public inbox for devel@edk2.groups.io
 help / color / mirror / Atom feed
From: "Yao, Jiewen" <jiewen.yao@intel.com>
To: "devel@edk2.groups.io" <devel@edk2.groups.io>,
	"jejb@linux.ibm.com" <jejb@linux.ibm.com>,
	Laszlo Ersek <lersek@redhat.com>,
	"Xu, Min M" <min.m.xu@intel.com>,
	Brijesh Singh <brijesh.singh@amd.com>,
	Tom Lendacky <thomas.lendacky@amd.com>
Cc: Andrew Fish <afish@apple.com>, Leif Lindholm <leif@nuviainc.com>,
	"Kinney, Michael D" <michael.d.kinney@intel.com>
Subject: Re: [edk2-devel] [PATCH 2/2] Maintainers.txt: Add reviewers for Confidential Computing related modules
Date: Wed, 10 Mar 2021 17:04:37 +0000	[thread overview]
Message-ID: <BY5PR11MB4166B5D6F2431AF6F87209508C919@BY5PR11MB4166.namprd11.prod.outlook.com> (raw)
In-Reply-To: <a6a5e6fc061eb28267e281990d4a0540c78b1522.camel@linux.ibm.com>

Agree. Just one "confidential computing" can make things simpler.


> -----Original Message-----
> From: devel@edk2.groups.io <devel@edk2.groups.io> On Behalf Of James
> Bottomley
> Sent: Wednesday, March 10, 2021 11:34 PM
> To: Laszlo Ersek <lersek@redhat.com>; Xu, Min M <min.m.xu@intel.com>; Yao,
> Jiewen <jiewen.yao@intel.com>; Brijesh Singh <brijesh.singh@amd.com>; Tom
> Lendacky <thomas.lendacky@amd.com>
> Cc: devel@edk2.groups.io; Andrew Fish <afish@apple.com>; Leif Lindholm
> <leif@nuviainc.com>; Kinney, Michael D <michael.d.kinney@intel.com>
> Subject: Re: [edk2-devel] [PATCH 2/2] Maintainers.txt: Add reviewers for
> Confidential Computing related modules
> 
> On Wed, 2021-03-10 at 15:20 +0100, Laszlo Ersek wrote:
> [...]
> > (2) Reviewing this patch makes me realize we've missed some
> > "Maintainers.txt" updates in the past, in relation to SEV and/or
> > confidential computing.
> >
> > Namely, we did not designated any reviewers for the following
> > pathnames:
> >
> >   OvmfPkg/AmdSev/
> >   OvmfPkg/Include/Guid/ConfidentialComputingSecret.h
> >   OvmfPkg/Library/PlatformBootManagerLibGrub/
> >
> > (from <https://bugzilla.tianocore.org/show_bug.cgi?id=3077>;), also
> >
> >   OvmfPkg/ResetVector/
> >
> > (from <https://bugzilla.tianocore.org/show_bug.cgi?id=2198>;).
> >
> > That should be fixed up before adding anything TDX related (I can
> > submit a patch series, but first, the next point needs to be
> > cleared.)
> 
> I'm happy to be added for all of it ... the first three are all me and
> the last one I added something to.
> 
> > (3) After racking my brain for half an hour, I can find no good way
> > to have TDX/SEV separation *plus* a Confidential Computing section in
> > "Maintainers.txt". Whatever I managed to think of requires us to
> > either duplicate email addresses, or duplicate pathnames ("F:"
> > patterns) -- or even both.
> >
> > So... can we simply rename the current SEV subsystem to "Confidential
> > Computing", and keep both TDX and SEV modules under it? We could
> > place a unified email address list there, with Brijesh, James,
> > Jiewen, Min, Tom.
> >
> > I don't think this should cause any confusion, because:
> >
> > - @intel.com emails are clearly closely associated with TDX, and
> > @amd.com emails are clearly closely associated with SEV,
> >
> > - most filenames will (or do already) include "AmdSev" or "Tdx",
> >
> > - future patches should clearly label themselves as "SEV only", "TDX
> > only", or "confidential computing in general" -- this should be clear
> > from the patch subjects.
> 
> That should work ... it's entirely possible that SecretDxe and
> SecretPei can work for Intel as well ... we don't know yet, so they may
> not need a prefix.
> 
> > IOW, there should be no confusion as to who's required to review
> > what, but at the same time we'd have a simple solution for cross-
> > posting all interested parties.
> >
> > Thoughts?
> 
> Works for me ... IBM is interested in both SEV and TDX and having them
> be as similar as posisble.
> 
> James
> 
> 
> 
> 
> 
> 


  reply	other threads:[~2021-03-10 17:05 UTC|newest]

Thread overview: 11+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2021-03-10  2:55 [PATCH 0/2] Update Maintainers.txt for TDX and Confidential Computing Min Xu
2021-03-10  2:55 ` [PATCH 1/2] Maintainers.txt: Add reviewers for the OvmfPkg TDX-related files Min Xu
2021-03-10 13:12   ` Laszlo Ersek
2021-03-10 13:20     ` Laszlo Ersek
2021-03-10  2:55 ` [PATCH 2/2] Maintainers.txt: Add reviewers for Confidential Computing related modules Min Xu
2021-03-10 14:20   ` Laszlo Ersek
2021-03-10 15:09     ` Lendacky, Thomas
2021-03-10 15:29       ` Brijesh Singh
2021-03-10 15:33     ` James Bottomley
2021-03-10 17:04       ` Yao, Jiewen [this message]
2021-03-10  3:03 ` [PATCH 0/2] Update Maintainers.txt for TDX and Confidential Computing Yao, Jiewen

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-list from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=BY5PR11MB4166B5D6F2431AF6F87209508C919@BY5PR11MB4166.namprd11.prod.outlook.com \
    --to=devel@edk2.groups.io \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox