]> git.proxmox.com Git - mirror_edk2.git/commitdiff
Maintainers: refresh the OVMF SEV subsystem after TianoCore #2198 and #3077
authorLaszlo Ersek <lersek@redhat.com>
Wed, 10 Mar 2021 18:56:48 +0000 (19:56 +0100)
committermergify[bot] <37929162+mergify[bot]@users.noreply.github.com>
Thu, 18 Mar 2021 17:12:02 +0000 (17:12 +0000)
Tom added initial SEV-ES support (tracked under TianoCore#2198) in commit
range 7f7f511c5a74..7f0b28415cb4. The last commit in that range created
the "OvmfPkg: SEV-related modules" section in "Maintainers.txt".

However, we didn't list the "OvmfPkg/ResetVector" module, which had
received significant updates, enabling QEMU to learn details about the
firmware, from parsing the flash image. The SEC phase of OVMF
("OvmfPkg/Sec") gained a new responsibility as well (#VC exception
handling). List both modules now.

James introduced the remote attested / encrypted boot OVMF platform (under
TianoCore#3077) in commit range ef3e73c6a0c0..01726b6d23d4. This work
further extended "OvmfPkg/ResetVector", and added:

  OvmfPkg/AmdSev/
  OvmfPkg/Include/Guid/ConfidentialComputingSecret.h
  OvmfPkg/Library/PlatformBootManagerLibGrub/

List these too in the "OvmfPkg: SEV-related modules" section, and
designate James as a reviewer.

Cc: Andrew Fish <afish@apple.com>
Cc: Ard Biesheuvel <ardb+tianocore@kernel.org>
Cc: Brijesh Singh <brijesh.singh@amd.com>
Cc: James Bottomley <jejb@linux.ibm.com>
Cc: Jiewen Yao <jiewen.yao@intel.com>
Cc: Jordan Justen <jordan.l.justen@intel.com>
Cc: Leif Lindholm <leif@nuviainc.com>
Cc: Michael D Kinney <michael.d.kinney@intel.com>
Cc: Min Xu <min.m.xu@intel.com>
Cc: Philippe Mathieu-Daudé <philmd@redhat.com>
Cc: Tom Lendacky <thomas.lendacky@amd.com>
Ref: https://bugzilla.tianocore.org/show_bug.cgi?id=2198
Ref: https://bugzilla.tianocore.org/show_bug.cgi?id=3077
Signed-off-by: Laszlo Ersek <lersek@redhat.com>
Message-Id: <20210310185649.19801-2-lersek@redhat.com>
Acked-by: Ard Biesheuvel <ardb@kernel.org>
Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com>
Acked-by: Brijesh Singh <brijesh.singh@amd.com>
Acked-by: Tom Lendacky <thomas.lendacky@amd.com>
Acked-by: Jiewen Yao <jiewen.yao@intel.com>
Acked-by: Leif Lindholm <leif@nuviainc.com>
Acked-by: James Bottomley <jejb@linux.ibm.com>
Acked-by: Min Xu <min.m.xu@intel.com>
Maintainers.txt

index e38497123857e4aed26327f3328a31df4bca7904..78d0d22bb8b4d4ab7d6380102c108b718e2deaaa 100644 (file)
@@ -456,14 +456,20 @@ R: Liran Alon <liran.alon@oracle.com>
 R: Nikita Leshenko <nikita.leshchenko@oracle.com>\r
 \r
 OvmfPkg: SEV-related modules\r
+F: OvmfPkg/AmdSev/\r
 F: OvmfPkg/AmdSevDxe/\r
+F: OvmfPkg/Include/Guid/ConfidentialComputingSecret.h\r
 F: OvmfPkg/Include/Library/MemEncryptSevLib.h\r
 F: OvmfPkg/IoMmuDxe/AmdSevIoMmu.*\r
 F: OvmfPkg/Library/BaseMemEncryptSevLib/\r
+F: OvmfPkg/Library/PlatformBootManagerLibGrub/\r
 F: OvmfPkg/Library/VmgExitLib/\r
 F: OvmfPkg/PlatformPei/AmdSev.c\r
+F: OvmfPkg/ResetVector/\r
+F: OvmfPkg/Sec/\r
 R: Tom Lendacky <thomas.lendacky@amd.com>\r
 R: Brijesh Singh <brijesh.singh@amd.com>\r
+R: James Bottomley <jejb@linux.ibm.com>\r
 \r
 OvmfPkg: TCG- and TPM2-related modules\r
 F: OvmfPkg/Include/IndustryStandard/QemuTpm.h\r