From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mail-ej1-f41.google.com (mail-ej1-f41.google.com [209.85.218.41]) by mx.groups.io with SMTP id smtpd.web08.4743.1615462438755708558 for ; Thu, 11 Mar 2021 03:33:59 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@nuviainc-com.20150623.gappssmtp.com header.s=20150623 header.b=VyPiYo2R; spf=pass (domain: nuviainc.com, ip: 209.85.218.41, mailfrom: leif@nuviainc.com) Received: by mail-ej1-f41.google.com with SMTP id p8so45487189ejb.10 for ; Thu, 11 Mar 2021 03:33:58 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nuviainc-com.20150623.gappssmtp.com; s=20150623; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:content-transfer-encoding:in-reply-to :user-agent; bh=8ktVzbTzH8NgAiBV1pVqvsNWvCDI/cqd2uy9s2JkTGA=; b=VyPiYo2RBcMHX6g2ozTndDJSJOJlBzO2mnF7wGhqLKZel1/47px3kgCzSFfVUEDXWb 5R3RPzua21Q2NySbOpXzKs5RaVaq5Rc+0NrAodkDgiOfRY/KhuTW+2PhNU3t7ZNjeyHX Pj5xk7SrXSIIZHlyKREAtA12xdWCzeKfB2XC4Zs7dmUIXRd3Y4hzUPGKBayu8DZO0qci 1v7NfXgQ0xeQMnE5dP9p1rWTRMN2FzV8n7M0IXFXfcakp2cVFync/ZUmrelN7DAaH7Na PSx9fFFiO23vU08cZ2Xd/tXFq3dXe7KafmEYl5a0W5xrkhCzyXSIy8Ol2xx3uNVlwGNM 9pvQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:content-transfer-encoding :in-reply-to:user-agent; bh=8ktVzbTzH8NgAiBV1pVqvsNWvCDI/cqd2uy9s2JkTGA=; b=uJQTJfWn4SW3a8oFYHEvFTfucdWIv8fgZ5bYx3b8BHKVqbfpwzbIVtXUkLZq1XgC5S JJE2goHnrWjm7GulDyR21W6be7nlxfVwyjskgAZyctpc9odDmJZPB9i0j/xA1ZcQtK02 VvP48By57nhz0TpzuZO7lC9+xdsDR6l71UJ+fm6pat9xu7m4SwS1XIrW3BxwOVnTXZ59 QBmTPL3tL3QpJizag7j87Mm+/5SGvlQdaVI1I1CHzwanGJvY0MnxhHycPtYGAgCuyQnC bvny22tIEAu4w+W+5jlGMsXABZcoH4mFqOu6SoOYpJxslgpRL/0AgQCxz60ZM4LTS/SW VlrA== X-Gm-Message-State: AOAM530bXw4k4FONulYFq5D/pepVWmpfr2yilA7u7EgeGIrJI0QBs6C1 c7EPqI2/Q2jkbhZqkviLK0IidQ== X-Google-Smtp-Source: ABdhPJx3wImU0N7q8XTFY6JCcbtAwlpp8vGR5/4IhGwMuAU6lQkvYQfvs2FjSS/icTcyBWhDlLoV5A== X-Received: by 2002:a17:906:af6f:: with SMTP id os15mr2650069ejb.279.1615462437300; Thu, 11 Mar 2021 03:33:57 -0800 (PST) Return-Path: Received: from vanye (cpc1-cmbg19-2-0-cust915.5-4.cable.virginm.net. [82.27.183.148]) by smtp.gmail.com with ESMTPSA id d3sm1118138edp.43.2021.03.11.03.33.56 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 11 Mar 2021 03:33:56 -0800 (PST) Date: Thu, 11 Mar 2021 11:33:54 +0000 From: "Leif Lindholm" To: Laszlo Ersek Cc: edk2-devel-groups-io , Andrew Fish , Ard Biesheuvel , Brijesh Singh , James Bottomley , Jiewen Yao , Jordan Justen , Michael D Kinney , Min Xu , Philippe =?iso-8859-1?Q?Mathieu-Daud=E9?= , Tom Lendacky Subject: Re: [PATCH 0/2] Maintainers: create the "OvmfPkg: Confidential Computing" subsystem Message-ID: <20210311113354.GO1664@vanye> References: <20210310185649.19801-1-lersek@redhat.com> MIME-Version: 1.0 In-Reply-To: <20210310185649.19801-1-lersek@redhat.com> User-Agent: Mutt/1.10.1 (2018-07-13) Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit If I was feeling spectacularly nitpicky, I'd grumble something about 2/2 smashing several logical changes into one. But this is a small update to Maintainers.txt rather than code, so ... for the series. Acked-by: Leif Lindholm On Wed, Mar 10, 2021 at 19:56:47 +0100, Laszlo Ersek wrote: > Ref: https://bugzilla.tianocore.org/show_bug.cgi?id=2198 > Ref: https://bugzilla.tianocore.org/show_bug.cgi?id=3077 > Ref: https://bugzilla.tianocore.org/show_bug.cgi?id=3249 > > Generalize the current OVMF SEV subsystem entry, so that we can use it > for Intel TDX in the future, ensuring proper patch circulation for > reviews. > > Cc: Andrew Fish > Cc: Ard Biesheuvel > Cc: Brijesh Singh > Cc: James Bottomley > Cc: Jiewen Yao > Cc: Jordan Justen > Cc: Leif Lindholm > Cc: Michael D Kinney > Cc: Min Xu > Cc: Philippe Mathieu-Daudé > Cc: Tom Lendacky > > Thanks > Laszlo > > Laszlo Ersek (2): > Maintainers: refresh the OVMF SEV subsystem after TianoCore #2198 and > #3077 > Maintainers: rename the OVMF SEV subsystem to "Confidential Computing" > > Maintainers.txt | 28 +++++++++++++------- > 1 file changed, 18 insertions(+), 10 deletions(-) > > > base-commit: edd46cd407ea4a0adaa8d6ca86f550c2a4d5c507 > -- > 2.19.1.3.g30247aa5d201 >