From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by mx.groups.io with SMTP id smtpd.web09.2220.1615404026869175805 for ; Wed, 10 Mar 2021 11:20:26 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=hZI8pEPh; spf=pass (domain: kernel.org, ip: 198.145.29.99, mailfrom: ardb@kernel.org) Received: by mail.kernel.org (Postfix) with ESMTPSA id 2C98364FC6 for ; Wed, 10 Mar 2021 19:20:25 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1615404025; bh=Jyf/hh4ut5Yytf0kslclK5SC0qGdyFjENL2P5Q21L9w=; h=References:In-Reply-To:From:Date:Subject:To:Cc:From; b=hZI8pEPhRvQLBQkAERFOp6e0q0KjjzdNHwFzN+nyTLFfga/uxTkP+3hoepMEQuLIH zHgUNR6qjrli/0XrYej5qYQ2NSTcW+d+2CHouyxeWna6IDMJk2FUbF5FBwyL8V2dPc RG+HwjpT6gtLRLtwR+om0D2BsIYiALTMOIS09jj2059d1eUHudCxJfL4fHPJWEr9cg QRG+aTNUUF/B+Oulpwhl7Uxx+aCATY/c5KN9BotezzBn2R5A8L6a7YJhY9q4OHQYXW qNu/RoaLUeH8wb6D39RbW2rJONpowIcGIWiU9mpBFUdQxQwqIyHOj+BdtyfiG//dTB a5mpafNjkX2hQ== Received: by mail-oi1-f175.google.com with SMTP id d20so20331437oiw.10 for ; Wed, 10 Mar 2021 11:20:25 -0800 (PST) X-Gm-Message-State: AOAM532lH8ZeFJ0qWWOhLHXqH+bbmk1r7OL4aDm16Kb8WdLVBk5cbPDt eaTG6BAe1Q9jSD+r3cSJtcQu+vqrwDQT2qhSsXk= X-Google-Smtp-Source: ABdhPJxQupS70iMJd4YTmRXsh5YIdq0jLr12dcgAVPYhInAmQVDW6u84J1IlHpl6HTTa3GBTCcOoD6+yMe6lEhoUnhg= X-Received: by 2002:aca:538c:: with SMTP id h134mr3473196oib.174.1615404024601; Wed, 10 Mar 2021 11:20:24 -0800 (PST) MIME-Version: 1.0 References: <20210310185649.19801-1-lersek@redhat.com> In-Reply-To: <20210310185649.19801-1-lersek@redhat.com> From: "Ard Biesheuvel" Date: Wed, 10 Mar 2021 20:20:13 +0100 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [edk2-devel] [PATCH 0/2] Maintainers: create the "OvmfPkg: Confidential Computing" subsystem To: devel@edk2.groups.io, Laszlo Ersek Cc: Andrew Fish , Ard Biesheuvel , Brijesh Singh , James Bottomley , Jiewen Yao , Jordan Justen , Leif Lindholm , Michael D Kinney , Min Xu , =?UTF-8?Q?Philippe_Mathieu=2DDaud=C3=A9?= , Tom Lendacky Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable On Wed, 10 Mar 2021 at 19:57, Laszlo Ersek wrote: > > Ref: https://bugzilla.tianocore.org/show_bug.cgi?id=3D2198 > Ref: https://bugzilla.tianocore.org/show_bug.cgi?id=3D3077 > Ref: https://bugzilla.tianocore.org/show_bug.cgi?id=3D3249 > > Generalize the current OVMF SEV subsystem entry, so that we can use it > for Intel TDX in the future, ensuring proper patch circulation for > reviews. > > Cc: Andrew Fish > Cc: Ard Biesheuvel > Cc: Brijesh Singh > Cc: James Bottomley > Cc: Jiewen Yao > Cc: Jordan Justen > Cc: Leif Lindholm > Cc: Michael D Kinney > Cc: Min Xu > Cc: Philippe Mathieu-Daud=C3=A9 > Cc: Tom Lendacky > > Thanks > Laszlo > > Laszlo Ersek (2): > Maintainers: refresh the OVMF SEV subsystem after TianoCore #2198 and > #3077 > Maintainers: rename the OVMF SEV subsystem to "Confidential Computing" > For the series, Acked-by: Ard Biesheuvel > Maintainers.txt | 28 +++++++++++++------- > 1 file changed, 18 insertions(+), 10 deletions(-) > > > base-commit: edd46cd407ea4a0adaa8d6ca86f550c2a4d5c507 > -- > 2.19.1.3.g30247aa5d201 > > > >=20 > >