ANDROID: KVM: arm64: Allow userspace to receive SHARE and UNSHARE notifications
Expose MEM_SHARE and MEM_UNSHARE hypercalls to the KVM_CAP_EXIT_HYPERCALL capability, allowing userspace (i.e. the VMM) to mprotect() its own mapping of the pages based upon changes to the host permissions. Signed-off-by: Will Deacon <will@kernel.org> Bug: 209580772 Change-Id: I95890595f8cc5493a5a67636bd22da3cc90a95fc Signed-off-by: Will Deacon <willdeacon@google.com>
This commit is contained in:
@@ -65,7 +65,8 @@ static DEFINE_PER_CPU(unsigned char, kvm_arm_hardware_enabled);
|
||||
DEFINE_STATIC_KEY_FALSE(userspace_irqchip_in_use);
|
||||
|
||||
/* KVM "vendor" hypercalls which may be forwarded to userspace on request. */
|
||||
#define KVM_EXIT_HYPERCALL_VALID_MASK (0)
|
||||
#define KVM_EXIT_HYPERCALL_VALID_MASK (BIT(ARM_SMCCC_KVM_FUNC_MEM_SHARE) | \
|
||||
BIT(ARM_SMCCC_KVM_FUNC_MEM_UNSHARE))
|
||||
|
||||
int kvm_arch_vcpu_should_kick(struct kvm_vcpu *vcpu)
|
||||
{
|
||||
|
||||
@@ -151,6 +151,14 @@ int kvm_hvc_call_handler(struct kvm_vcpu *vcpu)
|
||||
case ARM_SMCCC_VENDOR_HYP_KVM_PTP_FUNC_ID:
|
||||
kvm_ptp_get_time(vcpu, val);
|
||||
break;
|
||||
case ARM_SMCCC_VENDOR_HYP_KVM_MEM_SHARE_FUNC_ID:
|
||||
if (!kvm_vcpu_exit_hcall(vcpu, ARM_SMCCC_KVM_FUNC_MEM_SHARE, 3))
|
||||
return 0;
|
||||
break;
|
||||
case ARM_SMCCC_VENDOR_HYP_KVM_MEM_UNSHARE_FUNC_ID:
|
||||
if (!kvm_vcpu_exit_hcall(vcpu, ARM_SMCCC_KVM_FUNC_MEM_UNSHARE, 3))
|
||||
return 0;
|
||||
break;
|
||||
case ARM_SMCCC_TRNG_VERSION:
|
||||
case ARM_SMCCC_TRNG_FEATURES:
|
||||
case ARM_SMCCC_TRNG_GET_UUID:
|
||||
|
||||
Reference in New Issue
Block a user