No practical change at the moment, but future changes will need to react
irrespective of guest type.
Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
Reviewed-by: Wei Liu <wei.liu2@citrix.com>
Acked-by: Jan Beulich <jbeulich@suse.com>
if ( (rc = init_vcpu_msr_policy(v)) )
goto fail;
+
+ cpuid_policy_updated(v);
}
return rc;
return 0;
}
+/*
+ * Called during vcpu construction, and each time the toolstack changes the
+ * CPUID configuration for the domain.
+ */
+void cpuid_policy_updated(struct vcpu *v)
+{
+ if ( is_hvm_vcpu(v) )
+ hvm_cpuid_policy_changed(v);
+}
+
void arch_dump_domain_info(struct domain *d)
{
paging_dump_domain_info(d);
break;
}
- if ( is_hvm_domain(d) && call_policy_changed )
+ if ( call_policy_changed )
{
struct vcpu *v;
for_each_vcpu( d, v )
- hvm_cpuid_policy_changed(v);
+ cpuid_policy_updated(v);
}
return 0;
hvm_set_guest_tsc(v, 0);
}
- hvm_cpuid_policy_changed(v);
-
return 0;
fail6:
/* x86/64: toggle guest page tables between kernel and user modes. */
void toggle_guest_pt(struct vcpu *);
+void cpuid_policy_updated(struct vcpu *v);
+
/*
* Initialise a hypercall-transfer page. The given pointer must be mapped
* in Xen virtual address space (accesses are not validated or checked).