On Fri, Apr 08, 2022 at 09:02:54PM +0800, Chao Peng wrote:
> > I think the correct approach is to not do the locking automatically for 
> > SHM_F_INACCESSIBLE,
> > and instead require userspace to do shmctl(.., SHM_LOCK, ...) if userspace 
> > knows the
> > consumers don't support migrate/swap.  That'd require wrapping 
> > migrate_page() and then
> > wiring up notifier hooks for migrate/swap, but IMO that's a good thing to 
> > get sorted
> > out sooner than later.  KVM isn't planning on support migrate/swap for TDX 
> > or SNP,
> > but supporting at least migrate for a software-only implementation a la 
> > pKVM should
> > be relatively straightforward.  On the notifiee side, KVM can terminate the 
> > VM if it
> > gets an unexpected migrate/swap, e.g. so that TDX/SEV VMs don't die later 
> > with
> > exceptions and/or data corruption (pre-SNP SEV guests) in the guest.
> 
> SHM_LOCK sounds like a good match.

Emm, no. shmctl(2) and SHM_LOCK are SysV IPC thing. I don't see how they
fit here.

-- 
 Kirill A. Shutemov

Reply via email to