git: 7d06c761c8ab - main - x86/madt: allow Xen guest to use x2APIC mode
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Thu, 13 Jan 2022 16:15:47 UTC
The branch main has been updated by royger: URL: https://cgit.FreeBSD.org/src/commit/?id=7d06c761c8ab210e0bb0644a65be1c81ea521bea commit 7d06c761c8ab210e0bb0644a65be1c81ea521bea Author: Roger Pau Monné <royger@FreeBSD.org> AuthorDate: 2022-01-13 13:54:21 +0000 Commit: Roger Pau Monné <royger@FreeBSD.org> CommitDate: 2022-01-13 16:15:24 +0000 x86/madt: allow Xen guest to use x2APIC mode The old bogus Xen versions that would deliver a GPF when writing to the LAPIC MSR are likely retired, so it's safe to enable x2APIC unconditionally now if available. Tested by: avg Reviewed by: kib Sponsored by: Citrix Systems R&D Differential revision: https://reviews.freebsd.org/D33877 --- sys/x86/acpica/madt.c | 3 --- 1 file changed, 3 deletions(-) diff --git a/sys/x86/acpica/madt.c b/sys/x86/acpica/madt.c index 8e343a6619f3..880857a8cfad 100644 --- a/sys/x86/acpica/madt.c +++ b/sys/x86/acpica/madt.c @@ -168,9 +168,6 @@ madt_x2apic_disable_reason(void) return ("inside VMWare without intr redirection"); } - if (vm_guest == VM_GUEST_XEN) - return ("due to running under XEN"); - if (vm_guest == VM_GUEST_NO && CPUID_TO_FAMILY(cpu_id) == 0x6 && CPUID_TO_MODEL(cpu_id) == 0x2a) {