MAKE_STARTUP_NSH").upper() =3D=3D "TRUE"):
+            f = = =3D open(os.path.join(VirtualDrive, "startup.nsh"), "w"= ;)
+            f.= write("BOOT SUCCESS !!! \n")
+            ##= add commands here
+            f.= write("reset -s\n")
+            f.= close()
+
+        ret =3D RunCmd(cmd, args)<= br> +
+        if ret =3D=3D 0xc0000005:<= br> +            #f= or some reason getting a c0000005 on successful return
+            re= turn 0
+
+        return ret
+
+
+
diff --git a/OvmfPkg/PlatformCI/iasl_ext_dep.yaml b/OvmfPkg/PlatformCI/ias= l_ext_dep.yaml
new file mode 100644
index 000000000000..cbee0e5a5a92
--- /dev/null
+++ b/OvmfPkg/PlatformCI/iasl_ext_dep.yaml
@@ -0,0 +1,21 @@
+## @file
+# Download iasl executable tool from a nuget.org package
+# - package contains different binaries based on host
+# Add the folder with the tool to the path
+#
+# This is only downloaded for scope ovmf thus
+# should have no impact on the asl compiler used by any
+# other given platform to build.
+#
+# Copyright (c) Microsoft Corporation.
+# SPDX-License-Identifier: BSD-2-Clause-Patent
+##
+{
+  "id": "iasl-ovmf-1",
+  "scope": "ovmf",
+  "type": "nuget",
+  "name": "iasl",
+  "source": "https://nam06.safelinks.protection.outlook.com/?url=3Dhtt= ps%3A%2F%2Fapi.nuget.org%2Fv3%2Findex.json&amp;data=3D02%7C01%7Cbret.ba= rkelew%40microsoft.com%7C65b8b6d15c7f432a603108d7e55edbb9%7C72f988bf86f141a= f91ab2d7cd011db47%7C1%7C0%7C637230067886270375&amp;sdata=3DQdUtNmDSJrCc= 0JwfLV3c0YYZhpV%2FMjW8U3C%2BJSxuZjg%3D&amp;reserved=3D0",
+  "version": "20190215.0.0",
+  "flags": ["set_path", "host_specific&= quot;],
+}
diff --git a/OvmfPkg/README.rst b/OvmfPkg/README.rst
new file mode 100644
index 000000000000..926e0f7d7f8d
--- /dev/null
+++ b/OvmfPkg/README.rst
@@ -0,0 +1,211 @@
+=3D=3D=3D=3D=3D=3D=3D
+OvmfPkg
+=3D=3D=3D=3D=3D=3D=3D
+
+This README.rst summarizes the current state of Azure DevOps Platform= CI
+for OvmfPkg. It also describes how to *build* OvmfPkg locally using t= he
+Pytools build system. For general documentation on OvmfPkg, refer
+to the `README <./README>`_.
+
+Platform CI Current Status
+---------------------------
+
+IA32 Configuration
+``````````````````
+=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D= = =3D=3D=3D=3D=3D=3D=3D=3D
+ Toolchain      DEBUG    = ;     RELEASE       NOOPT=
+=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D= = =3D=3D=3D=3D=3D=3D=3D=3D
+`Win VS2019`_   |ap32d|      = |ap32r|       |ap32n|
+`Ubuntu GCC5`_  |ap32du|      |ap32ru|&= nbsp;     |ap32nu|
+=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D= = =3D=3D=3D=3D=3D=3D=3D=3D
+
+X64 Configuration
+`````````````````
+=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D= = =3D=3D=3D=3D=3D=3D=3D=3D
+ Toolchain      DEBUG    = ;     RELEASE       NOOPT=
+=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D= = =3D=3D=3D=3D=3D=3D=3D=3D
+`Win VS2019`_   |ap64d|      = |ap64r|       |ap64n|
+`Ubuntu GCC5`_  |ap64du|      |ap64ru|&= nbsp;     |ap64nu|
+=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D= = =3D=3D=3D=3D=3D=3D=3D=3D
+
+IA32X64 Configuration
+`````````````````````
+PEI phase is 32-bit while DXE phase is 64-bit
+
+=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D= = =3D=3D=3D=3D=3D=3D=3D=3D
+ Toolchain      DEBUG    = ;     RELEASE       NOOPT=
+=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D= = =3D=3D=3D=3D=3D=3D=3D=3D
+`Win VS2019`_   |ap3264d|     |ap3264r|=      |ap3264n|
+`Ubuntu GCC5`_  |ap3264du|    |ap3264ru| &nb= sp;  |ap3264nu|
+=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D= = =3D=3D=3D=3D=3D=3D=3D=3D
+
+
+IA32X64 FULL Configuration
+``````````````````````````
+PEI phase is 32-bit while DXE phase is 64-bit
+
+Additional Build flags:
+  * SECURE_BOOT_ENABLE=3D1
+  * SMM_REQUIRE=3D1
+  * TPM_ENABLE=3D1
+  * TPM_CONFIG_ENABLE=3D1
+  * NETWORK_TLS_ENABLE=3D1
+  * NETWORK_IP6_ENABLE=3D1
+  * NETWORK_HTTP_BOOT_ENABLE=3D1
+
+=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D= = =3D=3D=3D=3D=3D=3D=3D=3D
+ Toolchain      DEBUG    = ;     RELEASE       NOOPT=
+=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D= = =3D=3D=3D=3D=3D=3D=3D=3D
+`Win VS2019`_   |ap3264fd|    |ap3264fr|&nbs= p;   |ap3264fn|
+`Ubuntu GCC5`_  |ap3264fdu|   |ap3264fru|   = |ap3264fru|
+=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D= = =3D=3D=3D=3D=3D=3D=3D=3D
+
+Setup
+-----
+
+The Usual EDK2 Build Setup
+``````````````````````````
+
+- `Python 3.8.x - Download & Install <https://nam06.safelinks.protection.outlook.com/= ?url=3Dhttps%3A%2F%2Fwww.python.org%2Fdownloads%2F&amp;data=3D02%7C01%7= Cbret.barkelew%40microsoft.com%7C65b8b6d15c7f432a603108d7e55edbb9%7C72f988b= f86f141af91ab2d7cd011db47%7C1%7C0%7C637230067886280331&amp;sdata=3DsB2O= jUBiT%2BjBG9RQABgd7qCesN2PXflfsrHqziZJx%2Bs%3D&amp;reserved=3D0>= `_
+- `GIT - Download & Install <https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A= %2F%2Fgit-scm.com%2Fdownload%2F&amp;data=3D02%7C01%7Cbret.barkelew%40mi= crosoft.com%7C65b8b6d15c7f432a603108d7e55edbb9%7C72f988bf86f141af91ab2d7cd0= 11db47%7C1%7C0%7C637230067886280331&amp;sdata=3DOnl5a91Z43gDAef70eT6Xtk= V%2FUZrF1mC0s9L9RWKK0U%3D&amp;reserved=3D0>`_
+- `GIT - Configure for EDK II <http= s://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fgithub.com%= 2Ftianocore%2Ftianocore.github.io%2Fwiki%2FWindows-systems%23github-help&am= p;amp;data=3D02%7C01%7Cbret.barkelew%40microsoft.com%7C65b8b6d15c7f432a6031= 08d7e55edbb9%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C63723006788628033= 1&amp;sdata=3D3NJhPhGa7ZKg7IsxyM%2BLaCQjpit6tZYX5v4vHjEJ%2BDU%3D&am= p;reserved=3D0>`_
+- `QEMU - Download, Install, and add to your path <https://nam06.safelinks.protection.outlook.co= m/?url=3Dhttps%3A%2F%2Fwww.qemu.org%2Fdownload%2F&amp;data=3D02%7C01%7C= bret.barkelew%40microsoft.com%7C65b8b6d15c7f432a603108d7e55edbb9%7C72f988bf= 86f141af91ab2d7cd011db47%7C1%7C0%7C637230067886280331&amp;sdata=3Da2o9B= 0bufxw2ypq5reon4I45Bj07dTas9X0jXIdqSDs%3D&amp;reserved=3D0>`_ +- `EDKII Source - Download/Checkout from Github <https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2F= github.com%2Ftianocore%2Ftianocore.github.io%2Fwiki%2FWindows-systems%23dow= nload&amp;data=3D02%7C01%7Cbret.barkelew%40microsoft.com%7C65b8b6d15c7f= 432a603108d7e55edbb9%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637230067= 886280331&amp;sdata=3DL2q6SwvP5sysw2qveY7VV1SZbfhMohglt0WakRDF8Tg%3D&am= p;amp;reserved=3D0>`_
+
+**NOTE:** Do *not* follow the EDK II Compile Tools and Build instruct= ions, see below...
+
+Differences from EDK Classic Build Setup
+````````````````````````````````````````
+
+- Build BaseTools using `python BaseTools/Edk2ToolsBuild.py [-t <T= oolChainTag>]`
+
+  - This replaces `edksetup Rebuild`" from the classic buil= d system
+  - For Windows `<ToolChainTag>` examples, refer to `Windo= ws ToolChain Matrix <https://nam06.safelin= ks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fgithub.com%2Ftianocore%2Ftia= nocore.github.io%2Fwiki%2FWindows-systems-ToolChain-Matrix&amp;data=3D0= 2%7C01%7Cbret.barkelew%40microsoft.com%7C65b8b6d15c7f432a603108d7e55edbb9%7= C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637230067886280331&amp;sdat= a=3DVzph3oNqf8TJa6MjiCl2ZvBMnMN25o5uh1rm5Cktjfc%3D&amp;reserved=3D0= >`_,
+    defaults to `VS2017` if not specified
+
+- **No Action:** edksetup, Submodule initialization and manual setup = of NASM and iASL are **not** required, it is handled by the Pytools build s= ystem
+
+Install & Configure Pytools for OvmfPkg
+```````````````````````````````````````
+
+* Install Pytools
+
+  .. code-block:: bash
+
+    pip install --upgrade -r pip-requirements.txt
+
+* Initialize & Update Submodules
+
+  .. code-block:: bash
+
+    stuart_setup -c OvmfPkg/PlatformCI/PlatformBuild.p= y
+
+* Initialize & Update Dependencies (e.g. iASL & NASM)
+
+  .. code-block:: bash
+
+    stuart_update -c OvmfPkg/PlatformCI/PlatformBuild.= py
+
+Building
+--------
+
+OVMF has `3 versions <https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A= %2F%2Fgithub.com%2Ftianocore%2Ftianocore.github.io%2Fwiki%2FHow-to-build-OV= MF%23choosing-which-version-of-ovmf-to-build&amp;data=3D02%7C01%7Cbret.= barkelew%40microsoft.com%7C65b8b6d15c7f432a603108d7e55edbb9%7C72f988bf86f14= 1af91ab2d7cd011db47%7C1%7C0%7C637230067886280331&amp;sdata=3DCqKIsrIXmw= pmIgl1Pga4ru3gTymQpucnqjY5anQrDpY%3D&amp;reserved=3D0>`_.
+To build them using Pytools:
+
+First set the `TOOL_CHAIN_TAG` via environment variable, Conf/target.= txt, or pass it on the command-lines below using `TOOL_CHAIN_TAG=3D<valu= e>` syntax.
+
+=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D =3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
+Platform          &= nbsp;   Commandline
+=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D =3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
+OvmfPkgIa32X64.dsc    `stuart_build -c OvmfPkg/Platfor= mCI/PlatformBuild.py [TOOL_CHAIN_TAG=3D<TOOL_CHAIN_TAG>]` |br| `stuar= t_build -c OvmfPkg/PlatformCI/PlatformBuild.py -a IA32,X64 [TOOL_CHAIN_TAG= =3D<TOOL_CHAIN_TAG>]`
+OvmfPkgIa32.dsc       `stuart_build -c = OvmfPkg/PlatformCI/PlatformBuild.py -a IA32 [TOOL_CHAIN_TAG=3D<TOOL_CHAI= N_TAG>]`
+OvmfPkgX64.dsc        `stuart_buil= d -c OvmfPkg/PlatformCI/PlatformBuild.py -a X64 [TOOL_CHAIN_TAG=3D<TOOL_= CHAIN_TAG>]`
+=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D =3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
+
+**NOTE:** configuring ACTIVE_PLATFORM and TARGET_ARCH in Conf/target.= txt is **not** required. This environment
+is set by PlatformBuild.py based upon the `[-a <TARGET_ARCH>]` = parameter.
+
+Custom Build Options
+````````````````````
+
+**MAKE_STARTUP_NSH=3DTRUE** will output a *startup.nsh* file to the l= ocation mapped as fs0. This is used in CI in
+combination with the `--FlashOnly` feature to run QEMU to the UEFI sh= ell and then execute the contents of startup.nsh.
+
+**QEMU_HEADLESS=3DTRUE** Since CI servers run headless QEMU must be t= old to run with no display otherwise an error
+occurs. Locally you don't need to set this.
+
+Passing Build Defines
+`````````````````````
+To pass build defines through stuart_build, prepend `BLD_*_` to the d= efine name and pass it on the command-line.
+stuart_build currently requires values to be assigned, so add a `=3D1= ` suffix for bare defines.
+For example, to enable the Intel E1000 NIC, instead of the traditiona= l "-D E1000_ENABLE", the stuart_build
+command-line would be:
+
+.. code-block:: bash
+
+  stuart_build -c OvmfPkg/PlatformCI/PlatformBuild.py BLD_*_E100= 0_ENABLE=3D1
+
+Running QEMU Emulator
+---------------------
+
+QEMU can be automatically launched using stuart_build.  This mak= es path management and quick verification easy.
+QEMU must be added to your path.  On Windows this is a manual pr= ocess and not part of the QEMU installer.
+
+1. To run as part of the build but after building add the `--FlashRom= ` parameter.
+2. To run after the build process standalone use your build command m= entioned above plus `--FlashOnly`.
+
+**NOTE:** Logging the execution output will be in the normal stuart l= og as well as to your console.
+
+References
+----------
+- `Installing Pytools <ht= tps://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fgithub.co= m%2Ftianocore%2Fedk2-pytool-extensions%2Fblob%2Fmaster%2Fdocs%2Fusing.md%23= installing&amp;data=3D02%7C01%7Cbret.barkelew%40microsoft.com%7C65b8b6d= 15c7f432a603108d7e55edbb9%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C6372= 30067886280331&amp;sdata=3DxTeOZR2Wo1JVUtzZybMO96N6wnzmudCQ1QpQtJCLyv0%= 3D&amp;reserved=3D0>`_
+- For each workspace, consider creating & using a `Python Virtual= Environment <https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2F= docs.python.org%2F3%2Flibrary%2Fvenv.html&amp;data=3D02%7C01%7Cbret.bar= kelew%40microsoft.com%7C65b8b6d15c7f432a603108d7e55edbb9%7C72f988bf86f141af= 91ab2d7cd011db47%7C1%7C0%7C637230067886280331&amp;sdata=3DOww2tijR8D4Wj= fbaiXS%2FhRxIog%2BUiMkwfZ70rLbulh0%3D&amp;reserved=3D0>`_
+
+  * `Sample Layout <https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3= A%2F%2Fmicrosoft.github.io%2Fmu%2FCodeDevelopment%2Fprerequisites%2F%23work= space-virtual-environment-setup-process&amp;data=3D02%7C01%7Cbret.barke= lew%40microsoft.com%7C65b8b6d15c7f432a603108d7e55edbb9%7C72f988bf86f141af91= ab2d7cd011db47%7C1%7C0%7C637230067886280331&amp;sdata=3DCv5%2BfburJ9Fr%= 2FqW7GAXIaq9UoglfqfeyJrLxdYliEuM%3D&amp;reserved=3D0>`_
+
+- `stuart_build commandline parser <https://nam06.safel= inks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fgithub.com%2Ftianocore%2Fe= dk2-pytool-extensions%2Fblob%2F56f6a7aee09995c2f22da4765e8b0a29c1cbf5de%2Fe= dk2toolext%2Fedk2_invocable.py%23L109&amp;data=3D02%7C01%7Cbret.barkele= w%40microsoft.com%7C65b8b6d15c7f432a603108d7e55edbb9%7C72f988bf86f141af91ab= 2d7cd011db47%7C1%7C0%7C637230067886280331&amp;sdata=3DJryF4zaktb8gYs%2F= lp%2BnuRPGPEJtEkLcbcvROqxgyI3g%3D&amp;reserved=3D0>`_
+
+
+
+
+.. =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= = =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
+.. This is a bunch of directives to make the README file more readabl= e
+.. =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= = =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
+.. role:: raw-html(raw)
+    :format: html
+
+.. _Bugzilla 2661: https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fbugzil= la.tianocore.org%2Fshow_bug.cgi%3Fid%3D2661&amp;data=3D02%7C01%7Cbret.b= arkelew%40microsoft.com%7C65b8b6d15c7f432a603108d7e55edbb9%7C72f988bf86f141= af91ab2d7cd011db47%7C1%7C0%7C637230067886280331&amp;sdata=3DuMy2xprjL5g= cSs9NC%2FnwrffumV3RmQzfKzlsRzUHhN8%3D&amp;reserved=3D0
+
+.. _Win VS2019:  https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fdev.az= ure.com%2Ftianocore%2Fedk2-ci-play%2F_build%2Flatest%3FdefinitionId%3D38%26= branchName%3Dmaster%2F&amp;data=3D02%7C01%7Cbret.barkelew%40microsoft.c= om%7C65b8b6d15c7f432a603108d7e55edbb9%7C72f988bf86f141af91ab2d7cd011db47%7C= 1%7C0%7C637230067886280331&amp;sdata=3DZsVOT2rFeQhJfbdzg8K3ot7Ooh%2BwQk= H6XvDBdT1PfTY%3D&amp;reserved=3D0
+.. _Ubuntu GCC5: https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fdev.az= ure.com%2Ftianocore%2Fedk2-ci-play%2F_build%2Flatest%3FdefinitionId%3D37%26= branchName%3Dmaster&amp;data=3D02%7C01%7Cbret.barkelew%40microsoft.com%= 7C65b8b6d15c7f432a603108d7e55edbb9%7C72f988bf86f141af91ab2d7cd011db47%7C1%7= C0%7C637230067886280331&amp;sdata=3D7vI3ytuEhSzyJ24ZyaxAH9d4Br9HnDUV2ql= 49k6knrU%3D&amp;reserved=3D0
+
+.. |ap32d| image:: https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fdev.az= ure.com%2Ftianocore%2Fedk2-ci-play%2F_apis%2Fbuild%2Fstatus%2FOVMF%2FOVMF%2= 520Windows%2520VS2019%3FbranchName%3Dmaster%26jobName%3DPlatform_CI%26confi= guration%3DPlatform_CI%2520OVMF_IA32_DEBUG&amp;data=3D02%7C01%7Cbret.ba= rkelew%40microsoft.com%7C65b8b6d15c7f432a603108d7e55edbb9%7C72f988bf86f141a= f91ab2d7cd011db47%7C1%7C0%7C637230067886280331&amp;sdata=3DVezJlKAAYKvA= gSMOiYxj4odO5rzGDxZHhfGFhR7KLHw%3D&amp;reserved=3D0
+.. |ap32du| image:: https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fdev.az= ure.com%2Ftianocore%2Fedk2-ci-play%2F_apis%2Fbuild%2Fstatus%2FOVMF%2FOVMF%2= 520Ubuntu%2520GCC5%3FbranchName%3Dmaster%26jobName%3DPlatform_CI%26configur= ation%3DPlatform_CI%2520OVMF_IA32_DEBUG&amp;data=3D02%7C01%7Cbret.barke= lew%40microsoft.com%7C65b8b6d15c7f432a603108d7e55edbb9%7C72f988bf86f141af91= ab2d7cd011db47%7C1%7C0%7C637230067886280331&amp;sdata=3DbEeR62FvQePMo6Z= evGHajSWX0g2vwJj97gGDxw%2Bz9eE%3D&amp;reserved=3D0
+.. |ap32r| image:: https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fdev.az= ure.com%2Ftianocore%2Fedk2-ci-play%2F_apis%2Fbuild%2Fstatus%2FOVMF%2FOVMF%2= 520Windows%2520VS2019%3FbranchName%3Dmaster%26jobName%3DPlatform_CI%26confi= guration%3DPlatform_CI%2520OVMF_IA32_RELEASE&amp;data=3D02%7C01%7Cbret.= barkelew%40microsoft.com%7C65b8b6d15c7f432a603108d7e55edbb9%7C72f988bf86f14= 1af91ab2d7cd011db47%7C1%7C0%7C637230067886280331&amp;sdata=3DVAy9LXyH0R= 75TgavVg6z3MK8ys0MhQA2fC%2Bsts2DqIg%3D&amp;reserved=3D0
+.. |ap32ru| image:: https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fdev.az= ure.com%2Ftianocore%2Fedk2-ci-play%2F_apis%2Fbuild%2Fstatus%2FOVMF%2FOVMF%2= 520Ubuntu%2520GCC5%3FbranchName%3Dmaster%26jobName%3DPlatform_CI%26configur= ation%3DPlatform_CI%2520OVMF_IA32_RELEASE&amp;data=3D02%7C01%7Cbret.bar= kelew%40microsoft.com%7C65b8b6d15c7f432a603108d7e55edbb9%7C72f988bf86f141af= 91ab2d7cd011db47%7C1%7C0%7C637230067886280331&amp;sdata=3D6CfdAyRFv1PX%= 2B3pEaUAaaLUSgWw2wTyDKcU2GSF5IJE%3D&amp;reserved=3D0
+.. |ap32n| image:: https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fdev.az= ure.com%2Ftianocore%2Fedk2-ci-play%2F_apis%2Fbuild%2Fstatus%2FOVMF%2FOVMF%2= 520Windows%2520VS2019%3FbranchName%3Dmaster%26jobName%3DPlatform_CI%26confi= guration%3DPlatform_CI%2520OVMF_IA32_NOOPT&amp;data=3D02%7C01%7Cbret.ba= rkelew%40microsoft.com%7C65b8b6d15c7f432a603108d7e55edbb9%7C72f988bf86f141a= f91ab2d7cd011db47%7C1%7C0%7C637230067886280331&amp;sdata=3Dl6f3jyjtKbNe= ATzpW5MLH3fUMYRpBNzGGDcHZOXF8oI%3D&amp;reserved=3D0
+.. |ap32nu| image:: https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fdev.az= ure.com%2Ftianocore%2Fedk2-ci-play%2F_apis%2Fbuild%2Fstatus%2FOVMF%2FOVMF%2= 520Ubuntu%2520GCC5%3FbranchName%3Dmaster%26jobName%3DPlatform_CI%26configur= ation%3DPlatform_CI%2520OVMF_IA32_NOOPT&amp;data=3D02%7C01%7Cbret.barke= lew%40microsoft.com%7C65b8b6d15c7f432a603108d7e55edbb9%7C72f988bf86f141af91= ab2d7cd011db47%7C1%7C0%7C637230067886280331&amp;sdata=3DBlFW8gd7voq9V6Z= BHFStHX2%2B8tsH05NMTM4La%2BFMA7U%3D&amp;reserved=3D0
+
+.. |ap64d| image:: https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fdev.az= ure.com%2Ftianocore%2Fedk2-ci-play%2F_apis%2Fbuild%2Fstatus%2FOVMF%2FOVMF%2= 520Windows%2520VS2019%3FbranchName%3Dmaster%26jobName%3DPlatform_CI%26confi= guration%3DPlatform_CI%2520OVMF_X64_DEBUG&amp;data=3D02%7C01%7Cbret.bar= kelew%40microsoft.com%7C65b8b6d15c7f432a603108d7e55edbb9%7C72f988bf86f141af= 91ab2d7cd011db47%7C1%7C0%7C637230067886290287&amp;sdata=3DW0ikoZbzYBhbT= DT1aLM%2FAKOkOZwM2%2BWjPSwpytoah%2Fs%3D&amp;reserved=3D0
+.. |ap64du| image:: https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fdev.az= ure.com%2Ftianocore%2Fedk2-ci-play%2F_apis%2Fbuild%2Fstatus%2FOVMF%2FOVMF%2= 520Ubuntu%2520GCC5%3FbranchName%3Dmaster%26jobName%3DPlatform_CI%26configur= ation%3DPlatform_CI%2520OVMF_X64_DEBUG&amp;data=3D02%7C01%7Cbret.barkel= ew%40microsoft.com%7C65b8b6d15c7f432a603108d7e55edbb9%7C72f988bf86f141af91a= b2d7cd011db47%7C1%7C0%7C637230067886290287&amp;sdata=3DFh0yOqPV87Uf%2Fa= aNmIKqHfTbhSzZXZJC4aWziHkWMy8%3D&amp;reserved=3D0
+.. |ap64r| image:: https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fdev.az= ure.com%2Ftianocore%2Fedk2-ci-play%2F_apis%2Fbuild%2Fstatus%2FOVMF%2FOVMF%2= 520Windows%2520VS2019%3FbranchName%3Dmaster%26jobName%3DPlatform_CI%26confi= guration%3DPlatform_CI%2520OVMF_X64_RELEASE&amp;data=3D02%7C01%7Cbret.b= arkelew%40microsoft.com%7C65b8b6d15c7f432a603108d7e55edbb9%7C72f988bf86f141= af91ab2d7cd011db47%7C1%7C0%7C637230067886290287&amp;sdata=3D3LYcbNMo7Bi= GBGreA1NJbtJwksXEB88wkb2fXuX75fI%3D&amp;reserved=3D0
+.. |ap64ru| image:: https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fdev.az= ure.com%2Ftianocore%2Fedk2-ci-play%2F_apis%2Fbuild%2Fstatus%2FOVMF%2FOVMF%2= 520Ubuntu%2520GCC5%3FbranchName%3Dmaster%26jobName%3DPlatform_CI%26configur= ation%3DPlatform_CI%2520OVMF_X64_RELEASE&amp;data=3D02%7C01%7Cbret.bark= elew%40microsoft.com%7C65b8b6d15c7f432a603108d7e55edbb9%7C72f988bf86f141af9= 1ab2d7cd011db47%7C1%7C0%7C637230067886290287&amp;sdata=3DZNggPKnlEmzG9k= pBv0jE%2FqSdPuEn5p7p1N97jysotQg%3D&amp;reserved=3D0
+.. |ap64n| image:: https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fdev.az= ure.com%2Ftianocore%2Fedk2-ci-play%2F_apis%2Fbuild%2Fstatus%2FOVMF%2FOVMF%2= 520Windows%2520VS2019%3FbranchName%3Dmaster%26jobName%3DPlatform_CI%26confi= guration%3DPlatform_CI%2520OVMF_X64_NOOPT&amp;data=3D02%7C01%7Cbret.bar= kelew%40microsoft.com%7C65b8b6d15c7f432a603108d7e55edbb9%7C72f988bf86f141af= 91ab2d7cd011db47%7C1%7C0%7C637230067886290287&amp;sdata=3Dxicm5tRW0D2xQ= fv%2BJUdI6N%2B9qlYvACVGBgD5zxZjS1Q%3D&amp;reserved=3D0
+.. |ap64nu| image:: https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fdev.az= ure.com%2Ftianocore%2Fedk2-ci-play%2F_apis%2Fbuild%2Fstatus%2FOVMF%2FOVMF%2= 520Ubuntu%2520GCC5%3FbranchName%3Dmaster%26jobName%3DPlatform_CI%26configur= ation%3DPlatform_CI%2520OVMF_X64_NOOPT&amp;data=3D02%7C01%7Cbret.barkel= ew%40microsoft.com%7C65b8b6d15c7f432a603108d7e55edbb9%7C72f988bf86f141af91a= b2d7cd011db47%7C1%7C0%7C637230067886290287&amp;sdata=3DsL2jMaBDeLk2QEHf= L61khUpfl4wjbnnsOM%2FFiJYpijk%3D&amp;reserved=3D0
+
+
+.. |ap3264d| image:: https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fdev.az= ure.com%2Ftianocore%2Fedk2-ci-play%2F_apis%2Fbuild%2Fstatus%2FOVMF%2FOVMF%2= 520Windows%2520VS2019%3FbranchName%3Dmaster%26jobName%3DPlatform_CI%26confi= guration%3DPlatform_CI%2520OVMF_IA32X64_DEBUG&amp;data=3D02%7C01%7Cbret= .barkelew%40microsoft.com%7C65b8b6d15c7f432a603108d7e55edbb9%7C72f988bf86f1= 41af91ab2d7cd011db47%7C1%7C0%7C637230067886290287&amp;sdata=3DIbElDszvh= %2FuYu1a%2FJBguHGIIu5ox0Pa%2Fh%2FdidHdp8g0%3D&amp;reserved=3D0
+.. |ap3264du| image:: https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fdev.az= ure.com%2Ftianocore%2Fedk2-ci-play%2F_apis%2Fbuild%2Fstatus%2FOVMF%2FOVMF%2= 520Ubuntu%2520GCC5%3FbranchName%3Dmaster%26jobName%3DPlatform_CI%26configur= ation%3DPlatform_CI%2520OVMF_IA32X64_DEBUG&amp;data=3D02%7C01%7Cbret.ba= rkelew%40microsoft.com%7C65b8b6d15c7f432a603108d7e55edbb9%7C72f988bf86f141a= f91ab2d7cd011db47%7C1%7C0%7C637230067886290287&amp;sdata=3DQcHGE1NKDZ%2= F7DL44kJ5BTWpBcMIJLYHk41r4VD9gblU%3D&amp;reserved=3D0
+.. |ap3264r| image:: https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fdev.az= ure.com%2Ftianocore%2Fedk2-ci-play%2F_apis%2Fbuild%2Fstatus%2FOVMF%2FOVMF%2= 520Windows%2520VS2019%3FbranchName%3Dmaster%26jobName%3DPlatform_CI%26confi= guration%3DPlatform_CI%2520OVMF_IA32X64_RELEASE&amp;data=3D02%7C01%7Cbr= et.barkelew%40microsoft.com%7C65b8b6d15c7f432a603108d7e55edbb9%7C72f988bf86= f141af91ab2d7cd011db47%7C1%7C0%7C637230067886290287&amp;sdata=3DEInMEA4= FmN20iq4iYggu4YV8%2BkKVK4dw%2FuqD4%2B1aQkU%3D&amp;reserved=3D0
+.. |ap3264ru| image:: https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fdev.az= ure.com%2Ftianocore%2Fedk2-ci-play%2F_apis%2Fbuild%2Fstatus%2FOVMF%2FOVMF%2= 520Ubuntu%2520GCC5%3FbranchName%3Dmaster%26jobName%3DPlatform_CI%26configur= ation%3DPlatform_CI%2520OVMF_IA32X64_RELEASE&amp;data=3D02%7C01%7Cbret.= barkelew%40microsoft.com%7C65b8b6d15c7f432a603108d7e55edbb9%7C72f988bf86f14= 1af91ab2d7cd011db47%7C1%7C0%7C637230067886290287&amp;sdata=3DpvBls59ZcF= WZyD88bn4PvpT6RMArdqYAk3Q%2FRnR51Ro%3D&amp;reserved=3D0
+.. |ap3264n| image:: https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fdev.az= ure.com%2Ftianocore%2Fedk2-ci-play%2F_apis%2Fbuild%2Fstatus%2FOVMF%2FOVMF%2= 520Windows%2520VS2019%3FbranchName%3Dmaster%26jobName%3DPlatform_CI%26confi= guration%3DPlatform_CI%2520OVMF_IA32X64_NOOPT&amp;data=3D02%7C01%7Cbret= .barkelew%40microsoft.com%7C65b8b6d15c7f432a603108d7e55edbb9%7C72f988bf86f1= 41af91ab2d7cd011db47%7C1%7C0%7C637230067886290287&amp;sdata=3D8quyJSMtc= pxkrL3aDuGo5UyfHP0cJYDMtfuzR3xmhaU%3D&amp;reserved=3D0
+.. |ap3264nu| image:: https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fdev.az= ure.com%2Ftianocore%2Fedk2-ci-play%2F_apis%2Fbuild%2Fstatus%2FOVMF%2FOVMF%2= 520Ubuntu%2520GCC5%3FbranchName%3Dmaster%26jobName%3DPlatform_CI%26configur= ation%3DPlatform_CI%2520OVMF_IA32X64_NOOPT&amp;data=3D02%7C01%7Cbret.ba= rkelew%40microsoft.com%7C65b8b6d15c7f432a603108d7e55edbb9%7C72f988bf86f141a= f91ab2d7cd011db47%7C1%7C0%7C637230067886290287&amp;sdata=3DICaiYJG1JTXe= wiv5vcw5801u3asvnEDKXg2DcPsHmt8%3D&amp;reserved=3D0
+
+.. |ap3264fd| image:: https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fdev.az= ure.com%2Ftianocore%2Fedk2-ci-play%2F_apis%2Fbuild%2Fstatus%2FOVMF%2FOVMF%2= 520Windows%2520VS2019%3FbranchName%3Dmaster%26jobName%3DPlatform_CI%26confi= guration%3DPlatform_CI%2520OVMF_IA32X64_FULL_DEBUG&amp;data=3D02%7C01%7= Cbret.barkelew%40microsoft.com%7C65b8b6d15c7f432a603108d7e55edbb9%7C72f988b= f86f141af91ab2d7cd011db47%7C1%7C0%7C637230067886290287&amp;sdata=3DcI36= u7Pbtn6l7SWQilTeZJciBQJ4wgcz9CNhSk9kX7g%3D&amp;reserved=3D0
+.. |ap3264fdu| image:: https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fdev.az= ure.com%2Ftianocore%2Fedk2-ci-play%2F_apis%2Fbuild%2Fstatus%2FOVMF%2FOVMF%2= 520Ubuntu%2520GCC5%3FbranchName%3Dmaster%26jobName%3DPlatform_CI%26configur= ation%3DPlatform_CI%2520OVMF_IA32X64_FULL_DEBUG&amp;data=3D02%7C01%7Cbr= et.barkelew%40microsoft.com%7C65b8b6d15c7f432a603108d7e55edbb9%7C72f988bf86= f141af91ab2d7cd011db47%7C1%7C0%7C637230067886290287&amp;sdata=3Dsdu7m75= D3KS3LjmJ8wzKcPpgZY%2B%2BGmFvQpemdU3gi8Q%3D&amp;reserved=3D0
+.. |ap3264fr| image:: https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fdev.az= ure.com%2Ftianocore%2Fedk2-ci-play%2F_apis%2Fbuild%2Fstatus%2FOVMF%2FOVMF%2= 520Windows%2520VS2019%3FbranchName%3Dmaster%26jobName%3DPlatform_CI%26confi= guration%3DPlatform_CI%2520OVMF_IA32X64_FULL_RELEASE&amp;data=3D02%7C01= %7Cbret.barkelew%40microsoft.com%7C65b8b6d15c7f432a603108d7e55edbb9%7C72f98= 8bf86f141af91ab2d7cd011db47%7C1%7C0%7C637230067886290287&amp;sdata=3DWm= sgrgrRE%2Bgj%2F%2FyZ%2FoerLsjteN6YxaWzqanQWTbHtJ8%3D&amp;reserved=3D0
+.. |ap3264fru| image::
https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fdev.az= ure.com%2Ftianocore%2Fedk2-ci-play%2F_apis%2Fbuild%2Fstatus%2FOVMF%2FOVMF%2= 520Ubuntu%2520GCC5%3FbranchName%3Dmaster%26jobName%3DPlatform_CI%26configur= ation%3DPlatform_CI%2520OVMF_IA32X64_FULL_RELEASE&amp;data=3D02%7C01%7C= bret.barkelew%40microsoft.com%7C65b8b6d15c7f432a603108d7e55edbb9%7C72f988bf= 86f141af91ab2d7cd011db47%7C1%7C0%7C637230067886290287&amp;sdata=3DsIRFi= rFSFm0kNPSLMgk0g2pMRV75IOyHEYJ4ybJv5l0%3D&amp;reserved=3D0
+.. |ap3264fn| replace:: Fails - Wontfix - `Bugzilla 2661`_
+.. |ap3264fnu| image:: https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fdev.az= ure.com%2Ftianocore%2Fedk2-ci-play%2F_apis%2Fbuild%2Fstatus%2FOVMF%2FOVMF%2= 520Ubuntu%2520GCC5%3FbranchName%3Dmaster%26jobName%3DPlatform_CI%26configur= ation%3DPlatform_CI%2520OVMF_IA32X64_FULL_NOOPT&amp;data=3D02%7C01%7Cbr= et.barkelew%40microsoft.com%7C65b8b6d15c7f432a603108d7e55edbb9%7C72f988bf86= f141af91ab2d7cd011db47%7C1%7C0%7C637230067886290287&amp;sdata=3DD0oT%2F= pwwgCxlVKP%2Bix9WJlhfwKFQEfVDNaw4e%2BZRJF8%3D&amp;reserved=3D0
+
+.. |br| replace:: :raw-html:`<br />`
--
2.16.3.windows.1




--_000_CY4PR21MB07432DD75FB7DCE124D2327FEFD00CY4PR21MB0743namp_--