x86/madt: allow Xen guest to use x2APIC mode
The old bogus Xen versions that would deliver a GPF when writing to the LAPIC MSR are likely retired, so it's safe to enable x2APIC unconditionally now if available. Tested by: avg Reviewed by: kib Sponsored by: Citrix Systems R&D Differential revision: https://reviews.freebsd.org/D33877
This commit is contained in:
parent
ca2a7262df
commit
7d06c761c8
@ -168,9 +168,6 @@ madt_x2apic_disable_reason(void)
|
||||
return ("inside VMWare without intr redirection");
|
||||
}
|
||||
|
||||
if (vm_guest == VM_GUEST_XEN)
|
||||
return ("due to running under XEN");
|
||||
|
||||
if (vm_guest == VM_GUEST_NO &&
|
||||
CPUID_TO_FAMILY(cpu_id) == 0x6 &&
|
||||
CPUID_TO_MODEL(cpu_id) == 0x2a) {
|
||||
|
Loading…
Reference in New Issue
Block a user