Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 13 Jan 2022 16:15:47 GMT
From:      =?utf-8?Q?Roger Pau Monn=C3=A9?= <royger@FreeBSD.org>
To:        src-committers@FreeBSD.org, dev-commits-src-all@FreeBSD.org, dev-commits-src-main@FreeBSD.org
Subject:   git: 7d06c761c8ab - main - x86/madt: allow Xen guest to use x2APIC mode
Message-ID:  <202201131615.20DGFlEa016563@gitrepo.freebsd.org>

next in thread | raw e-mail | index | archive | help
The branch main has been updated by royger:

URL: https://cgit.FreeBSD.org/src/commit/?id=7d06c761c8ab210e0bb0644a65be1c81ea521bea

commit 7d06c761c8ab210e0bb0644a65be1c81ea521bea
Author:     Roger Pau Monné <royger@FreeBSD.org>
AuthorDate: 2022-01-13 13:54:21 +0000
Commit:     Roger Pau Monné <royger@FreeBSD.org>
CommitDate: 2022-01-13 16:15:24 +0000

    x86/madt: allow Xen guest to use x2APIC mode
    
    The old bogus Xen versions that would deliver a GPF when writing to
    the LAPIC MSR are likely retired, so it's safe to enable x2APIC
    unconditionally now if available.
    
    Tested by: avg
    Reviewed by: kib
    Sponsored by: Citrix Systems R&D
    Differential revision: https://reviews.freebsd.org/D33877
---
 sys/x86/acpica/madt.c | 3 ---
 1 file changed, 3 deletions(-)

diff --git a/sys/x86/acpica/madt.c b/sys/x86/acpica/madt.c
index 8e343a6619f3..880857a8cfad 100644
--- a/sys/x86/acpica/madt.c
+++ b/sys/x86/acpica/madt.c
@@ -168,9 +168,6 @@ madt_x2apic_disable_reason(void)
 			return ("inside VMWare without intr redirection");
 	}
 
-	if (vm_guest == VM_GUEST_XEN)
-		return ("due to running under XEN");
-
 	if (vm_guest == VM_GUEST_NO &&
 	    CPUID_TO_FAMILY(cpu_id) == 0x6 &&
 	    CPUID_TO_MODEL(cpu_id) == 0x2a) {



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202201131615.20DGFlEa016563>