@@ -115,7 +115,8 @@ struct kvm_arch_memory_slot {
/* kvm->arch.mmu_pending_ops flags */
#define KVM_LOCKED_MEMSLOT_FLUSH_DCACHE 0
-#define KVM_MAX_MMU_PENDING_OPS 1
+#define KVM_LOCKED_MEMSLOT_INVAL_ICACHE 1
+#define KVM_MAX_MMU_PENDING_OPS 2
struct kvm_arch {
struct kvm_s2_mmu mmu;
@@ -607,8 +607,16 @@ void stage2_unmap_vm(struct kvm *kvm)
spin_lock(&kvm->mmu_lock);
slots = kvm_memslots(kvm);
- kvm_for_each_memslot(memslot, slots)
+ kvm_for_each_memslot(memslot, slots) {
+ if (memslot_is_locked(memslot)) {
+ set_bit(KVM_LOCKED_MEMSLOT_FLUSH_DCACHE,
+ &kvm->arch.mmu_pending_ops);
+ set_bit(KVM_LOCKED_MEMSLOT_INVAL_ICACHE,
+ &kvm->arch.mmu_pending_ops);
+ continue;
+ }
stage2_unmap_memslot(kvm, memslot);
+ }
spin_unlock(&kvm->mmu_lock);
mmap_read_unlock(current->mm);
@@ -1334,6 +1342,11 @@ void kvm_mmu_perform_pending_ops(struct kvm *kvm)
clear_bit(KVM_LOCKED_MEMSLOT_FLUSH_DCACHE, &kvm->arch.mmu_pending_ops);
}
+ if (test_bit(KVM_LOCKED_MEMSLOT_INVAL_ICACHE, &kvm->arch.mmu_pending_ops)) {
+ icache_inval_all_pou();
+ clear_bit(KVM_LOCKED_MEMSLOT_INVAL_ICACHE, &kvm->arch.mmu_pending_ops);
+ }
+
out_unlock:
mutex_unlock(&kvm->slots_lock);
return;
Userspace resets a VCPU that has already run by means of a KVM_ARM_VCPU_INIT ioctl. This is usually done after a VM shutdown and before the same VM is rebooted, and during this interval the VM memory can be modified by userspace (for example, to copy the original guest kernel image). In this situation, KVM unmaps the entire stage 2 to trigger stage 2 faults, which ensures that the guest has the same view of memory as the host's userspace. Unmapping stage 2 is not an option for locked memslots, so instead do the cache maintenance the first time a VCPU is run, similar to what KVM does when a memslot is locked. Signed-off-by: Alexandru Elisei <alexandru.elisei@arm.com> --- arch/arm64/include/asm/kvm_host.h | 3 ++- arch/arm64/kvm/mmu.c | 15 ++++++++++++++- 2 files changed, 16 insertions(+), 2 deletions(-)