audk/Maintainers.txt

617 lines
23 KiB
Plaintext
Raw Normal View History

EDK II Maintainers
==================
This file provides information about the primary maintainers for
EDK II.
In general, you should not privately email the maintainer. You should
email the edk2-devel list, and Cc the package maintainers and
reviewers.
If the package maintainer wants to hand over the role to other people,
the package maintainer should send the patch to update Maintainers.txt
with new maintainer, and the new maintainer should follow up with
an Acked-by or a Reviewed-by.
Descriptions of section entries:
L: Mailing list that is relevant to this area (default is edk2-devel)
Patches and questions should be sent to the email list.
M: Package Maintainer: Cc address for patches and questions. Responsible
for reviewing and pushing package changes to source control.
R: Package Reviewer: Cc address for patches and questions. Reviewers help
maintainers review code, but don't have push access. A designated Package
Reviewer is reasonably familiar with the Package (or some modules
thereof), and/or provides testing or regression testing for the Package
(or some modules thereof), in certain platforms and environments.
W: Web-page with status/info
T: SCM tree type and location. Type is one of: git, svn.
S: Status, one of the following:
Supported: Someone is actually paid to look after this.
Maintained: Someone actually looks after it.
Odd Fixes: It has a maintainer but they don't have time to do
much other than throw the odd patch in. See below.
Orphan: No current maintainer [but maybe you could take the
role as you write your new code].
Obsolete: Old code. Something tagged obsolete generally means
it has been replaced by a better system and you
should be using that.
F: Files and directories with wildcard patterns.
A trailing slash includes all files and subdirectory files.
F: MdeModulePkg/ all files in and below MdeModulePkg
F: MdeModulePkg/* all files in MdeModulePkg, but not below
F: */Pci/* all files in a directory called Pci, at any depth in
the hierarchy, but not below
One pattern per line. Multiple F: lines per section acceptable.
X: Files and directories that are NOT maintained, same rules as F:
Files exclusions are tested after file matches.
Can be useful for excluding a specific subdirectory, for instance:
F: NetworkPkg/
X: NetworkPkg/Ip6Dxe/
matches all files in and below NetworkPkg excluding NetworkPkg/Ip6Dxe/
Filenames not caught by any F: rule get matched as being located in the top-
level directory. (Internally, the script looks for a match called '<default>',
so please don't add a file called that in the top-level directory.)
EDK II
------
W: http://www.tianocore.org/edk2/
L: https://edk2.groups.io/g/devel/
T: git - https://github.com/tianocore/edk2.git
T: git (mirror) - https://bitbucket.org/tianocore/edk2.git
All patches CC:d here
L: devel@edk2.groups.io
F: *
F: */
Tianocore Stewards
------------------
F: *
M: Andrew Fish <afish@apple.com> [ajfish]
M: Leif Lindholm <quic_llindhol@quicinc.com> [leiflindholm]
M: Michael D Kinney <michael.d.kinney@intel.com> [mdkinney]
Responsible Disclosure, Reporting Security Issues
-------------------------------------------------
W: https://github.com/tianocore/tianocore.github.io/wiki/Security
EDK II Releases:
----------------
W: https://github.com/tianocore/tianocore.github.io/wiki/EDK-II-Release-Planning
M: Liming Gao <gaoliming@byosoft.com.cn> [lgao4]
UEFI Shell Binaries (ShellBinPkg.zip) from EDK II Releases:
-----------------------------------------------------------
W: https://github.com/tianocore/edk2/releases/
M: Ray Ni <ray.ni@intel.com> [niruiyu] (Ia32/X64)
M: Zhichao Gao <zhichao.gao@intel.com> [ZhichaoGao] (Ia32/X64)
M: Leif Lindholm <quic_llindhol@quicinc.com> [leiflindholm] (ARM/AArch64)
M: Ard Biesheuvel <ardb+tianocore@kernel.org> [ardbiesheuvel] (ARM/AArch64)
EDK II Architectures:
---------------------
ARM, AARCH64
F: */AArch64/
F: */Arm/
M: Leif Lindholm <quic_llindhol@quicinc.com> [leiflindholm]
M: Ard Biesheuvel <ardb+tianocore@kernel.org> [ardbiesheuvel]
RISCV64
F: */RiscV64/
M: Sunil V L <sunilvl@ventanamicro.com> [vlsunil]
R: Daniel Schaefer <git@danielschaefer.me> [JohnAZoidberg]
EDK II Continuous Integration:
------------------------------
.azurepipelines/
F: .azurepipelines/
M: Sean Brogan <sean.brogan@microsoft.com> [spbrogan]
M: Michael Kubacki <mikuback@linux.microsoft.com> [makubacki]
R: Michael D Kinney <michael.d.kinney@intel.com> [mdkinney]
R: Liming Gao <gaoliming@byosoft.com.cn> [lgao4]
.mergify/
F: .mergify/
M: Michael D Kinney <michael.d.kinney@intel.com> [mdkinney]
M: Liming Gao <gaoliming@byosoft.com.cn> [lgao4]
R: Sean Brogan <sean.brogan@microsoft.com> [spbrogan]
.pytool/
F: .pytool/
M: Sean Brogan <sean.brogan@microsoft.com> [spbrogan]
M: Michael Kubacki <mikuback@linux.microsoft.com> [makubacki]
R: Michael D Kinney <michael.d.kinney@intel.com> [mdkinney]
R: Liming Gao <gaoliming@byosoft.com.cn> [lgao4]
EDK II Packages:
----------------
ArmPkg
F: ArmPkg/
W: https://github.com/tianocore/tianocore.github.io/wiki/ArmPkg
M: Leif Lindholm <quic_llindhol@quicinc.com> [leiflindholm]
M: Ard Biesheuvel <ardb+tianocore@kernel.org> [ardbiesheuvel]
R: Sami Mujawar <sami.mujawar@arm.com> [samimujawar]
ArmPlatformPkg
F: ArmPlatformPkg/
W: https://github.com/tianocore/tianocore.github.io/wiki/ArmPlatformPkg
M: Leif Lindholm <quic_llindhol@quicinc.com> [leiflindholm]
M: Ard Biesheuvel <ardb+tianocore@kernel.org> [ardbiesheuvel]
ArmVirtPkg
F: ArmVirtPkg/
W: https://github.com/tianocore/tianocore.github.io/wiki/ArmVirtPkg
M: Ard Biesheuvel <ardb+tianocore@kernel.org> [ardbiesheuvel]
R: Leif Lindholm <quic_llindhol@quicinc.com> [leiflindholm]
R: Sami Mujawar <sami.mujawar@arm.com> [samimujawar]
R: Gerd Hoffmann <kraxel@redhat.com> [kraxel]
ArmVirtPkg: modules used on Xen
F: ArmVirtPkg/ArmVirtXen.*
F: ArmVirtPkg/Library/XenArmGenericTimerVirtCounterLib/
F: ArmVirtPkg/Library/XenVirtMemInfoLib/
F: ArmVirtPkg/PrePi/
F: ArmVirtPkg/XenAcpiPlatformDxe/
F: ArmVirtPkg/XenPlatformHasAcpiDtDxe/
F: ArmVirtPkg/XenioFdtDxe/
R: Julien Grall <julien@xen.org> [jgrall]
BaseTools
F: BaseTools/
W: https://github.com/tianocore/tianocore.github.io/wiki/BaseTools
M: Bob Feng <bob.c.feng@intel.com> [BobCF]
M: Liming Gao <gaoliming@byosoft.com.cn> [lgao4]
R: Yuwei Chen <yuwei.chen@intel.com> [YuweiChen1110]
CryptoPkg
F: CryptoPkg/
W: https://github.com/tianocore/tianocore.github.io/wiki/CryptoPkg
M: Jiewen Yao <jiewen.yao@intel.com> [jyao1]
M: Jian J Wang <jian.j.wang@intel.com> [jwang36]
R: Xiaoyu Lu <xiaoyu1.lu@intel.com> [xiaoyuxlu]
R: Guomin Jiang <guomin.jiang@intel.com> [guominjia]
DynamicTablesPkg
F: DynamicTablesPkg/
W: https://github.com/tianocore/tianocore.github.io/wiki/DynamicTablesPkg
M: Sami Mujawar <Sami.Mujawar@arm.com> [samimujawar]
M: Alexei Fedorov <Alexei.Fedorov@arm.com> [AlexeiFedorov]
EmbeddedPkg
F: EmbeddedPkg/
W: https://github.com/tianocore/tianocore.github.io/wiki/EmbeddedPkg
M: Leif Lindholm <quic_llindhol@quicinc.com> [leiflindholm]
M: Ard Biesheuvel <ardb+tianocore@kernel.org> [ardbiesheuvel]
M: Abner Chang <abner.chang@amd.com> [changab]
R: Daniel Schaefer <git@danielschaefer.me> [JohnAZoidberg]
EmulatorPkg
F: EmulatorPkg/
W: https://github.com/tianocore/tianocore.github.io/wiki/EmulatorPkg
M: Andrew Fish <afish@apple.com> [ajfish]
M: Ray Ni <ray.ni@intel.com> [niruiyu]
S: Maintained
EmulatorPkg: Redfish-related modules
F: EmulatorPkg/*Redfish*
M: Abner Chang <abner.chang@amd.com> [changab]
M: Nickle Wang <nicklew@nvidia.com> [nicklela]
FatPkg
F: FatPkg/
W: https://github.com/tianocore/tianocore.github.io/wiki/Edk2-fat-driver
M: Ray Ni <ray.ni@intel.com> [niruiyu]
T: svn - https://svn.code.sf.net/p/edk2-fatdriver2/code/trunk/EnhancedFat
T: git - https://github.com/tianocore/edk2-FatPkg.git
FmpDevicePkg
F: FmpDevicePkg/
W: https://github.com/tianocore/tianocore.github.io/wiki/FmpDevicePkg
M: Liming Gao <gaoliming@byosoft.com.cn> [lgao4]
M: Michael D Kinney <michael.d.kinney@intel.com> [mdkinney]
R: Guomin Jiang <guomin.jiang@intel.com> [guominjia]
R: Wei6 Xu <wei6.xu@intel.com> [xuweiintel]
IntelFsp2Pkg
F: IntelFsp2Pkg/
W: https://github.com/tianocore/tianocore.github.io/wiki/IntelFsp2Pkg
M: Chasel Chiu <chasel.chiu@intel.com> [ChaselChiu]
M: Nate DeSimone <nathaniel.l.desimone@intel.com> [nate-desimone]
R: Star Zeng <star.zeng@intel.com> [lzeng14]
IntelFsp2WrapperPkg
F: IntelFsp2WrapperPkg/
W: https://github.com/tianocore/tianocore.github.io/wiki/IntelFsp2WrapperPkg
M: Chasel Chiu <chasel.chiu@intel.com> [ChaselChiu]
M: Nate DeSimone <nathaniel.l.desimone@intel.com> [nate-desimone]
R: Star Zeng <star.zeng@intel.com> [lzeng14]
MdeModulePkg
F: MdeModulePkg/
W: https://github.com/tianocore/tianocore.github.io/wiki/MdeModulePkg
M: Jian J Wang <jian.j.wang@intel.com> [jwang36]
M: Liming Gao <gaoliming@byosoft.com.cn> [lgao4]
MdeModulePkg: ACPI modules
F: MdeModulePkg/Include/*Acpi*.h
F: MdeModulePkg/Universal/Acpi/
R: Zhiguang Liu <zhiguang.liu@intel.com> [LiuZhiguang001]
R: Dandan Bi <dandan.bi@intel.com> [dandanbi]
R: Liming Gao <gaoliming@byosoft.com.cn> [lgao4]
MdeModulePkg: ACPI modules related to S3
F: MdeModulePkg/*LockBox*/
F: MdeModulePkg/Include/*BootScript*.h
F: MdeModulePkg/Include/*LockBox*.h
F: MdeModulePkg/Include/*S3*.h
F: MdeModulePkg/Library/*S3*/
R: Hao A Wu <hao.a.wu@intel.com> [hwu25]
R: Eric Dong <eric.dong@intel.com> [ydong10]
MdeModulePkg: BDS modules
F: MdeModulePkg/*BootManager*/
F: MdeModulePkg/Include/Library/UefiBootManagerLib.h
F: MdeModulePkg/Universal/BdsDxe/
F: MdeModulePkg/Universal/DevicePathDxe/
F: MdeModulePkg/Universal/DriverHealthManagerDxe/
F: MdeModulePkg/Universal/LoadFileOnFv2/
F: MdeModulePkg/Universal/SecurityStubDxe/Defer3rdPartyImageLoad.*
R: Zhichao Gao <zhichao.gao@intel.com> [ZhichaoGao]
R: Ray Ni <ray.ni@intel.com> [niruiyu]
MdeModulePkg: Console and Graphics modules
F: MdeModulePkg/*Logo*/
F: MdeModulePkg/Include/*Logo*.h
F: MdeModulePkg/Include/Guid/ConnectConInEvent.h
F: MdeModulePkg/Include/Guid/Console*.h
F: MdeModulePkg/Include/Guid/StandardErrorDevice.h
F: MdeModulePkg/Include/Guid/TtyTerm.h
F: MdeModulePkg/Include/Library/BmpSupportLib.h
F: MdeModulePkg/Include/Library/FrameBufferBltLib.h
F: MdeModulePkg/Library/BaseBmpSupportLib/
F: MdeModulePkg/Library/FrameBufferBltLib/
F: MdeModulePkg/Universal/Console/
R: Zhichao Gao <zhichao.gao@intel.com> [ZhichaoGao]
R: Ray Ni <ray.ni@intel.com> [niruiyu]
MdeModulePkg: Core services (PEI, DXE and Runtime) modules
F: MdeModulePkg/*Mem*/
F: MdeModulePkg/*SectionExtract*/
F: MdeModulePkg/*StatusCode*/
F: MdeModulePkg/Application/DumpDynPcd/
F: MdeModulePkg/Core/Dxe/
F: MdeModulePkg/Core/DxeIplPeim/
F: MdeModulePkg/Core/RuntimeDxe/
F: MdeModulePkg/Include/*Mem*.h
F: MdeModulePkg/Include/*Pcd*.h
F: MdeModulePkg/Include/*Perf*.h
F: MdeModulePkg/Include/*StatusCode*.h
F: MdeModulePkg/Include/Guid/Crc32GuidedSectionExtraction.h
F: MdeModulePkg/Include/Guid/EventExitBootServiceFailed.h
F: MdeModulePkg/Include/Guid/IdleLoopEvent.h
F: MdeModulePkg/Include/Guid/LoadModuleAtFixedAddress.h
F: MdeModulePkg/Include/Guid/LzmaDecompress.h
F: MdeModulePkg/Include/Library/SecurityManagementLib.h
F: MdeModulePkg/Library/*Decompress*/
F: MdeModulePkg/Library/*Perf*/
F: MdeModulePkg/Library/DxeSecurityManagementLib/
F: MdeModulePkg/Universal/PCD/
F: MdeModulePkg/Universal/PlatformDriOverrideDxe/
F: MdeModulePkg/Universal/SecurityStubDxe/SecurityStub.c
R: Dandan Bi <dandan.bi@intel.com> [dandanbi]
R: Liming Gao <gaoliming@byosoft.com.cn> [lgao4]
MdeModulePkg: Device and Peripheral modules
F: MdeModulePkg/*PciHostBridge*/
F: MdeModulePkg/Bus/
F: MdeModulePkg/Include/*Ata*.h
F: MdeModulePkg/Include/*IoMmu*.h
F: MdeModulePkg/Include/*NonDiscoverableDevice*.h
F: MdeModulePkg/Include/*NvmExpress*.h
F: MdeModulePkg/Include/*SdMmc*.h
F: MdeModulePkg/Include/*Ufs*.h
F: MdeModulePkg/Include/*Usb*.h
F: MdeModulePkg/Include/Guid/RecoveryDevice.h
F: MdeModulePkg/Include/Guid/S3StorageDeviceInitList.h
F: MdeModulePkg/Include/Library/PciHostBridgeLib.h
F: MdeModulePkg/Include/Ppi/StorageSecurityCommand.h
F: MdeModulePkg/Include/Protocol/Ps2Policy.h
F: MdeModulePkg/Library/NonDiscoverableDeviceRegistrationLib/
F: MdeModulePkg/Universal/PcatSingleSegmentPciCfg2Pei/
R: Hao A Wu <hao.a.wu@intel.com> [hwu25]
R: Ray Ni <ray.ni@intel.com> [niruiyu]
MdeModulePkg: Disk modules
F: MdeModulePkg/Universal/Disk/
R: Hao A Wu <hao.a.wu@intel.com> [hwu25]
R: Ray Ni <ray.ni@intel.com> [niruiyu]
R: Zhichao Gao <zhichao.gao@intel.com> [ZhichaoGao]
MdeModulePkg: Firmware Update modules
F: MdeModulePkg/*Capsule*/
F: MdeModulePkg/Include/*Capsule*.h
F: MdeModulePkg/Include/Library/DisplayUpdateProgressLib.h
F: MdeModulePkg/Include/Library/FmpAuthenticationLib.h
F: MdeModulePkg/Include/Protocol/EsrtManagement.h
F: MdeModulePkg/Include/Protocol/FirmwareManagementProgress.h
F: MdeModulePkg/Library/DisplayUpdateProgressLib*/
F: MdeModulePkg/Library/FmpAuthenticationLibNull/
F: MdeModulePkg/Universal/Esrt*/
R: Liming Gao <gaoliming@byosoft.com.cn> [lgao4]
R: Guomin Jiang <guomin.jiang@intel.com> [guominjia]
MdeModulePkg: HII and UI modules
F: MdeModulePkg/*FileExplorer*/
F: MdeModulePkg/*Hii*/
F: MdeModulePkg/*Ui*/
F: MdeModulePkg/Application/BootManagerMenuApp/
F: MdeModulePkg/Include/*FileExplorer*.h
F: MdeModulePkg/Include/*FormBrowser*.h
F: MdeModulePkg/Include/*Hii*.h
F: MdeModulePkg/Include/Library/CustomizedDisplayLib.h
F: MdeModulePkg/Include/Protocol/DisplayProtocol.h
F: MdeModulePkg/Library/CustomizedDisplayLib/
F: MdeModulePkg/Universal/DisplayEngineDxe/
F: MdeModulePkg/Universal/DriverSampleDxe/
F: MdeModulePkg/Universal/SetupBrowserDxe/
R: Dandan Bi <dandan.bi@intel.com> [dandanbi]
R: Eric Dong <eric.dong@intel.com> [ydong10]
MdeModulePkg: Management Mode (MM, SMM) modules
F: MdeModulePkg/*Smi*/
F: MdeModulePkg/*Smm*/
F: MdeModulePkg/Include/*Smi*.h
F: MdeModulePkg/Include/*Smm*.h
R: Eric Dong <eric.dong@intel.com> [ydong10]
R: Ray Ni <ray.ni@intel.com> [niruiyu]
MdeModulePkg: Pei Core
F: MdeModulePkg/Core/Pei/
R: Dandan Bi <dandan.bi@intel.com> [dandanbi]
R: Liming Gao <gaoliming@byosoft.com.cn> [lgao4]
R: Debkumar De <debkumar.de@intel.com> [dde01]
R: Catharine West <catharine.west@intel.com> [catharine-intl]
MdeModulePkg: Reset modules
F: MdeModulePkg/*Reset*/
F: MdeModulePkg/Include/*Reset*.h
R: Zhichao Gao <zhichao.gao@intel.com> [ZhichaoGao]
R: Ray Ni <ray.ni@intel.com> [niruiyu]
MdeModulePkg: Serial modules
F: MdeModulePkg/*Serial*/
F: MdeModulePkg/Include/*SerialPort*.h
R: Ray Ni <ray.ni@intel.com> [niruiyu]
R: Zhichao Gao <zhichao.gao@intel.com> [ZhichaoGao]
MdeModulePkg: SMBIOS modules
F: MdeModulePkg/Universal/Smbios*/
R: Zhiguang Liu <zhiguang.liu@intel.com> [LiuZhiguang001]
R: Dandan Bi <dandan.bi@intel.com> [dandanbi]
R: Star Zeng <star.zeng@intel.com> [lzeng14]
R: Zhichao Gao <zhichao.gao@intel.com> [ZhichaoGao]
MdeModulePkg: UEFI Variable modules
F: MdeModulePkg/*Var*/
F: MdeModulePkg/Include/*/*FaultTolerantWrite*.h
F: MdeModulePkg/Include/*/*Var*.h
F: MdeModulePkg/Include/Guid/SystemNvDataGuid.h
F: MdeModulePkg/Include/Protocol/SwapAddressRange.h
F: MdeModulePkg/Universal/FaultTolerantWrite*/
R: Hao A Wu <hao.a.wu@intel.com> [hwu25]
R: Liming Gao <gaoliming@byosoft.com.cn> [lgao4]
MdeModulePkg: Universal Payload definitions
F: MdeModulePkg/Include/UniversalPayload/
R: Zhiguang Liu <zhiguang.liu@intel.com> [LiuZhiguang001]
R: Ray Ni <ray.ni@intel.com> [niruiyu]
R: Gua Guo <gua.guo@intel.com> [gguo11837463]
MdePkg
F: MdePkg/
W: https://github.com/tianocore/tianocore.github.io/wiki/MdePkg
M: Michael D Kinney <michael.d.kinney@intel.com> [mdkinney]
M: Liming Gao <gaoliming@byosoft.com.cn> [lgao4]
R: Zhiguang Liu <zhiguang.liu@intel.com> [LiuZhiguang001]
NetworkPkg
F: NetworkPkg/
W: https://github.com/tianocore/tianocore.github.io/wiki/NetworkPkg
M: Maciej Rabeda <maciej.rabeda@linux.intel.com> [mrabeda]
R: Jiaxin Wu <jiaxin.wu@intel.com> [jiaxinwu]
R: Siyuan Fu <siyuan.fu@intel.com> [sfu5]
OvmfPkg
F: OvmfPkg/
W: http://www.tianocore.org/ovmf/
M: Ard Biesheuvel <ardb+tianocore@kernel.org> [ardbiesheuvel]
M: Jiewen Yao <jiewen.yao@intel.com> [jyao1]
R: Jordan Justen <jordan.l.justen@intel.com> [jljusten]
R: Gerd Hoffmann <kraxel@redhat.com> [kraxel]
S: Maintained
OvmfPkg: bhyve-related modules
F: OvmfPkg/Bhyve/
F: OvmfPkg/Include/IndustryStandard/Bhyve.h
F: OvmfPkg/Include/Library/BhyveFwCtlLib.h
F: OvmfPkg/Library/AcpiTimerLib/BaseAcpiTimerLibBhyve.c
F: OvmfPkg/Library/AcpiTimerLib/BaseAcpiTimerLibBhyve.inf
F: OvmfPkg/Library/BhyveFwCtlLib/
F: OvmfPkg/Library/PciHostBridgeLibScan/
F: OvmfPkg/Library/PlatformBootManagerLibBhyve/
F: OvmfPkg/Library/ResetSystemLib/BaseResetShutdownBhyve.c
F: OvmfPkg/Library/ResetSystemLib/BaseResetSystemLibBhyve.inf
R: Rebecca Cran <rebecca@bsdio.com> [bcran]
R: Peter Grehan <grehan@freebsd.org> [grehan-freebsd]
OvmfPkg: cloudhv-related modules
F: OvmfPkg/CloudHv/
F: OvmfPkg/Include/IndustryStandard/CloudHv.h
R: Sebastien Boeuf <sebastien.boeuf@intel.com> [sboeuf]
OvmfPkg: microvm-related modules
F: OvmfPkg/Microvm/
F: OvmfPkg/Include/IndustryStandard/Microvm.h
F: OvmfPkg/Library/ResetSystemLib/*Microvm.*
R: Gerd Hoffmann <kraxel@redhat.com> [kraxel]
OvmfPkg: CSM modules
F: OvmfPkg/Csm/
R: David Woodhouse <dwmw2@infradead.org> [dwmw2]
Maintainers: rename the OVMF SEV subsystem to "Confidential Computing" The implementation of Intel TDX for OVMF has begun (TianoCore#3249). Generalize the OVMF SEV section in "Maintainers.txt" to "Confidential Computing". Add Jiewen Yao and Min Xu to the list of reviewers. Sort the reviewer list alphabetically, for easier extension in the future. After the rename, restore the alphabetical ordering between subsystem titles in "Maintainers.txt". TDX-related pathnames should be listed in this subsystem (with "F:" patterns) in the future. Cc: Andrew Fish <afish@apple.com> Cc: Ard Biesheuvel <ardb+tianocore@kernel.org> Cc: Brijesh Singh <brijesh.singh@amd.com> Cc: James Bottomley <jejb@linux.ibm.com> Cc: Jiewen Yao <jiewen.yao@intel.com> Cc: Jordan Justen <jordan.l.justen@intel.com> Cc: Leif Lindholm <leif@nuviainc.com> Cc: Michael D Kinney <michael.d.kinney@intel.com> Cc: Min Xu <min.m.xu@intel.com> Cc: Philippe Mathieu-Daudé <philmd@redhat.com> Cc: Tom Lendacky <thomas.lendacky@amd.com> Ref: https://bugzilla.tianocore.org/show_bug.cgi?id=3249 Signed-off-by: Laszlo Ersek <lersek@redhat.com> Message-Id: <20210310185649.19801-3-lersek@redhat.com> Acked-by: Ard Biesheuvel <ardb@kernel.org> Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com> Acked-by: Brijesh Singh <brijesh.singh@amd.com> Acked-by: Tom Lendacky <thomas.lendacky@amd.com> Acked-by: Jiewen Yao <jiewen.yao@intel.com> Acked-by: Leif Lindholm <leif@nuviainc.com> Acked-by: James Bottomley <jejb@linux.ibm.com> Acked-by: Min Xu <min.m.xu@intel.com>
2021-03-10 19:56:49 +01:00
OvmfPkg: Confidential Computing
Maintainers: refresh the OVMF SEV subsystem after TianoCore #2198 and #3077 Tom added initial SEV-ES support (tracked under TianoCore#2198) in commit range 7f7f511c5a74..7f0b28415cb4. The last commit in that range created the "OvmfPkg: SEV-related modules" section in "Maintainers.txt". However, we didn't list the "OvmfPkg/ResetVector" module, which had received significant updates, enabling QEMU to learn details about the firmware, from parsing the flash image. The SEC phase of OVMF ("OvmfPkg/Sec") gained a new responsibility as well (#VC exception handling). List both modules now. James introduced the remote attested / encrypted boot OVMF platform (under TianoCore#3077) in commit range ef3e73c6a0c0..01726b6d23d4. This work further extended "OvmfPkg/ResetVector", and added: OvmfPkg/AmdSev/ OvmfPkg/Include/Guid/ConfidentialComputingSecret.h OvmfPkg/Library/PlatformBootManagerLibGrub/ List these too in the "OvmfPkg: SEV-related modules" section, and designate James as a reviewer. Cc: Andrew Fish <afish@apple.com> Cc: Ard Biesheuvel <ardb+tianocore@kernel.org> Cc: Brijesh Singh <brijesh.singh@amd.com> Cc: James Bottomley <jejb@linux.ibm.com> Cc: Jiewen Yao <jiewen.yao@intel.com> Cc: Jordan Justen <jordan.l.justen@intel.com> Cc: Leif Lindholm <leif@nuviainc.com> Cc: Michael D Kinney <michael.d.kinney@intel.com> Cc: Min Xu <min.m.xu@intel.com> Cc: Philippe Mathieu-Daudé <philmd@redhat.com> Cc: Tom Lendacky <thomas.lendacky@amd.com> Ref: https://bugzilla.tianocore.org/show_bug.cgi?id=2198 Ref: https://bugzilla.tianocore.org/show_bug.cgi?id=3077 Signed-off-by: Laszlo Ersek <lersek@redhat.com> Message-Id: <20210310185649.19801-2-lersek@redhat.com> Acked-by: Ard Biesheuvel <ardb@kernel.org> Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com> Acked-by: Brijesh Singh <brijesh.singh@amd.com> Acked-by: Tom Lendacky <thomas.lendacky@amd.com> Acked-by: Jiewen Yao <jiewen.yao@intel.com> Acked-by: Leif Lindholm <leif@nuviainc.com> Acked-by: James Bottomley <jejb@linux.ibm.com> Acked-by: Min Xu <min.m.xu@intel.com>
2021-03-10 19:56:48 +01:00
F: OvmfPkg/AmdSev/
F: OvmfPkg/AmdSevDxe/
Maintainers: refresh the OVMF SEV subsystem after TianoCore #2198 and #3077 Tom added initial SEV-ES support (tracked under TianoCore#2198) in commit range 7f7f511c5a74..7f0b28415cb4. The last commit in that range created the "OvmfPkg: SEV-related modules" section in "Maintainers.txt". However, we didn't list the "OvmfPkg/ResetVector" module, which had received significant updates, enabling QEMU to learn details about the firmware, from parsing the flash image. The SEC phase of OVMF ("OvmfPkg/Sec") gained a new responsibility as well (#VC exception handling). List both modules now. James introduced the remote attested / encrypted boot OVMF platform (under TianoCore#3077) in commit range ef3e73c6a0c0..01726b6d23d4. This work further extended "OvmfPkg/ResetVector", and added: OvmfPkg/AmdSev/ OvmfPkg/Include/Guid/ConfidentialComputingSecret.h OvmfPkg/Library/PlatformBootManagerLibGrub/ List these too in the "OvmfPkg: SEV-related modules" section, and designate James as a reviewer. Cc: Andrew Fish <afish@apple.com> Cc: Ard Biesheuvel <ardb+tianocore@kernel.org> Cc: Brijesh Singh <brijesh.singh@amd.com> Cc: James Bottomley <jejb@linux.ibm.com> Cc: Jiewen Yao <jiewen.yao@intel.com> Cc: Jordan Justen <jordan.l.justen@intel.com> Cc: Leif Lindholm <leif@nuviainc.com> Cc: Michael D Kinney <michael.d.kinney@intel.com> Cc: Min Xu <min.m.xu@intel.com> Cc: Philippe Mathieu-Daudé <philmd@redhat.com> Cc: Tom Lendacky <thomas.lendacky@amd.com> Ref: https://bugzilla.tianocore.org/show_bug.cgi?id=2198 Ref: https://bugzilla.tianocore.org/show_bug.cgi?id=3077 Signed-off-by: Laszlo Ersek <lersek@redhat.com> Message-Id: <20210310185649.19801-2-lersek@redhat.com> Acked-by: Ard Biesheuvel <ardb@kernel.org> Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com> Acked-by: Brijesh Singh <brijesh.singh@amd.com> Acked-by: Tom Lendacky <thomas.lendacky@amd.com> Acked-by: Jiewen Yao <jiewen.yao@intel.com> Acked-by: Leif Lindholm <leif@nuviainc.com> Acked-by: James Bottomley <jejb@linux.ibm.com> Acked-by: Min Xu <min.m.xu@intel.com>
2021-03-10 19:56:48 +01:00
F: OvmfPkg/Include/Guid/ConfidentialComputingSecret.h
F: OvmfPkg/Include/Library/MemEncryptSevLib.h
F: OvmfPkg/IoMmuDxe/AmdSevIoMmu.*
F: OvmfPkg/Library/BaseMemEncryptSevLib/
Maintainers: refresh the OVMF SEV subsystem after TianoCore #2198 and #3077 Tom added initial SEV-ES support (tracked under TianoCore#2198) in commit range 7f7f511c5a74..7f0b28415cb4. The last commit in that range created the "OvmfPkg: SEV-related modules" section in "Maintainers.txt". However, we didn't list the "OvmfPkg/ResetVector" module, which had received significant updates, enabling QEMU to learn details about the firmware, from parsing the flash image. The SEC phase of OVMF ("OvmfPkg/Sec") gained a new responsibility as well (#VC exception handling). List both modules now. James introduced the remote attested / encrypted boot OVMF platform (under TianoCore#3077) in commit range ef3e73c6a0c0..01726b6d23d4. This work further extended "OvmfPkg/ResetVector", and added: OvmfPkg/AmdSev/ OvmfPkg/Include/Guid/ConfidentialComputingSecret.h OvmfPkg/Library/PlatformBootManagerLibGrub/ List these too in the "OvmfPkg: SEV-related modules" section, and designate James as a reviewer. Cc: Andrew Fish <afish@apple.com> Cc: Ard Biesheuvel <ardb+tianocore@kernel.org> Cc: Brijesh Singh <brijesh.singh@amd.com> Cc: James Bottomley <jejb@linux.ibm.com> Cc: Jiewen Yao <jiewen.yao@intel.com> Cc: Jordan Justen <jordan.l.justen@intel.com> Cc: Leif Lindholm <leif@nuviainc.com> Cc: Michael D Kinney <michael.d.kinney@intel.com> Cc: Min Xu <min.m.xu@intel.com> Cc: Philippe Mathieu-Daudé <philmd@redhat.com> Cc: Tom Lendacky <thomas.lendacky@amd.com> Ref: https://bugzilla.tianocore.org/show_bug.cgi?id=2198 Ref: https://bugzilla.tianocore.org/show_bug.cgi?id=3077 Signed-off-by: Laszlo Ersek <lersek@redhat.com> Message-Id: <20210310185649.19801-2-lersek@redhat.com> Acked-by: Ard Biesheuvel <ardb@kernel.org> Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com> Acked-by: Brijesh Singh <brijesh.singh@amd.com> Acked-by: Tom Lendacky <thomas.lendacky@amd.com> Acked-by: Jiewen Yao <jiewen.yao@intel.com> Acked-by: Leif Lindholm <leif@nuviainc.com> Acked-by: James Bottomley <jejb@linux.ibm.com> Acked-by: Min Xu <min.m.xu@intel.com>
2021-03-10 19:56:48 +01:00
F: OvmfPkg/Library/PlatformBootManagerLibGrub/
F: OvmfPkg/Library/VmgExitLib/
F: OvmfPkg/PlatformPei/AmdSev.c
Maintainers: refresh the OVMF SEV subsystem after TianoCore #2198 and #3077 Tom added initial SEV-ES support (tracked under TianoCore#2198) in commit range 7f7f511c5a74..7f0b28415cb4. The last commit in that range created the "OvmfPkg: SEV-related modules" section in "Maintainers.txt". However, we didn't list the "OvmfPkg/ResetVector" module, which had received significant updates, enabling QEMU to learn details about the firmware, from parsing the flash image. The SEC phase of OVMF ("OvmfPkg/Sec") gained a new responsibility as well (#VC exception handling). List both modules now. James introduced the remote attested / encrypted boot OVMF platform (under TianoCore#3077) in commit range ef3e73c6a0c0..01726b6d23d4. This work further extended "OvmfPkg/ResetVector", and added: OvmfPkg/AmdSev/ OvmfPkg/Include/Guid/ConfidentialComputingSecret.h OvmfPkg/Library/PlatformBootManagerLibGrub/ List these too in the "OvmfPkg: SEV-related modules" section, and designate James as a reviewer. Cc: Andrew Fish <afish@apple.com> Cc: Ard Biesheuvel <ardb+tianocore@kernel.org> Cc: Brijesh Singh <brijesh.singh@amd.com> Cc: James Bottomley <jejb@linux.ibm.com> Cc: Jiewen Yao <jiewen.yao@intel.com> Cc: Jordan Justen <jordan.l.justen@intel.com> Cc: Leif Lindholm <leif@nuviainc.com> Cc: Michael D Kinney <michael.d.kinney@intel.com> Cc: Min Xu <min.m.xu@intel.com> Cc: Philippe Mathieu-Daudé <philmd@redhat.com> Cc: Tom Lendacky <thomas.lendacky@amd.com> Ref: https://bugzilla.tianocore.org/show_bug.cgi?id=2198 Ref: https://bugzilla.tianocore.org/show_bug.cgi?id=3077 Signed-off-by: Laszlo Ersek <lersek@redhat.com> Message-Id: <20210310185649.19801-2-lersek@redhat.com> Acked-by: Ard Biesheuvel <ardb@kernel.org> Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com> Acked-by: Brijesh Singh <brijesh.singh@amd.com> Acked-by: Tom Lendacky <thomas.lendacky@amd.com> Acked-by: Jiewen Yao <jiewen.yao@intel.com> Acked-by: Leif Lindholm <leif@nuviainc.com> Acked-by: James Bottomley <jejb@linux.ibm.com> Acked-by: Min Xu <min.m.xu@intel.com>
2021-03-10 19:56:48 +01:00
F: OvmfPkg/ResetVector/
F: OvmfPkg/Sec/
R: Brijesh Singh <brijesh.singh@amd.com> [codomania]
R: Erdem Aktas <erdemaktas@google.com> [ruleof2]
R: James Bottomley <jejb@linux.ibm.com> [jejb]
R: Jiewen Yao <jiewen.yao@intel.com> [jyao1]
R: Min Xu <min.m.xu@intel.com> [mxu9]
R: Tom Lendacky <thomas.lendacky@amd.com> [tlendacky]
Maintainers: rename the OVMF SEV subsystem to "Confidential Computing" The implementation of Intel TDX for OVMF has begun (TianoCore#3249). Generalize the OVMF SEV section in "Maintainers.txt" to "Confidential Computing". Add Jiewen Yao and Min Xu to the list of reviewers. Sort the reviewer list alphabetically, for easier extension in the future. After the rename, restore the alphabetical ordering between subsystem titles in "Maintainers.txt". TDX-related pathnames should be listed in this subsystem (with "F:" patterns) in the future. Cc: Andrew Fish <afish@apple.com> Cc: Ard Biesheuvel <ardb+tianocore@kernel.org> Cc: Brijesh Singh <brijesh.singh@amd.com> Cc: James Bottomley <jejb@linux.ibm.com> Cc: Jiewen Yao <jiewen.yao@intel.com> Cc: Jordan Justen <jordan.l.justen@intel.com> Cc: Leif Lindholm <leif@nuviainc.com> Cc: Michael D Kinney <michael.d.kinney@intel.com> Cc: Min Xu <min.m.xu@intel.com> Cc: Philippe Mathieu-Daudé <philmd@redhat.com> Cc: Tom Lendacky <thomas.lendacky@amd.com> Ref: https://bugzilla.tianocore.org/show_bug.cgi?id=3249 Signed-off-by: Laszlo Ersek <lersek@redhat.com> Message-Id: <20210310185649.19801-3-lersek@redhat.com> Acked-by: Ard Biesheuvel <ardb@kernel.org> Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com> Acked-by: Brijesh Singh <brijesh.singh@amd.com> Acked-by: Tom Lendacky <thomas.lendacky@amd.com> Acked-by: Jiewen Yao <jiewen.yao@intel.com> Acked-by: Leif Lindholm <leif@nuviainc.com> Acked-by: James Bottomley <jejb@linux.ibm.com> Acked-by: Min Xu <min.m.xu@intel.com>
2021-03-10 19:56:49 +01:00
OvmfPkg: FDT related modules
F: OvmfPkg/Fdt
R: Leif Lindholm <quic_llindhol@quicinc.com> [leiflindholm]
R: Gerd Hoffmann <kraxel@redhat.com> [kraxel]
R: Abner Chang <abner.chang@amd.com> [changab]
Maintainers: rename the OVMF SEV subsystem to "Confidential Computing" The implementation of Intel TDX for OVMF has begun (TianoCore#3249). Generalize the OVMF SEV section in "Maintainers.txt" to "Confidential Computing". Add Jiewen Yao and Min Xu to the list of reviewers. Sort the reviewer list alphabetically, for easier extension in the future. After the rename, restore the alphabetical ordering between subsystem titles in "Maintainers.txt". TDX-related pathnames should be listed in this subsystem (with "F:" patterns) in the future. Cc: Andrew Fish <afish@apple.com> Cc: Ard Biesheuvel <ardb+tianocore@kernel.org> Cc: Brijesh Singh <brijesh.singh@amd.com> Cc: James Bottomley <jejb@linux.ibm.com> Cc: Jiewen Yao <jiewen.yao@intel.com> Cc: Jordan Justen <jordan.l.justen@intel.com> Cc: Leif Lindholm <leif@nuviainc.com> Cc: Michael D Kinney <michael.d.kinney@intel.com> Cc: Min Xu <min.m.xu@intel.com> Cc: Philippe Mathieu-Daudé <philmd@redhat.com> Cc: Tom Lendacky <thomas.lendacky@amd.com> Ref: https://bugzilla.tianocore.org/show_bug.cgi?id=3249 Signed-off-by: Laszlo Ersek <lersek@redhat.com> Message-Id: <20210310185649.19801-3-lersek@redhat.com> Acked-by: Ard Biesheuvel <ardb@kernel.org> Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com> Acked-by: Brijesh Singh <brijesh.singh@amd.com> Acked-by: Tom Lendacky <thomas.lendacky@amd.com> Acked-by: Jiewen Yao <jiewen.yao@intel.com> Acked-by: Leif Lindholm <leif@nuviainc.com> Acked-by: James Bottomley <jejb@linux.ibm.com> Acked-by: Min Xu <min.m.xu@intel.com>
2021-03-10 19:56:49 +01:00
OvmfPkg: LsiScsi driver
F: OvmfPkg/LsiScsiDxe/
R: Gary Lin <gary.lin@hpe.com> [lcp]
Maintainers: rename the OVMF SEV subsystem to "Confidential Computing" The implementation of Intel TDX for OVMF has begun (TianoCore#3249). Generalize the OVMF SEV section in "Maintainers.txt" to "Confidential Computing". Add Jiewen Yao and Min Xu to the list of reviewers. Sort the reviewer list alphabetically, for easier extension in the future. After the rename, restore the alphabetical ordering between subsystem titles in "Maintainers.txt". TDX-related pathnames should be listed in this subsystem (with "F:" patterns) in the future. Cc: Andrew Fish <afish@apple.com> Cc: Ard Biesheuvel <ardb+tianocore@kernel.org> Cc: Brijesh Singh <brijesh.singh@amd.com> Cc: James Bottomley <jejb@linux.ibm.com> Cc: Jiewen Yao <jiewen.yao@intel.com> Cc: Jordan Justen <jordan.l.justen@intel.com> Cc: Leif Lindholm <leif@nuviainc.com> Cc: Michael D Kinney <michael.d.kinney@intel.com> Cc: Min Xu <min.m.xu@intel.com> Cc: Philippe Mathieu-Daudé <philmd@redhat.com> Cc: Tom Lendacky <thomas.lendacky@amd.com> Ref: https://bugzilla.tianocore.org/show_bug.cgi?id=3249 Signed-off-by: Laszlo Ersek <lersek@redhat.com> Message-Id: <20210310185649.19801-3-lersek@redhat.com> Acked-by: Ard Biesheuvel <ardb@kernel.org> Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com> Acked-by: Brijesh Singh <brijesh.singh@amd.com> Acked-by: Tom Lendacky <thomas.lendacky@amd.com> Acked-by: Jiewen Yao <jiewen.yao@intel.com> Acked-by: Leif Lindholm <leif@nuviainc.com> Acked-by: James Bottomley <jejb@linux.ibm.com> Acked-by: Min Xu <min.m.xu@intel.com>
2021-03-10 19:56:49 +01:00
OvmfPkg: TCG- and TPM2-related modules
F: OvmfPkg/Include/IndustryStandard/QemuTpm.h
F: OvmfPkg/Library/PlatformBootManagerLib/BdsPlatform.c
F: OvmfPkg/Library/Tcg2PhysicalPresenceLib*/
F: OvmfPkg/PlatformPei/ClearCache.c
F: OvmfPkg/Tcg/
R: Marc-André Lureau <marcandre.lureau@redhat.com> [elmarco]
R: Stefan Berger <stefanb@linux.ibm.com> [stefanberger]
OvmfPkg: Xen-related modules
F: OvmfPkg/Include/Guid/XenBusRootDevice.h
F: OvmfPkg/Include/Guid/XenInfo.h
F: OvmfPkg/Include/IndustryStandard/Xen/
F: OvmfPkg/Include/Library/XenHypercallLib.h
F: OvmfPkg/Include/Library/XenIoMmioLib.h
F: OvmfPkg/Include/Library/XenPlatformLib.h
F: OvmfPkg/Include/Protocol/XenBus.h
F: OvmfPkg/Include/Protocol/XenIo.h
F: OvmfPkg/Library/PciHostBridgeLibScan/
F: OvmfPkg/Library/PlatformBootManagerLib/BdsPlatform.c
F: OvmfPkg/Library/XenConsoleSerialPortLib/
F: OvmfPkg/Library/XenHypercallLib/
F: OvmfPkg/Library/XenIoMmioLib/
F: OvmfPkg/Library/XenPlatformLib/
F: OvmfPkg/Library/XenRealTimeClockLib/
F: OvmfPkg/OvmfXen.*
F: OvmfPkg/OvmfXenElfHeaderGenerator.c
F: OvmfPkg/SmbiosPlatformDxe/*Xen*
F: OvmfPkg/XenAcpiPlatformDxe/
F: OvmfPkg/XenBusDxe/
F: OvmfPkg/XenIoPciDxe/
F: OvmfPkg/XenIoPvhDxe/
OvmfPkg: Introduce XenPlatformPei Introduce XenPlatformPei, a copy of OvmfPkg/PlatformPei without some of QEMU specific initialization, Xen does not support QemuFwCfg. This new module will be adjusted to accommodate Xen PVH. fw_cfg dependents that have been removed, which are dynamically skipped when running PlatformPei on Xen: - GetFirstNonAddress(): controlling the 64-bit PCI MMIO aperture via the (experimental) "opt/ovmf/X-PciMmio64Mb" file - GetFirstNonAddress(): honoring the hotplug DIMM area ("etc/reserved-memory-end") in the placement of the 64-bit PCI MMIO aperture - NoexecDxeInitialization() is removed, so PcdPropertiesTableEnable and PcdSetNxForStack are left constant FALSE (not set dynamically from fw_cfg "opt/ovmf/PcdXxxx") - MaxCpuCountInitialization(), PublishPeiMemory(): the max CPU count is not taken from the QemuFwCfgItemSmpCpuCount fw_cfg key; PcdCpuMaxLogicalProcessorNumber is used intact and PcdCpuApInitTimeOutInMicroSeconds is never changed or used. - InitializeXenPlatform(), S3Verification(): S3 is assumed disabled (not consulting "etc/system-states" via QemuFwCfgS3Enabled()). - InstallFeatureControlCallback(): the feature control MSR is not set from "etc/msr_feature_control" (also removed FeatureControl.c as there is nothing been executed) Also removed: - SMRAM/TSEG-related low mem size adjusting (PcdSmmSmramRequire is assumed FALSE) in PublishPeiMemory(), - QemuInitializeRam() entirely, Xen related changes: - Have removed the module variable mXen, as it should be always true. - Have the platform PEI initialization fails if Xen has not been detected. Ref: https://bugzilla.tianocore.org/show_bug.cgi?id=1689 Signed-off-by: Anthony PERARD <anthony.perard@citrix.com> Reviewed-by: Laszlo Ersek <lersek@redhat.com> Message-Id: <20190813113119.14804-5-anthony.perard@citrix.com>
2019-08-13 13:30:48 +02:00
F: OvmfPkg/XenPlatformPei/
F: OvmfPkg/XenPvBlkDxe/
F: OvmfPkg/XenResetVector/
R: Anthony Perard <anthony.perard@citrix.com> [sheep]
R: Julien Grall <julien@xen.org> [jgrall]
PcAtChipsetPkg
F: PcAtChipsetPkg/
W: https://github.com/tianocore/tianocore.github.io/wiki/PcAtChipsetPkg
M: Ray Ni <ray.ni@intel.com> [niruiyu]
PrmPkg
F: PrmPkg/
M: Michael Kubacki <mikuback@linux.microsoft.com> [makubacki]
M: Nate DeSimone <nathaniel.l.desimone@intel.com> [nate-desimone]
PrmPkg: ACPI related modules
R: Ankit Sinha <ankit.sinha@intel.com> [ankit13s]
RedfishPkg: Redfish related modules
F: RedfishPkg/
M: Abner Chang <abner.chang@amd.com> [changab]
M: Nickle Wang <nicklew@nvidia.com> [nicklela]
SecurityPkg
F: SecurityPkg/
W: https://github.com/tianocore/tianocore.github.io/wiki/SecurityPkg
M: Jiewen Yao <jiewen.yao@intel.com> [jyao1]
M: Jian J Wang <jian.j.wang@intel.com> [jwang36]
SecurityPkg: Secure boot related modules
F: SecurityPkg/Library/DxeImageVerificationLib/
F: SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/
F: SecurityPkg/Library/AuthVariableLib/
R: Min Xu <min.m.xu@intel.com> [mxu9]
SecurityPkg: Tcg related modules
F: SecurityPkg/Tcg/
R: Qi Zhang <qi1.zhang@intel.com> [qizhangz]
R: Rahul Kumar <rahul1.kumar@intel.com> [rahul1-kumar]
ShellPkg
F: ShellPkg/
W: https://github.com/tianocore/tianocore.github.io/wiki/ShellPkg
M: Ray Ni <ray.ni@intel.com> [niruiyu]
M: Zhichao Gao <zhichao.gao@intel.com> [ZhichaoGao]
SignedCapsulePkg
F: SignedCapsulePkg/
W: https://github.com/tianocore/tianocore.github.io/wiki/SignedCapsulePkg
M: Jian J Wang <jian.j.wang@intel.com> [jwang36]
SourceLevelDebugPkg
F: SourceLevelDebugPkg/
W: https://github.com/tianocore/tianocore.github.io/wiki/SourceLevelDebugPkg
M: Hao A Wu <hao.a.wu@intel.com> [hwu25]
StandaloneMmPkg
F: StandaloneMmPkg/
M: Ard Biesheuvel <ardb+tianocore@kernel.org> [ardbiesheuvel]
M: Sami Mujawar <sami.mujawar@arm.com> [samimujawar]
M: Jiewen Yao <jiewen.yao@intel.com> [jyao1]
R: Supreeth Venkatesh <supreeth.venkatesh@arm.com> [supven01]
UefiCpuPkg
F: UefiCpuPkg/
W: https://github.com/tianocore/tianocore.github.io/wiki/UefiCpuPkg
M: Eric Dong <eric.dong@intel.com> [ydong10]
M: Ray Ni <ray.ni@intel.com> [niruiyu]
R: Rahul Kumar <rahul1.kumar@intel.com> [rahul1-kumar]
UefiCpuPkg: Sec related modules
F: UefiCpuPkg/SecCore/
F: UefiCpuPkg/ResetVector/
R: Debkumar De <debkumar.de@intel.com> [dde01]
R: Catharine West <catharine.west@intel.com> [catharine-intl]
UefiPayloadPkg
F: UefiPayloadPkg/
W: https://github.com/tianocore/tianocore.github.io/wiki/UefiPayloadPkg
M: Guo Dong <guo.dong@intel.com> [gdong1]
M: Ray Ni <ray.ni@intel.com> [niruiyu]
M: Sean Rhodes <sean@starlabs.systems> [Sean-StarLabs]
M: James Lu <james.lu@intel.com> [jameslu8]
R: Gua Guo <gua.guo@intel.com> [gguo11837463]
S: Maintained
UnitTestFrameworkPkg
F: UnitTestFrameworkPkg/
M: Michael D Kinney <michael.d.kinney@intel.com> [mdkinney]
M: Michael Kubacki <mikuback@linux.microsoft.com> [makubacki]
R: Sean Brogan <sean.brogan@microsoft.com> [spbrogan]
S: Maintained