From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [63.128.21.124]) by mx.groups.io with SMTP id smtpd.web08.6648.1615472088478067949 for ; Thu, 11 Mar 2021 06:14:48 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=NCiWGWrw; spf=pass (domain: redhat.com, ip: 63.128.21.124, mailfrom: lersek@redhat.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1615472087; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=q2nwi+xEl+gw+bVVF6JZ8nLblhH6b2Fbomdcrmc9fl8=; b=NCiWGWrwu7OXNaBdfj5uH2keEpAtMqbxwKtquYPlYaTm5DWEASyT+HzTnjEgzGdqCi8PqG b9R0FNsWFqMd96cKsmgdWj7LviKIHM2GQHTxerZqttwWMqaakLsactMj+Xlda15/4YeO1h 8RRH2nozkwXfF/K4sYzCvmCMnBHkxIs= Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-494-O1sxElK1MAaCKIk6Y1dI8Q-1; Thu, 11 Mar 2021 09:14:44 -0500 X-MC-Unique: O1sxElK1MAaCKIk6Y1dI8Q-1 Received: from smtp.corp.redhat.com (int-mx06.intmail.prod.int.phx2.redhat.com [10.5.11.16]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id 445C880F05D; Thu, 11 Mar 2021 14:14:42 +0000 (UTC) Received: from lacos-laptop-7.usersys.redhat.com (ovpn-115-158.ams2.redhat.com [10.36.115.158]) by smtp.corp.redhat.com (Postfix) with ESMTP id 721F65C1CF; Thu, 11 Mar 2021 14:14:39 +0000 (UTC) Subject: Re: [PATCH 0/2] Maintainers: create the "OvmfPkg: Confidential Computing" subsystem To: Leif Lindholm Cc: edk2-devel-groups-io , Andrew Fish , Ard Biesheuvel , Brijesh Singh , James Bottomley , Jiewen Yao , Jordan Justen , Michael D Kinney , Min Xu , =?UTF-8?Q?Philippe_Mathieu-Daud=c3=a9?= , Tom Lendacky References: <20210310185649.19801-1-lersek@redhat.com> <20210311113354.GO1664@vanye> From: "Laszlo Ersek" Message-ID: <008a3fc6-2b24-719b-b2c4-f60b0ba63a12@redhat.com> Date: Thu, 11 Mar 2021 15:14:38 +0100 MIME-Version: 1.0 In-Reply-To: <20210311113354.GO1664@vanye> X-Scanned-By: MIMEDefang 2.79 on 10.5.11.16 Authentication-Results: relay.mimecast.com; auth=pass smtp.auth=CUSA124A263 smtp.mailfrom=lersek@redhat.com X-Mimecast-Spam-Score: 0 X-Mimecast-Originator: redhat.com Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 8bit On 03/11/21 12:33, Leif Lindholm wrote: > If I was feeling spectacularly nitpicky, I'd grumble something about > 2/2 smashing several logical changes into one. But this is a small > update to Maintainers.txt rather than code, so ... for the series. > > Acked-by: Leif Lindholm Thanks -- and yes, I did consider splitting those, but the linkage between each step is quite strong. Without TDX, I have no reason to rename the section; once I hint at TDX, I need to add Intel reviewers; I can't add Intel reviewers well without sorting the current "R:" list; once I rename the section, I need to move it... Not impossible to split, but it would have resulted in 5-6 patches, each with ~3 lines. Thanks for accepting the patch. Laszlo > > On Wed, Mar 10, 2021 at 19:56:47 +0100, Laszlo Ersek wrote: >> Ref: https://bugzilla.tianocore.org/show_bug.cgi?id=2198 >> Ref: https://bugzilla.tianocore.org/show_bug.cgi?id=3077 >> Ref: https://bugzilla.tianocore.org/show_bug.cgi?id=3249 >> >> Generalize the current OVMF SEV subsystem entry, so that we can use it >> for Intel TDX in the future, ensuring proper patch circulation for >> reviews. >> >> Cc: Andrew Fish >> Cc: Ard Biesheuvel >> Cc: Brijesh Singh >> Cc: James Bottomley >> Cc: Jiewen Yao >> Cc: Jordan Justen >> Cc: Leif Lindholm >> Cc: Michael D Kinney >> Cc: Min Xu >> Cc: Philippe Mathieu-Daudé >> Cc: Tom Lendacky >> >> Thanks >> Laszlo >> >> Laszlo Ersek (2): >> Maintainers: refresh the OVMF SEV subsystem after TianoCore #2198 and >> #3077 >> Maintainers: rename the OVMF SEV subsystem to "Confidential Computing" >> >> Maintainers.txt | 28 +++++++++++++------- >> 1 file changed, 18 insertions(+), 10 deletions(-) >> >> >> base-commit: edd46cd407ea4a0adaa8d6ca86f550c2a4d5c507 >> -- >> 2.19.1.3.g30247aa5d201 >> >