From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by mx.groups.io with SMTP id smtpd.web09.2265.1615404185587895215 for ; Wed, 10 Mar 2021 11:23:05 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=ekc6MR8x; spf=pass (domain: redhat.com, ip: 170.10.133.124, mailfrom: philmd@redhat.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1615404184; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=8CSJvYm4IHC21Tq0tk/o+wGXo7RL5zkPssS7ffEWKPk=; b=ekc6MR8xIGTwMsbrRge1sRKeTsqQBvN+WjhdiIzMM6O27Iq4w7e6NS+Z2rZ1/0BPPtVqkL aE4cYe5Tw+Yl4DgRRJFbJ5gWcg9zmHddeLCoKov8W7uAJ5H20jHXqZ6a5RcCTrKornP4Vl xF0TGnieRXjP3R26AdTI3yJpAnk4J2M= Received: from mail-ed1-f70.google.com (mail-ed1-f70.google.com [209.85.208.70]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-124-Hgbq9zKSP16vHGKc45GQSg-1; Wed, 10 Mar 2021 14:22:59 -0500 X-MC-Unique: Hgbq9zKSP16vHGKc45GQSg-1 Received: by mail-ed1-f70.google.com with SMTP id h5so8887084edf.17 for ; Wed, 10 Mar 2021 11:22:59 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=8CSJvYm4IHC21Tq0tk/o+wGXo7RL5zkPssS7ffEWKPk=; b=b7FQxHapWUq49pRBTbltgCYyrvubJcDUZBrhPbrY1HEe1pyb0TYcrH5ckrVE89ykjL ZUjkJee6GdBzQlLlrU+Hyrvf5P74wdm6m8yMXxg8OuQRiTWF/OaVYlaUfyrZhEGFcIDn zhVkaFQWRunVR9WPXFsyGaWBeKfGE5Ji4Fd2oyyhaPeruBP2tXYHkA65kLyq8/n6xPWG giiUCSC9VKVKyddNvtEqkLMoitwvHU9b+mKo/kZsa5oglosMsYyRZFsL/yLI35Bl4fns 5UmLshaPuxnkUUVoGBLyOoCgGW5nqc7hT4Ew/LxZl2UPRejcb+CiqY7zOxqJbZX1W3nD FbbQ== X-Gm-Message-State: AOAM533w+4IgVJklMpJZmDdxMQidF6rPURnRF8z++dXGSVoO/MdTrcIM 7mmSV/eyZdk8MopGjaFe6tizxAZNNvZLfFgD6YfqUwMEj3Lbx4TChn1t+prwt3jtg2JLwy1SiUT HT7+JMF15uR6kjA== X-Received: by 2002:a17:906:da0e:: with SMTP id fi14mr29457ejb.188.1615404178612; Wed, 10 Mar 2021 11:22:58 -0800 (PST) X-Google-Smtp-Source: ABdhPJyZvINW8KTOalomLVepBhdy6lTNs5mSgwxzFPMA39c9u0w1egCLY6oIfYQcGYHr+axC7ulfZA== X-Received: by 2002:a17:906:da0e:: with SMTP id fi14mr29436ejb.188.1615404178450; Wed, 10 Mar 2021 11:22:58 -0800 (PST) Return-Path: Received: from [192.168.1.36] (68.red-83-57-175.dynamicip.rima-tde.net. [83.57.175.68]) by smtp.gmail.com with ESMTPSA id m10sm208504ejx.10.2021.03.10.11.22.57 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Wed, 10 Mar 2021 11:22:58 -0800 (PST) Subject: Re: [PATCH 0/2] Maintainers: create the "OvmfPkg: Confidential Computing" subsystem To: Laszlo Ersek , edk2-devel-groups-io Cc: Andrew Fish , Ard Biesheuvel , Brijesh Singh , James Bottomley , Jiewen Yao , Jordan Justen , Leif Lindholm , Michael D Kinney , Min Xu , Tom Lendacky References: <20210310185649.19801-1-lersek@redhat.com> From: =?UTF-8?B?UGhpbGlwcGUgTWF0aGlldS1EYXVkw6k=?= Message-ID: Date: Wed, 10 Mar 2021 20:22:56 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.7.0 MIME-Version: 1.0 In-Reply-To: <20210310185649.19801-1-lersek@redhat.com> Authentication-Results: relay.mimecast.com; auth=pass smtp.auth=CUSA124A263 smtp.mailfrom=philmd@redhat.com X-Mimecast-Spam-Score: 0 X-Mimecast-Originator: redhat.com Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 8bit On 3/10/21 7:56 PM, Laszlo Ersek wrote: > Ref: https://bugzilla.tianocore.org/show_bug.cgi?id=2198 > Ref: https://bugzilla.tianocore.org/show_bug.cgi?id=3077 > Ref: https://bugzilla.tianocore.org/show_bug.cgi?id=3249 > > Generalize the current OVMF SEV subsystem entry, so that we can use it > for Intel TDX in the future, ensuring proper patch circulation for > reviews. > > Cc: Andrew Fish > Cc: Ard Biesheuvel > Cc: Brijesh Singh > Cc: James Bottomley > Cc: Jiewen Yao > Cc: Jordan Justen > Cc: Leif Lindholm > Cc: Michael D Kinney > Cc: Min Xu > Cc: Philippe Mathieu-Daudé > Cc: Tom Lendacky > > Thanks > Laszlo > > Laszlo Ersek (2): > Maintainers: refresh the OVMF SEV subsystem after TianoCore #2198 and > #3077 > Maintainers: rename the OVMF SEV subsystem to "Confidential Computing" > > Maintainers.txt | 28 +++++++++++++------- > 1 file changed, 18 insertions(+), 10 deletions(-) FWIW: Reviewed-by: Philippe Mathieu-Daude