> -----Original Message-----
> From: Daniel De Graaf [mailto:dgde...@tycho.nsa.gov]
> Sent: Wednesday, January 21, 2015 6:28 AM
> To: Xu, Quan; xen-devel@lists.xen.org
> Cc: ian.campb...@citrix.com; ian.jack...@eu.citrix.com; jbeul...@suse.com;
> k...@xen.org; t...@xen.org; stefano.stabell...@eu.citrix.com;
> samuel.thiba...@ens-lyon.org
> Subject: Re: [PATCH v4 00/14] Enable vTPM subsystem on TPM 2.0
> 
> On 01/15/2015 04:21 AM, Quan Xu wrote:
> > This series of patch enable the virtual Trusted Platform Module (vTPM)
> > subsystem for Xen on TPM 2.0.
> >
> > Noted, functionality for a virtual guest operating system (a DomU) is
> > still TPM 1.2. The main modifcation is on vtpmmgr-stubdom. The
> > challenge is that TPM 2.0 is not backward compatible with TPM 1.2.
> >
> 
> Updates from v3 all look good, all patches in this series:
> 
> Acked-by: Daniel De Graaf <dgde...@tycho.nsa.gov>
> 
> PS: If you need to re-post this in the future, you should add that line below 
> the
> signed-off-by on the unchanged patches, so that it is clear to the other Xen
> maintainers that only the changed/new patches need my review.
> 
> --

Many thanks.
For example:
       Signed-off-by: Quan Xu <quan...@intel.com>
       Acked-by: Daniel De Graaf <dgde...@tycho.nsa.gov>
Right?

Intel
Quan Xu


> Daniel De Graaf
> National Security Agency
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel

Reply via email to