git: 7d06c761c8ab - main - x86/madt: allow Xen guest to use x2APIC mode

From: Roger Pau Monné <royger_at_FreeBSD.org>
Date: Thu, 13 Jan 2022 16:15:47 UTC
The branch main has been updated by royger:

URL: https://cgit.FreeBSD.org/src/commit/?id=7d06c761c8ab210e0bb0644a65be1c81ea521bea

commit 7d06c761c8ab210e0bb0644a65be1c81ea521bea
Author:     Roger Pau Monné <royger@FreeBSD.org>
AuthorDate: 2022-01-13 13:54:21 +0000
Commit:     Roger Pau Monné <royger@FreeBSD.org>
CommitDate: 2022-01-13 16:15:24 +0000

    x86/madt: allow Xen guest to use x2APIC mode
    
    The old bogus Xen versions that would deliver a GPF when writing to
    the LAPIC MSR are likely retired, so it's safe to enable x2APIC
    unconditionally now if available.
    
    Tested by: avg
    Reviewed by: kib
    Sponsored by: Citrix Systems R&D
    Differential revision: https://reviews.freebsd.org/D33877
---
 sys/x86/acpica/madt.c | 3 ---
 1 file changed, 3 deletions(-)

diff --git a/sys/x86/acpica/madt.c b/sys/x86/acpica/madt.c
index 8e343a6619f3..880857a8cfad 100644
--- a/sys/x86/acpica/madt.c
+++ b/sys/x86/acpica/madt.c
@@ -168,9 +168,6 @@ madt_x2apic_disable_reason(void)
 			return ("inside VMWare without intr redirection");
 	}
 
-	if (vm_guest == VM_GUEST_XEN)
-		return ("due to running under XEN");
-
 	if (vm_guest == VM_GUEST_NO &&
 	    CPUID_TO_FAMILY(cpu_id) == 0x6 &&
 	    CPUID_TO_MODEL(cpu_id) == 0x2a) {