[Feature] VT-d posted interrupts

Bug #1328027 reported by Yingying Zhao
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
intel
Fix Released
Undecided
Unassigned
linux (Ubuntu)
Fix Released
Undecided
Unassigned
xen (Ubuntu)
Fix Released
Undecided
Unassigned

Bug Description

Posted Interrupts on Broadwell is really VT-d posted interrupts. Posted Interrupts for the processor are part of the APIC-V and was introduced in IVT. The idea is that the interrupt can be placed in a data structure for the guest and the guest can, under the right conditions, receive the interrupt without VM exiting. Chapter 29 of vol. c of the SDM has the currently public part of posted interrupts.

Upstream Schedule:
kernel: 4.4
Xen: 4.7

Target Ubuntu Release:
Ubuntu 16.04

Tags: vivid
tags: added: utopic
Revision history for this message
Yingying Zhao (yingying-zhao) wrote :

The KVM target will be kernel 3.19 depending on Broadwell Server hardware availability.

description: updated
Revision history for this message
Leann Ogasawara (leannogasawara) wrote :

Ok, sounds like this should retarget to the 15.04 Ubuntu release then. Thanks.

Revision history for this message
Yingying Zhao (yingying-zhao) wrote :

Yes. Please retarget to 15.04 release.

Revision history for this message
Yingying Zhao (yingying-zhao) wrote :

Latest upstream schedule update:
KVM: 3.20
Xen: 4.6

tags: added: vivid
removed: utopic
description: updated
description: updated
Revision history for this message
Leann Ogasawara (leannogasawara) wrote :

Per discussion between Canonical and Intel, retarget to 15.10.

description: updated
Revision history for this message
Leann Ogasawara (leannogasawara) wrote :

With the kernel target of 4.3 and xen target of 4.6, shall we retarget this to 16.04?

Revision history for this message
XiongZhang (xiong-y-zhang) wrote :

it hasn't finished in upstream, so move it to 16.04

description: updated
Revision history for this message
XiongZhang (xiong-y-zhang) wrote :

it has been merged into 4.4 kernel.
"0a4377de305684c883bf90ad21e3cbdeead70f5c
a2f1c8bdc02bfcaa5a658283b883fdb54e328b36
f6b3c72c23661e5534cd2eede16e9bac7ebb761c
501b32653ebf49114cccb9afbf9150cf18fd8700
6f281923949a4944a7d5625e4f900ec02fefee59
3bf17472226b0041b0c61363bd57a5cadbe620c4
bf56027ff4d9e75bf668ae990fe6204d00a23002
8541186faf3b59623c86022cc5f21ce9bd1332c5
2705a3d2a690c3dd9f58c7d788bc0f432acdeceb
d75f152fc389cdd73a6c17f1247fce9052fd579c
07c09787b26db724c94a912a572a9a4fa66008f3
3d9b98f4ec17ba8d555f1972a3870035a87574a0
959c870f7305be019d9316bc4e038dc6119d51ad
c1d993341e46867af9412cf7f93f535895bbe3a7
e02ae3871355194a61b03a07d96fd71e81d7eff9
f73f8173126ba68eb1c42bd9a234a51d78576ca6
37d9fe4783ffcaddcc4afe67626691e62c5ab30e
166c9775f1f8b8f00ad1db0fa5c8fc74059d965d
1a02b27035f82091d51ecafcb9ccaac1f31d4eb2
9016cfb577a15abd6a7990890ccf6bf1edf04d31
f70c20aaf141adb715a2d750c55154073b02a9c3
6ef1522f7ecc063317dfb5ca63da6e47130a4c50
ebbfc765369690cf8fc512615e6b83ec1702f8ac
8feb4a04dc756002f78df0026e58118669de4851
d84f1e0755ba1e87d20d1f90c1e6eb0cbbc0af9d
6d7425f109d2629d1f4b4b146eca8e43701bf966
efc644048ecde54f016011fe10110addd0de348f
87276880065246ce49ec571130d3d1e4a22e5604
28b835d60fcc2498e717cf5e6f0c3691c24546f7
bf9f6ac8d74969690df1485b33b7c238ca9f2269
b7d2063177a584cb1afb06fc0ed6c48b576f3e75
fcf1ae2f7a044cda9956ec7afb487296afff058e
344cb4e0b6f3a0dbef0643eacb4946338eb228c0
"

description: updated
description: updated
information type: Proprietary → Private
Changed in linux (Ubuntu):
status: New → Fix Released
Revision history for this message
XiongZhang (xiong-y-zhang) wrote :

For Xen, it is implemented in xen 4.7. Please update Xen in 16.10 to 4.7

information type: Private → Public
Changed in intel:
status: New → Fix Released
Changed in xen (Ubuntu):
status: New → Fix Released
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.