From mboxrd@z Thu Jan 1 00:00:00 1970 From: Radim =?utf-8?B?S3LEjW3DocWZ?= Subject: Re: [PATCH v2 00/13] KVM: x86: break the xAPIC barrier Date: Fri, 8 Jul 2016 18:29:07 +0200 Message-ID: <20160708162907.GB10741@potion> References: <20160707171550.14675-1-rkrcmar@redhat.com> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Cc: Paolo Bonzini , "Lan, Tianyu" , Igor Mammedov , Jan Kiszka , Peter Xu To: linux-kernel@vger.kernel.org, kvm@vger.kernel.org Return-path: Content-Disposition: inline In-Reply-To: <20160707171550.14675-1-rkrcmar@redhat.com> Sender: linux-kernel-owner@vger.kernel.org List-Id: kvm.vger.kernel.org NACK, sorry. KVM allows x2APIC even without interrupt remapping and therefore interprets IOAPIC destination 0xff as a broadcast, which causes a bug when x2APIC uses 0xff. I'll fix that in v3. The hack will be disabled when x2apic_api capability is enabled.