From nobody Sat Apr 27 18:33:42 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+70689+1787277+3901457@groups.io; arc=fail (BodyHash is different from the expected one); dmarc=fail(p=none dis=none) header.from=arm.com Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by mx.zohomail.com with SMTPS id 1611336006452122.69754961348417; Fri, 22 Jan 2021 09:20:06 -0800 (PST) Return-Path: X-Received: by 127.0.0.2 with SMTP id 5kxxYY1788612xQo9tSCthvs; Fri, 22 Jan 2021 09:20:06 -0800 X-Received: from EUR03-DB5-obe.outbound.protection.outlook.com (EUR03-DB5-obe.outbound.protection.outlook.com [40.107.4.41]) by mx.groups.io with SMTP id smtpd.web12.12525.1611335999253711027 for ; Fri, 22 Jan 2021 09:20:00 -0800 X-Received: from MR2P264CA0084.FRAP264.PROD.OUTLOOK.COM (2603:10a6:500:32::24) by HE1PR0802MB2538.eurprd08.prod.outlook.com (2603:10a6:3:e1::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3784.11; Fri, 22 Jan 2021 17:19:55 +0000 X-Received: from VE1EUR03FT047.eop-EUR03.prod.protection.outlook.com (2603:10a6:500:32:cafe::7f) by MR2P264CA0084.outlook.office365.com (2603:10a6:500:32::24) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3763.12 via Frontend Transport; Fri, 22 Jan 2021 17:19:55 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; edk2.groups.io; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;edk2.groups.io; dmarc=pass action=none header.from=arm.com; Received-SPF: pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) client-ip=66.175.222.108; envelope-from=bounce+27952+70689+1787277+3901457@groups.io; helo=mail02.groups.io; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com; X-Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by VE1EUR03FT047.mail.protection.outlook.com (10.152.19.218) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3784.11 via Frontend Transport; Fri, 22 Jan 2021 17:19:54 +0000 X-Received: ("Tessian outbound f362b81824dc:v71"); Fri, 22 Jan 2021 17:19:54 +0000 X-CheckRecipientChecked: true X-CR-MTA-CID: c9e21f5e16dac05e X-CR-MTA-TID: 64aa7808 X-Received: from dca04c3d82ae.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id 360F9661-3368-4F45-8D4D-66E5CE059401.1; Fri, 22 Jan 2021 17:19:48 +0000 X-Received: from EUR03-DB5-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id dca04c3d82ae.1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Fri, 22 Jan 2021 17:19:48 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=LlX7fyAYHxvySR5kaTeWtxsZU9y84+M/XqkaDl+UkSEjghjtSO2FRl+Ei8+hApdrymllEAHBONUwjOghURNzP6EVG9R/nBALMDUA7YyVbfuWeoeZ1JPJc+hUDGMxMlqTc97t1059Zrnxab2DR+e7d4ZYMw6wseJKkPxjCqxa78lO0r7xt+w7BaXdQA+MraxoubiLSJZhftTy2o+MGnOCOHXFxllkbBtgXgQ3fsXL/xD8bL3fikK4Jzal7ewkC5IvwpVwLj/qWEWCuD2/XUUHE0HMLfulP11esM9fQ6eQN4/tzY5q5ELqMWhU2tKm+b51jI/dhkldfvlg4aGwmDM79A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Lq/ExCAAZIZJ4KKevi6PlTng0XB2pdSzCZcc6ul5gjw=; b=IWRhHD2yE68zrHQLMRBzbT3EHLyTUwMepZzNLRqQXPrWZ1MHNOk6wAlu3BbLZcgtVadQscWNJFoVavFRe9qrajNLOSU1s0G61/yay0AIJFrE8T63g3fqv2N8FUbGs7/hbiXiBc1jQawz4FtdReyKlCD/hgHLqEoTFzK1M7r89aXLa/vKGwMeeC8saAID7vkovFHZLd4rDVwvM9jtaJz96HbscFRRAtKoTRwBHTR1pr2uPktCZY4PxA0BsEllVPYL46Ze+4IdazFuZ/hgPSMXr1mha3KD8xZy4q3e1uxNVmCldGwpxen0zHfcPqVKVteschjiIfDM60WcLE7vaktzhQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 40.67.248.234) smtp.rcpttodomain=edk2.groups.io smtp.mailfrom=arm.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com; dkim=none (message not signed); arc=none X-Received: from AM5PR0601CA0077.eurprd06.prod.outlook.com (2603:10a6:206::42) by VE1PR08MB5087.eurprd08.prod.outlook.com (2603:10a6:803:114::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3784.15; Fri, 22 Jan 2021 17:19:45 +0000 X-Received: from AM5EUR03FT042.eop-EUR03.prod.protection.outlook.com (2603:10a6:206:0:cafe::34) by AM5PR0601CA0077.outlook.office365.com (2603:10a6:206::42) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3784.12 via Frontend Transport; Fri, 22 Jan 2021 17:19:45 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 40.67.248.234) smtp.mailfrom=arm.com; edk2.groups.io; dkim=none (message not signed) header.d=none;edk2.groups.io; dmarc=pass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 40.67.248.234 as permitted sender) receiver=protection.outlook.com; client-ip=40.67.248.234; helo=nebula.arm.com; X-Received: from nebula.arm.com (40.67.248.234) by AM5EUR03FT042.mail.protection.outlook.com (10.152.17.168) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.3784.11 via Frontend Transport; Fri, 22 Jan 2021 17:19:45 +0000 X-Received: from AZ-NEU-EX04.Arm.com (10.251.24.32) by AZ-NEU-EX03.Arm.com (10.251.24.31) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2044.4; Fri, 22 Jan 2021 17:19:42 +0000 X-Received: from E107187.Arm.com (10.57.3.168) by mail.arm.com (10.251.24.32) with Microsoft SMTP Server id 15.1.2044.4 via Frontend Transport; Fri, 22 Jan 2021 17:19:42 +0000 From: "Sami Mujawar" To: CC: Sami Mujawar , , , , , , , , , , Subject: [edk2-devel] [PATCH v1 1/2] ArmVirtPkg/PlatformCI: Add EDKII CI support for Kvmtool Date: Fri, 22 Jan 2021 17:19:40 +0000 Message-ID: <20210122171941.30724-2-sami.mujawar@arm.com> In-Reply-To: <20210122171941.30724-1-sami.mujawar@arm.com> References: <20210122171941.30724-1-sami.mujawar@arm.com> MIME-Version: 1.0 X-EOPAttributedMessage: 1 X-MS-Office365-Filtering-HT: Tenant X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: dda02ea5-9a5d-4022-63d3-08d8bef9ef8b X-MS-TrafficTypeDiagnostic: VE1PR08MB5087:|HE1PR0802MB2538: X-Microsoft-Antispam-PRVS: x-checkrecipientrouted: true NoDisclaimer: true X-MS-Oob-TLC-OOBClassifiers: OLM:439;OLM:439; X-MS-Exchange-SenderADCheck: 1 X-Microsoft-Antispam-Untrusted: BCL:0; X-Microsoft-Antispam-Message-Info-Original: 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 X-Forefront-Antispam-Report-Untrusted: CIP:40.67.248.234;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:nebula.arm.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(4636009)(39850400004)(396003)(346002)(136003)(376002)(46966006)(26005)(6916009)(186003)(8936002)(86362001)(36756003)(8676002)(83380400001)(7696005)(2906002)(336012)(2616005)(70206006)(70586007)(82740400003)(356005)(81166007)(47076005)(82310400003)(1076003)(45080400002)(426003)(44832011)(478600001)(5660300002)(54906003)(4326008)(316002)(36610700001);DIR:OUT;SFP:1101; X-MS-Exchange-Transport-CrossTenantHeadersStamped: VE1PR08MB5087 X-MS-Exchange-Transport-CrossTenantHeadersStripped: VE1EUR03FT047.eop-EUR03.prod.protection.outlook.com X-MS-Office365-Filtering-Correlation-Id-Prvs: 44ed514c-906c-4987-f690-08d8bef9e9ce X-Microsoft-Antispam-Message-Info: fnD1y1cT28GCSvuw6d+HPD6yRlpE9j/X+2LzOpwJHitlbwNrouJa8fnMQ+ir43h0Z3wVBvDHGiXjLSQbYXEHBpTL7mZH83OfGAccRhhIorwvPfDEC1Wb0UrHm3ooWQJ7Pe8UWfZVHzn0xB8mBbOSqrMNP3XsPutJZYn+yGuR3zftzRnCt8guqfRWO9vjtqUBhCJOQRhFt/k/Vvm7lyhoZPiy/2npYiNfXRkDs182FHELJzDIUXk2K1LqOETlMjNc+FVMa8vsZXEzaHxIRgZOMq/U69Gja7OVS7YTY396rOPp8LO23e4vnpsyNazg5eoQassgayLV3BIKHaO++AAtw1pifKjmMsm7BEbbzj8l3F4ZimlaOxkhxtProeKk5Msr2+sdH+UrHPc5H4jOfWQqrTwobp9jgG1spvhIPSTptS8hbafTD0eUNURRQ+bEqrlYNG5ocySsGBm6H3tM/EhzSA== X-OriginatorOrg: arm.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 22 Jan 2021 17:19:54.6689 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: dda02ea5-9a5d-4022-63d3-08d8bef9ef8b X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com] X-MS-Exchange-CrossTenant-AuthSource: VE1EUR03FT047.eop-EUR03.prod.protection.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR0802MB2538 Precedence: Bulk List-Unsubscribe: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,sami.mujawar@arm.com X-Gm-Message-State: 4vxZGG317TdvoWY3t2HFF81ex1787277AA= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=groups.io; q=dns/txt; s=20140610; t=1611336006; bh=RwJFF4wSNgWmTwQrRuVegZPAFY3ufL+JdrxiduZc4bA=; h=CC:Content-Type:Date:From:Reply-To:Subject:To; b=BymSMBaF498R6atpiA/zyn5BMOrUzFcGcBy3hD8gg7ubVNEll6vLaJ9WZj9x0tEjM9a nAZppg/EvKX6YYG8CeJx8cNs8hgfQstLeIuPFSVRe2xUzWztJSrHrywngrw53niDCp+/g YMQ0okbm63gGPnYvmfdnqN5Y3DLQzlPE+PU= X-ZohoMail-DKIM: pass (identity @groups.io) Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" Kvmtool is a virtual machine manager that can be used to launch guest partitions. ArmVirtPkg already has UEFI (virtual/guest) firmware support for Kvmtool guest. Therefore, update the Platform CI script to add support for building the Kvmtool firmware. Signed-off-by: Sami Mujawar Acked-by: Ard Biesheuvel Acked-by: Liming Gao --- ArmVirtPkg/PlatformCI/PlatformBuild.py | 132 +++++++++++--------- ArmVirtPkg/PlatformCI/ReadMe.md | 21 ++-- 2 files changed, 88 insertions(+), 65 deletions(-) diff --git a/ArmVirtPkg/PlatformCI/PlatformBuild.py b/ArmVirtPkg/PlatformCI= /PlatformBuild.py index dff653e919eb42391fc56ec44b4043a75f79d162..473f7d58d15c3e26ef5a25e210c= b679679b28131 100644 --- a/ArmVirtPkg/PlatformCI/PlatformBuild.py +++ b/ArmVirtPkg/PlatformCI/PlatformBuild.py @@ -2,6 +2,7 @@ # Script to Build ArmVirtPkg UEFI firmware # # Copyright (c) Microsoft Corporation. +# Copyright (c) 2021, Arm Limited. All rights reserved.
# SPDX-License-Identifier: BSD-2-Clause-Patent ## import os @@ -139,7 +140,8 @@ class SettingsManager(UpdateSettingsManager, SetupSetti= ngsManager, PrEvalSetting =20 The tuple should be (, ) ''' - return (os.path.join("ArmVirtPkg", "ArmVirtQemu.dsc"), {}) + return (os.path.join("ArmVirtPkg", "ArmVirtQemu.dsc"), + os.path.join("ArmVirtPkg", "ArmVirtKvmTool.dsc"), {}) =20 =20 # ####################################################################= ################### # @@ -150,11 +152,15 @@ class SettingsManager(UpdateSettingsManager, SetupSet= tingsManager, PrEvalSetting class PlatformBuilder(UefiBuilder, BuildSettingsManager): def __init__(self): UefiBuilder.__init__(self) + self.PlatformList =3D [os.path.join("ArmVirtPkg", "ArmVirtQemu.dsc= "), + os.path.join("ArmVirtPkg", "ArmVirtKvmTool.dsc")] =20 def AddCommandLineOptions(self, parserObj): ''' Add command line options to the argparser ''' parserObj.add_argument('-a', "--arch", dest=3D"build_arch", type= =3Dstr, default=3D"AARCH64", help=3D"Optional - Architecture to build. = Default =3D AARCH64") + parserObj.add_argument('-d', "--dsc", dest=3D"active_platform", ty= pe=3Dstr, default=3Dself.PlatformList[0], + help=3D"Optional - Platform to build. Defa= ult =3D " + self.PlatformList[0]) =20 def RetrieveCommandLineOptions(self, args): ''' Retrieve command line options from the argparser ''' @@ -162,8 +168,12 @@ class PlatformBuilder(UefiBuilder, BuildSettingsManage= r): shell_environment.GetBuildVars().SetValue( "TARGET_ARCH", args.build_arch.upper(), "From CmdLine") =20 - shell_environment.GetBuildVars().SetValue( - "ACTIVE_PLATFORM", "ArmVirtPkg/ArmVirtQemu.dsc", "From CmdLine= ") + if (args.active_platform =3D=3D self.PlatformList[1]): + shell_environment.GetBuildVars().SetValue( + "ACTIVE_PLATFORM", self.PlatformList[1], "From CmdLine") + else: + shell_environment.GetBuildVars().SetValue( + "ACTIVE_PLATFORM", self.PlatformList[0], "From CmdLine") =20 def GetWorkspaceRoot(self): ''' get WorkspacePath ''' @@ -207,9 +217,12 @@ class PlatformBuilder(UefiBuilder, BuildSettingsManage= r): =20 def SetPlatformEnv(self): logging.debug("PlatformBuilder SetPlatformEnv") - self.env.SetValue("PRODUCT_NAME", "ArmVirtQemu", "Platform Hardcod= ed") self.env.SetValue("MAKE_STARTUP_NSH", "FALSE", "Default to false") self.env.SetValue("QEMU_HEADLESS", "FALSE", "Default to false") + if (self.env.GetValue("ACTIVE_PLATFORM") =3D=3D self.PlatformList[= 1]): + self.env.SetValue("PRODUCT_NAME", "ArmVirtKvmtool", "Platform = Hardcoded") + else: + self.env.SetValue("PRODUCT_NAME", "ArmVirtQemu", "Platform Har= dcoded") return 0 =20 def PlatformPreBuild(self): @@ -219,58 +232,61 @@ class PlatformBuilder(UefiBuilder, BuildSettingsManag= er): return 0 =20 def FlashRomImage(self): - VirtualDrive =3D os.path.join(self.env.GetValue( - "BUILD_OUTPUT_BASE"), "VirtualDrive") - os.makedirs(VirtualDrive, exist_ok=3DTrue) - OutputPath_FV =3D os.path.join( - self.env.GetValue("BUILD_OUTPUT_BASE"), "FV") - Built_FV =3D os.path.join(OutputPath_FV, "QEMU_EFI.fd") - - # pad fd to 64mb - with open(Built_FV, "ab") as fvfile: - fvfile.seek(0, os.SEEK_END) - additional =3D b'\0' * ((64 * 1024 * 1024)-fvfile.tell()) - fvfile.write(additional) - - # QEMU must be on that path - - # Unique Command and Args parameters per ARCH - if (self.env.GetValue("TARGET_ARCH").upper() =3D=3D "AARCH64"): - cmd =3D "qemu-system-aarch64" - args =3D "-M virt" - args +=3D " -cpu cortex-a57" = # emulate cpu - elif(self.env.GetValue("TARGET_ARCH").upper() =3D=3D "ARM"): - cmd =3D "qemu-system-arm" - args =3D "-M virt" - args +=3D " -cpu cortex-a15" = # emulate cpu + if (self.env.GetValue("ACTIVE_PLATFORM") =3D=3D self.PlatformList[= 1]): + return 0 else: - raise NotImplementedError() - - # Common Args - args +=3D " -pflash " + Built_FV = # path to fw - args +=3D " -m 1024" = # 1gb memory - # turn off network - args +=3D " -net none" - # Serial messages out - args +=3D " -serial stdio" - # Mount disk with startup.nsh - args +=3D f" -drive file=3Dfat:rw:{VirtualDrive},format=3Draw,medi= a=3Ddisk" - - # Conditional Args - if (self.env.GetValue("QEMU_HEADLESS").upper() =3D=3D "TRUE"): - args +=3D " -display none" # no graphics - - if (self.env.GetValue("MAKE_STARTUP_NSH").upper() =3D=3D "TRUE"): - f =3D open(os.path.join(VirtualDrive, "startup.nsh"), "w") - f.write("BOOT SUCCESS !!! \n") - # add commands here - f.write("reset -s\n") - f.close() - - ret =3D RunCmd(cmd, args) - - if ret =3D=3D 0xc0000005: - # for some reason getting a c0000005 on successful return - return 0 - - return ret + VirtualDrive =3D os.path.join(self.env.GetValue( + "BUILD_OUTPUT_BASE"), "VirtualDrive") + os.makedirs(VirtualDrive, exist_ok=3DTrue) + OutputPath_FV =3D os.path.join( + self.env.GetValue("BUILD_OUTPUT_BASE"), "FV") + Built_FV =3D os.path.join(OutputPath_FV, "QEMU_EFI.fd") + + # pad fd to 64mb + with open(Built_FV, "ab") as fvfile: + fvfile.seek(0, os.SEEK_END) + additional =3D b'\0' * ((64 * 1024 * 1024)-fvfile.tell()) + fvfile.write(additional) + + # QEMU must be on that path + + # Unique Command and Args parameters per ARCH + if (self.env.GetValue("TARGET_ARCH").upper() =3D=3D "AARCH64= "): + cmd =3D "qemu-system-aarch64" + args =3D "-M virt" + args +=3D " -cpu cortex-a57" = # emulate cpu + elif(self.env.GetValue("TARGET_ARCH").upper() =3D=3D "ARM"): + cmd =3D "qemu-system-arm" + args =3D "-M virt" + args +=3D " -cpu cortex-a15" = # emulate cpu + else: + raise NotImplementedError() + + # Common Args + args +=3D " -pflash " + Built_FV = # path to fw + args +=3D " -m 1024" = # 1gb memory + # turn off network + args +=3D " -net none" + # Serial messages out + args +=3D " -serial stdio" + # Mount disk with startup.nsh + args +=3D f" -drive file=3Dfat:rw:{VirtualDrive},format=3Dra= w,media=3Ddisk" + + # Conditional Args + if (self.env.GetValue("QEMU_HEADLESS").upper() =3D=3D "TRUE"= ): + args +=3D " -display none" # no graphics + + if (self.env.GetValue("MAKE_STARTUP_NSH").upper() =3D=3D "TR= UE"): + f =3D open(os.path.join(VirtualDrive, "startup.nsh"), "w= ") + f.write("BOOT SUCCESS !!! \n") + # add commands here + f.write("reset -s\n") + f.close() + + ret =3D RunCmd(cmd, args) + + if ret =3D=3D 0xc0000005: + # for some reason getting a c0000005 on successful return + return 0 + + return ret diff --git a/ArmVirtPkg/PlatformCI/ReadMe.md b/ArmVirtPkg/PlatformCI/ReadMe= .md index 7c11d925f59ede4717d4b210df9d2b97f755ebd8..98a3ca91f40c075bf1a2069edd9= 9e9680a1252e9 100644 --- a/ArmVirtPkg/PlatformCI/ReadMe.md +++ b/ArmVirtPkg/PlatformCI/ReadMe.md @@ -6,13 +6,14 @@ to use the same Pytools based build infrastructure locall= y. ## Supported Configuration Details =20 This solution for building and running ArmVirtPkg has only been validated = with Ubuntu -18.04 and the GCC5 toolchain. Two different firmware builds are supported = and are -described below. +18.04 and the GCC5 toolchain. The supported firmware builds are described = below. =20 -| Configuration name | Architecture | DSC File |Additio= nal Flags | -| :---------- | :----- | :----- | :---- = | -| AARCH64 | AARCH64 | ArmVirtQemu.dsc | None = | -| ARM | ARM | ArmVirtQemu.dsc | None = | +| Configuration name | Architecture | DSC File |Addi= tional Flags | +| :---------- | :----- | :----- | :--= -- | +| AARCH64 | AARCH64 | ArmVirtQemu.dsc | Non= e | +| ARM | ARM | ArmVirtQemu.dsc | Non= e | +| AARCH64 | AARCH64 | ArmVirtKvmTool.dsc | Non= e | +| ARM | ARM | ArmVirtKvmTool.dsc | Non= e | =20 ## EDK2 Developer environment =20 @@ -79,7 +80,13 @@ Pytools build system. ``` =20 - use `stuart_build -c ArmVirtPkg/PlatformCI/PlatformBuild.py -h` opti= on to see additional - options like `--clean` + options like `--clean`, `--dsc`, etc. + + Example: The `--dsc` option can be used to specify the platform to bui= ld. + + ``` bash + stuart_build -c ArmVirtPkg/PlatformCI/PlatformBuild.py TOOL_CHAIN_TA= G=3D -a --dsc ArmVirtPkg/ArmVirtKvmTool.dsc + ``` =20 8. Running Emulator - You can add `--FlashRom` to the end of your build command and the em= ulator will run after the --=20 'Guid(CE165669-3EF3-493F-B85D-6190EE5B9759)' -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#70689): https://edk2.groups.io/g/devel/message/70689 Mute This Topic: https://groups.io/mt/80035810/1787277 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- From nobody Sat Apr 27 18:33:42 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+70691+1787277+3901457@groups.io; arc=fail (BodyHash is different from the expected one); dmarc=fail(p=none dis=none) header.from=arm.com Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by mx.zohomail.com with SMTPS id 161133600765514.775159953948332; Fri, 22 Jan 2021 09:20:07 -0800 (PST) Return-Path: X-Received: by 127.0.0.2 with SMTP id SGFbYY1788612xw1xlMvS4IO; Fri, 22 Jan 2021 09:20:07 -0800 X-Received: from EUR03-AM5-obe.outbound.protection.outlook.com (EUR03-AM5-obe.outbound.protection.outlook.com [40.107.3.47]) by mx.groups.io with SMTP id smtpd.web09.12310.1611336000216009625 for ; Fri, 22 Jan 2021 09:20:00 -0800 X-Received: from DU2PR04CA0016.eurprd04.prod.outlook.com (2603:10a6:10:3b::21) by VE1PR08MB5072.eurprd08.prod.outlook.com (2603:10a6:803:10a::31) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3784.11; Fri, 22 Jan 2021 17:19:56 +0000 X-Received: from DB5EUR03FT033.eop-EUR03.prod.protection.outlook.com (2603:10a6:10:3b:cafe::b7) by DU2PR04CA0016.outlook.office365.com (2603:10a6:10:3b::21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3784.11 via Frontend Transport; Fri, 22 Jan 2021 17:19:56 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; edk2.groups.io; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;edk2.groups.io; dmarc=pass action=none header.from=arm.com; Received-SPF: pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) client-ip=66.175.222.108; envelope-from=bounce+27952+70691+1787277+3901457@groups.io; helo=mail02.groups.io; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com; X-Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by DB5EUR03FT033.mail.protection.outlook.com (10.152.20.76) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3784.11 via Frontend Transport; Fri, 22 Jan 2021 17:19:56 +0000 X-Received: ("Tessian outbound 2b57fdd78668:v71"); Fri, 22 Jan 2021 17:19:55 +0000 X-CheckRecipientChecked: true X-CR-MTA-CID: fddd752541fe2d73 X-CR-MTA-TID: 64aa7808 X-Received: from 215707dfefff.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id 74FB461F-DBEC-4923-BF5B-065A5CD3DB7B.1; Fri, 22 Jan 2021 17:19:50 +0000 X-Received: from EUR01-VE1-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 215707dfefff.1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Fri, 22 Jan 2021 17:19:50 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=MoGJOmmctSQfrBjqRr5a8xl3LvDvvWprA4smXT86B9fo4vtEC/wnF4H6UpRSxUHzDCMbVKlg1xifBjF4z2JQUszekuEk27UrCBmoqJGmT2B9moYWxuTkaAR67UmbcQ78ciBj8fPUu6bXcKfNKswZRav8Jt8t2snjSolnPZr/9ZsSysbZ2fO7cjzK5/5lkV1f4IwMI+7zgTOCoP2InUIVlhDXrxupPRNtwqTeHDIZRgOsX9yHuTfspMuQrN7KWzWN3jFj+54uNqAk2BSlORB56hOu8st0h/60w0PirxQOXF+ImZPd189P/Ki1cY/m7r/2xsb06xmsETBjsi+Uug4DIA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=3JogfTpyoAB+AvHs6mEEI19vdKDEvnuyVxB792N1Ywo=; b=YtSNGWsQ9nu+E+FIDP6+DwNyF4vsebaJ/T3jEZ6SKBDcG/XgEqtLZSQIf3X+l1Hj6ouXPAd7BS8F6e06Sbmy8XufULrdzTJkAVivdirpzz2lTGL4xRThAyWfGdZuV7MkmjyX0M6ZFZFtYAJjKLm5ZkKL8LsmDspNJPCyGZckCedkmbKqnQvHb2N0PHAahrOgecMwgP7rqdZz/sUOZSGWm1g19sxb9vrKr91xxPz62yO3sPBJaPgBiAP+n/ArEdy2Z9x6rty9D/G74fOlYK2wfqrCrhQ81Zx56EH8cAlRx6klplyWWSrhm5XaFdywyFN27EW97xtnqikkSHCRxb4lAg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 40.67.248.234) smtp.rcpttodomain=edk2.groups.io smtp.mailfrom=arm.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com; dkim=none (message not signed); arc=none X-Received: from AM5PR0601CA0070.eurprd06.prod.outlook.com (2603:10a6:206::35) by DB8PR08MB5291.eurprd08.prod.outlook.com (2603:10a6:10:ad::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3763.9; Fri, 22 Jan 2021 17:19:48 +0000 X-Received: from AM5EUR03FT042.eop-EUR03.prod.protection.outlook.com (2603:10a6:206:0:cafe::27) by AM5PR0601CA0070.outlook.office365.com (2603:10a6:206::35) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3784.12 via Frontend Transport; Fri, 22 Jan 2021 17:19:48 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 40.67.248.234) smtp.mailfrom=arm.com; edk2.groups.io; dkim=none (message not signed) header.d=none;edk2.groups.io; dmarc=pass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 40.67.248.234 as permitted sender) receiver=protection.outlook.com; client-ip=40.67.248.234; helo=nebula.arm.com; X-Received: from nebula.arm.com (40.67.248.234) by AM5EUR03FT042.mail.protection.outlook.com (10.152.17.168) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.3784.11 via Frontend Transport; Fri, 22 Jan 2021 17:19:47 +0000 X-Received: from AZ-NEU-EX04.Arm.com (10.251.24.32) by AZ-NEU-EX03.Arm.com (10.251.24.31) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2044.4; Fri, 22 Jan 2021 17:19:43 +0000 X-Received: from E107187.Arm.com (10.57.3.168) by mail.arm.com (10.251.24.32) with Microsoft SMTP Server id 15.1.2044.4 via Frontend Transport; Fri, 22 Jan 2021 17:19:43 +0000 From: "Sami Mujawar" To: CC: Sami Mujawar , , , , , , , , , , Subject: [edk2-devel] [PATCH v1 2/2] ArmVirtPkg/.azurepipelines: Add Kvmtool to platform CI matrix Date: Fri, 22 Jan 2021 17:19:41 +0000 Message-ID: <20210122171941.30724-3-sami.mujawar@arm.com> In-Reply-To: <20210122171941.30724-1-sami.mujawar@arm.com> References: <20210122171941.30724-1-sami.mujawar@arm.com> MIME-Version: 1.0 X-EOPAttributedMessage: 1 X-MS-Office365-Filtering-HT: Tenant X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: dcebc991-b02a-4cb0-5089-08d8bef9f046 X-MS-TrafficTypeDiagnostic: DB8PR08MB5291:|VE1PR08MB5072: X-Microsoft-Antispam-PRVS: x-checkrecipientrouted: true NoDisclaimer: true X-MS-Oob-TLC-OOBClassifiers: OLM:1303;OLM:1303; X-MS-Exchange-SenderADCheck: 1 X-Microsoft-Antispam-Untrusted: BCL:0; X-Microsoft-Antispam-Message-Info-Original: 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 X-Forefront-Antispam-Report-Untrusted: CIP:40.67.248.234;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:nebula.arm.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(4636009)(346002)(39850400004)(396003)(376002)(136003)(46966006)(336012)(47076005)(82310400003)(478600001)(70586007)(70206006)(8936002)(45080400002)(2906002)(36756003)(1076003)(7696005)(44832011)(426003)(26005)(316002)(4326008)(2616005)(82740400003)(83380400001)(5660300002)(356005)(186003)(86362001)(8676002)(81166007)(54906003)(6916009)(36610700001);DIR:OUT;SFP:1101; X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB8PR08MB5291 X-MS-Exchange-Transport-CrossTenantHeadersStripped: DB5EUR03FT033.eop-EUR03.prod.protection.outlook.com X-MS-Office365-Filtering-Correlation-Id-Prvs: 7e202357-431f-4dc7-faa5-08d8bef9eb6a X-Microsoft-Antispam-Message-Info: Ix6m0/qqSfGTqn5/kenTptT3z6kvweIzhH9U/l0mE/20j8SVgkUG1cn4eK0QBZaS6NJCtljM31sv1TsCCfm40HyyRcvCzQa2dZ3NVEWHZLoiOozTmOAOVc37a1TASHVOKmuNcgWIJJU1DnFyrTxI+J8PJMMxXHNbtb/w9ztLIgTBYDLrBVtptpqikzYkXX8phjNzl4ZcN9YgBg2tscjNGJtNVImmTtjXaK0cEZ4HcLq58VK5tT7o1FoSBM6tzAeTQESlVwnb1oeoMxzfUtO7WGgzu6PsD3LXyjL0RVj9NeAF4nlcfKfPVJkoc9cABm1QpzltcUJcpSJLGrDRtlNf3ZgMrbordfZLHKa6R7ctdZztdowdXayKqE9AonWAqEZ/a5piOdtytbPjucDqg2z5cijmnj06XizdXVo7JdfyV2ptZehAuFPFaLRz2KS4HiiEXilBJ4sXMadbqlwjYt4txg== X-OriginatorOrg: arm.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 22 Jan 2021 17:19:56.0129 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: dcebc991-b02a-4cb0-5089-08d8bef9f046 X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com] X-MS-Exchange-CrossTenant-AuthSource: DB5EUR03FT033.eop-EUR03.prod.protection.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: VE1PR08MB5072 Precedence: Bulk List-Unsubscribe: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,sami.mujawar@arm.com X-Gm-Message-State: hnJOW76PicKX03YPnQOwyzO6x1787277AA= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=groups.io; q=dns/txt; s=20140610; t=1611336007; bh=3v3dJxsxLfjPnoKmpIoChh1rsIC5ipTzUad5DQ8WeRI=; h=CC:Content-Type:Date:From:Reply-To:Subject:To; b=BNcjdbVAwMIn1RNjZNnCyrBMUgxHvEml73O+RplS1dCl87wQQkFACm7oaJpufFJda0k qXgjYsT8tUHr5AQtFhFFwOfbrCejTkQ5PT7jRvj80oXd5zFlO6CMqRzwmorpXcfQLyC8O 33EHP7gV/l2b4Vrmi4CJFsNQntwn/XozouU= X-ZohoMail-DKIM: pass (identity @groups.io) Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" Add Kvmtool firmware build to the platform CI matrix. Signed-off-by: Sami Mujawar Acked-by: Ard Biesheuvel Acked-by: Liming Gao --- ArmVirtPkg/PlatformCI/.azurepipelines/Ubuntu-GCC5.yml | 45 +++++++++++++++= ++++- 1 file changed, 44 insertions(+), 1 deletion(-) diff --git a/ArmVirtPkg/PlatformCI/.azurepipelines/Ubuntu-GCC5.yml b/ArmVir= tPkg/PlatformCI/.azurepipelines/Ubuntu-GCC5.yml index b07e3199f14307c16df0b16b5eff076a3a798b04..4c8de30eb7c9cb5de5a62f663c5= 56869d4843106 100644 --- a/ArmVirtPkg/PlatformCI/.azurepipelines/Ubuntu-GCC5.yml +++ b/ArmVirtPkg/PlatformCI/.azurepipelines/Ubuntu-GCC5.yml @@ -6,6 +6,7 @@ # Toolchain: GCC5 # # Copyright (c) Microsoft Corporation. +# Copyright (c) 2021, Arm Limited. All rights reserved.
# SPDX-License-Identifier: BSD-2-Clause-Patent ## trigger: @@ -22,6 +23,7 @@ jobs: vm_image: 'ubuntu-18.04' should_run: true run_flags: "MAKE_STARTUP_NSH=3DTRUE QEMU_HEADLESS=3DTRUE" + kvmtool_flags: "--dsc ArmVirtPkg/ArmVirtKvmTool.dsc" =20 #Use matrix to speed up the build process strategy: @@ -68,7 +70,48 @@ jobs: Build.Target: "NOOPT" Run.Flags: $(run_flags) Run: $(should_run) - + KVMTOOL_AARCH64_DEBUG: + Build.File: "$(package)/PlatformCI/PlatformBuild.py" + Build.Arch: "AARCH64" + Build.Flags: $(kvmtool_flags) + Build.Target: "DEBUG" + Run.Flags: "" + Run: false + KVMTOOL_AARCH64_RELEASE: + Build.File: "$(package)/PlatformCI/PlatformBuild.py" + Build.Arch: "AARCH64" + Build.Flags: $(kvmtool_flags) + Build.Target: "RELEASE" + Run.Flags: "" + Run: false + KVMTOOL_AARCH64_NOOPT: + Build.File: "$(package)/PlatformCI/PlatformBuild.py" + Build.Arch: "AARCH64" + Build.Flags: $(kvmtool_flags) + Build.Target: "NOOPT" + Run.Flags: "" + Run: false + KVMTOOL_ARM_DEBUG: + Build.File: "$(package)/PlatformCI/PlatformBuild.py" + Build.Arch: "ARM" + Build.Flags: $(kvmtool_flags) + Build.Target: "DEBUG" + Run.Flags: "" + Run: false + KVMTOOL_ARM_RELEASE: + Build.File: "$(package)/PlatformCI/PlatformBuild.py" + Build.Arch: "ARM" + Build.Flags: $(kvmtool_flags) + Build.Target: "RELEASE" + Run.Flags: "" + Run: false + KVMTOOL_ARM_NOOPT: + Build.File: "$(package)/PlatformCI/PlatformBuild.py" + Build.Arch: "ARM" + Build.Flags: $(kvmtool_flags) + Build.Target: "NOOPT" + Run.Flags: "" + Run: false workspace: clean: all =20 --=20 'Guid(CE165669-3EF3-493F-B85D-6190EE5B9759)' -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#70691): https://edk2.groups.io/g/devel/message/70691 Mute This Topic: https://groups.io/mt/80035812/1787277 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-