git: 7d06c761c8ab - main - x86/madt: allow Xen guest to use x2APIC mode
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Thu, 13 Jan 2022 16:15:47 UTC
The branch main has been updated by royger:
URL: https://cgit.FreeBSD.org/src/commit/?id=7d06c761c8ab210e0bb0644a65be1c81ea521bea
commit 7d06c761c8ab210e0bb0644a65be1c81ea521bea
Author: Roger Pau Monné <royger@FreeBSD.org>
AuthorDate: 2022-01-13 13:54:21 +0000
Commit: Roger Pau Monné <royger@FreeBSD.org>
CommitDate: 2022-01-13 16:15:24 +0000
x86/madt: allow Xen guest to use x2APIC mode
The old bogus Xen versions that would deliver a GPF when writing to
the LAPIC MSR are likely retired, so it's safe to enable x2APIC
unconditionally now if available.
Tested by: avg
Reviewed by: kib
Sponsored by: Citrix Systems R&D
Differential revision: https://reviews.freebsd.org/D33877
---
sys/x86/acpica/madt.c | 3 ---
1 file changed, 3 deletions(-)
diff --git a/sys/x86/acpica/madt.c b/sys/x86/acpica/madt.c
index 8e343a6619f3..880857a8cfad 100644
--- a/sys/x86/acpica/madt.c
+++ b/sys/x86/acpica/madt.c
@@ -168,9 +168,6 @@ madt_x2apic_disable_reason(void)
return ("inside VMWare without intr redirection");
}
- if (vm_guest == VM_GUEST_XEN)
- return ("due to running under XEN");
-
if (vm_guest == VM_GUEST_NO &&
CPUID_TO_FAMILY(cpu_id) == 0x6 &&
CPUID_TO_MODEL(cpu_id) == 0x2a) {