From mboxrd@z Thu Jan 1 00:00:00 1970 From: Paolo Bonzini Subject: Re: [PATCH 0/0] MSI/MSIX injection for Xen HVM guests Date: Thu, 05 Apr 2012 12:14:05 +0200 Message-ID: <4F7D706D.5030507@redhat.com> References: <1333618350.2513.5.camel@leeds.uk.xensource.com> Mime-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit Return-path: In-Reply-To: <1333618350.2513.5.camel@leeds.uk.xensource.com> List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+gceq-qemu-devel=gmane.org@nongnu.org Sender: qemu-devel-bounces+gceq-qemu-devel=gmane.org@nongnu.org To: Wei Liu Cc: Jan Kiszka , xen-devel , QEMU-devel , Stefano Stabellini , liuw@liuw.name List-Id: xen-devel@lists.xenproject.org Il 05/04/2012 11:32, Wei Liu ha scritto: > Implement a simple Xen APIC module and use it to deliver MSI/MSIX for > Xen HVM guests. Only skimmed the patch but yeah, this is what I had in mind. Thanks! Paolo