> -----Original Message----- > From: Daniel De Graaf [mailto:dgde...@tycho.nsa.gov] > Sent: Wednesday, January 21, 2015 6:28 AM > To: Xu, Quan; xen-devel@lists.xen.org > Cc: ian.campb...@citrix.com; ian.jack...@eu.citrix.com; jbeul...@suse.com; > k...@xen.org; t...@xen.org; stefano.stabell...@eu.citrix.com; > samuel.thiba...@ens-lyon.org > Subject: Re: [PATCH v4 00/14] Enable vTPM subsystem on TPM 2.0 > > On 01/15/2015 04:21 AM, Quan Xu wrote: > > This series of patch enable the virtual Trusted Platform Module (vTPM) > > subsystem for Xen on TPM 2.0. > > > > Noted, functionality for a virtual guest operating system (a DomU) is > > still TPM 1.2. The main modifcation is on vtpmmgr-stubdom. The > > challenge is that TPM 2.0 is not backward compatible with TPM 1.2. > > > > Updates from v3 all look good, all patches in this series: > > Acked-by: Daniel De Graaf <dgde...@tycho.nsa.gov> > > PS: If you need to re-post this in the future, you should add that line below > the > signed-off-by on the unchanged patches, so that it is clear to the other Xen > maintainers that only the changed/new patches need my review. > > --
Many thanks. For example: Signed-off-by: Quan Xu <quan...@intel.com> Acked-by: Daniel De Graaf <dgde...@tycho.nsa.gov> Right? Intel Quan Xu > Daniel De Graaf > National Security Agency _______________________________________________ Xen-devel mailing list Xen-devel@lists.xen.org http://lists.xen.org/xen-devel