Re: [PATCH] mm: thp: Deny THP for guest_memfd and secretmem in file_thp_enabled()
From: David Hildenbrand (Arm)
Date: Wed Feb 11 2026 - 11:44:50 EST
On 2/11/26 17:35, David Hildenbrand (Arm) wrote:
On 2/11/26 17:16, Ackerley Tng wrote:
"David Hildenbrand (Arm)" <david@xxxxxxxxxx> writes:
Do you have a reproducer? If so, which behavior does it trigger?
I would assume that we would suddenly have secretmem pages (THP) that
have a directmap. Or some page copy would crash the kernel.
Is there a good way to verify from userspace that the directmap hasn't
been restored? Should I use CONFIG_PTDUMP_DEBUGFS?
Anything that uses GUP must fail on that secretmem memory. Like doing an O_DIRECT read/write or using vmsplice.
Ah, but that might still fail, because we can identify the page as such.
Hm ... we'd need some introspection interface indeed.
--
Cheers,
David