From mboxrd@z Thu Jan 1 00:00:00 1970 From: Paolo Bonzini Subject: Re: [PATCH 0/0] MSI/MSIX injection for Xen HVM guests Date: Thu, 05 Apr 2012 12:50:56 +0200 Message-ID: <4F7D7910.9070508@redhat.com> References: <1333618350.2513.5.camel@leeds.uk.xensource.com> <4F7D706D.5030507@redhat.com> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Return-path: In-Reply-To: List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: xen-devel-bounces@lists.xen.org Errors-To: xen-devel-bounces@lists.xen.org To: Stefano Stabellini Cc: Jan Kiszka , xen-devel , "Wei Liu (Intern)" , QEMU-devel , "liuw@liuw.name" List-Id: xen-devel@lists.xenproject.org Il 05/04/2012 12:43, Stefano Stabellini ha scritto: >>> > > Implement a simple Xen APIC module and use it to deliver MSI/MSIX for >>> > > Xen HVM guests. >> > >> > Only skimmed the patch but yeah, this is what I had in mind. Thanks! > It looks good to me too. > Paolo, can I add your acked-by? Acked-by, yes. Reviewed-by, no. :) Paolo