On Fri, Apr 08, 2022 at 09:02:54PM +0800, Chao Peng wrote: > > I think the correct approach is to not do the locking automatically for SHM_F_INACCESSIBLE, > > and instead require userspace to do shmctl(.., SHM_LOCK, ...) if userspace knows the > > consumers don't support migrate/swap. That'd require wrapping migrate_page() and then > > wiring up notifier hooks for migrate/swap, but IMO that's a good thing to get sorted > > out sooner than later. KVM isn't planning on support migrate/swap for TDX or SNP, > > but supporting at least migrate for a software-only implementation a la pKVM should > > be relatively straightforward. On the notifiee side, KVM can terminate the VM if it > > gets an unexpected migrate/swap, e.g. so that TDX/SEV VMs don't die later with > > exceptions and/or data corruption (pre-SNP SEV guests) in the guest. > > SHM_LOCK sounds like a good match. Emm, no. shmctl(2) and SHM_LOCK are SysV IPC thing. I don't see how they fit here. -- Kirill A. Shutemov