[{"id":3680790,"web_url":"http://patchwork.ozlabs.org/comment/3680790/","msgid":"<aekRySW_uKCEea1K@tswhison-laptop>","list_archive_url":null,"date":"2026-04-22T18:22:01","subject":"ACK: [SRU][Q][PATCH 0/1] Revert \"iommu: disable SVA when CONFIG_X86\n is set\"","submitter":{"id":89903,"url":"http://patchwork.ozlabs.org/api/people/89903/","name":"Tim Whisonant","email":"tim.whisonant@canonical.com"},"content":"On Wed, Apr 22, 2026 at 09:07:52PM +0300, Mehmet Basaran wrote:\n> BugLink: https://bugs.launchpad.net/bugs/2149766\n> \n> [Impact]\n>     \n> The issue has been brought to our attention when questing (6.17)\n> kernels were unable to load amd_xdna drivers. However, this commit,\n> in addition to NPUs, also affects PCIe cards which make use of\n> unified memory (GPUs, Accelerators, NICs). With this commit, PCIe\n> devices will revert to using legacy method (pinning) instead of\n> unified memory. As a result,\n>  - arguably it will be less secure,\n>  - there can be performance drops.\n> \n> Currently, this commit is part of an 8 commit patch series:\n> \"Fix stale IOTLB entries for kernel address space\", v7.\n>   [PATCH v7 1/8] iommu: Disable SVA when CONFIG_X86 is set\n>   [PATCH v7 2/8] mm: Add a ptdesc flag to mark kernel page tables\n>   [PATCH v7 3/8] mm: Actually mark kernel page table pages\n>   [PATCH v7 4/8] x86/mm: Use 'ptdesc' when freeing PMD pages\n>   [PATCH v7 5/8] mm: Introduce pure page table freeing function\n>   [PATCH v7 6/8] x86/mm: Use pagetable_free()\n>   [PATCH v7 7/8] mm: Introduce deferred freeing for kernel page tables\n>   [PATCH v7 8/8] iommu/sva: Invalidate stale IOTLB entries for kernel address space\n> \n> where \"iommu: disable SVA when CONFIG_X86 is set\" is undone by\n> the 8th commit. We only have this commit from the whole patchset.\n> Ideally we should have the whole patchset applied.\n> \n> [Fix]\n> \n> This commit fixes the following issue which is old,\n> 26b25a2b98e4 (\"iommu: Bind process address spaces to devices\")\n> and we applied this commit recently. So, reverting this commit\n> won't be introducing regressions. Affected kernel versions are:\n>  - 6.8 due to the reasons above.\n>  - 6.17 due to both the reasons above and the amd_xdna issue.\n> \n> [Test Plan]\n> \n> Our regression test suite doesn't catch this issue. However,\n> we will run it again to see it doesn't cause anything else.\n> \n> [Where problems could occur]\n> \n> Reverted commit is a fix for a security vulnerability related to\n> IOMMU Shared Virtual Addressing (SVA).  In an SVA context, an \n> IOMMU can cache kernel page table entries.  When a kernel page \n> table page is freed and reallocated for another purpose, the \n> IOMMU might still hold stale, incorrect entries.  This can be \n> exploited to cause a use-after-free or write-after-free condition,\n> potentially leading to privilege escalation or data corruption.\n> \n> Mehmet Basaran (1):\n>   Revert \"iommu: disable SVA when CONFIG_X86 is set\"\n> \n>  drivers/iommu/iommu-sva.c | 3 ---\n>  1 file changed, 3 deletions(-)\n> \n> -- \n> 2.43.0\n> \n\nAcked-by: Tim Whisonant <tim.whisonant@canonical.com>","headers":{"Return-Path":"<kernel-team-bounces@lists.ubuntu.com>","X-Original-To":"incoming@patchwork.ozlabs.org","Delivered-To":"patchwork-incoming@legolas.ozlabs.org","Authentication-Results":["legolas.ozlabs.org;\n\tdkim=fail reason=\"signature verification failed\" (4096-bit key;\n unprotected) header.d=canonical.com header.i=@canonical.com\n header.a=rsa-sha256 header.s=20251003 header.b=ML6q3ObU;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=lists.ubuntu.com\n (client-ip=185.125.189.65; helo=lists.ubuntu.com;\n envelope-from=kernel-team-bounces@lists.ubuntu.com;\n receiver=patchwork.ozlabs.org)"],"Received":["from lists.ubuntu.com (lists.ubuntu.com [185.125.189.65])\n\t(using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g16yG0lTDz1y2d\n\tfor <incoming@patchwork.ozlabs.org>; Thu, 23 Apr 2026 04:22:14 +1000 (AEST)","from localhost ([127.0.0.1] helo=lists.ubuntu.com)\n\tby lists.ubuntu.com with esmtp (Exim 4.86_2)\n\t(envelope-from <kernel-team-bounces@lists.ubuntu.com>)\n\tid 1wFcD8-0002q9-Sy; Wed, 22 Apr 2026 18:22:06 +0000","from smtp-relay-internal-1.internal ([10.131.114.114]\n helo=smtp-relay-internal-1.canonical.com)\n by lists.ubuntu.com with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128)\n (Exim 4.86_2) (envelope-from <tim.whisonant@canonical.com>)\n id 1wFcD7-0002pd-Ph\n for kernel-team@lists.ubuntu.com; Wed, 22 Apr 2026 18:22:05 +0000","from mail-oa1-f70.google.com (mail-oa1-f70.google.com\n [209.85.160.70])\n (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest\n SHA256)\n (No client certificate requested)\n by smtp-relay-internal-1.canonical.com (Postfix) with ESMTPS id AE27E3F61A\n for <kernel-team@lists.ubuntu.com>; Wed, 22 Apr 2026 18:22:05 +0000 (UTC)","by mail-oa1-f70.google.com with SMTP id\n 586e51a60fabf-42fc662818eso1762148fac.3\n for <kernel-team@lists.ubuntu.com>; Wed, 22 Apr 2026 11:22:05 -0700 (PDT)","from localhost (104-6-108-11.lightspeed.frokca.sbcglobal.net.\n [104.6.108.11]) by smtp.gmail.com with ESMTPSA id\n 586e51a60fabf-42b934a2e8esm16128457fac.10.2026.04.22.11.22.02\n for <kernel-team@lists.ubuntu.com>\n (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);\n Wed, 22 Apr 2026 11:22:02 -0700 (PDT)"],"DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed; d=canonical.com;\n s=20251003; t=1776882125;\n bh=RNaMUqkH042eW05qIOOsTNKFouDiDgwnEBBJGkT1/S0=;\n h=Date:From:To:Subject:Message-ID:References:MIME-Version:\n Content-Type:In-Reply-To;\n b=ML6q3ObUSKb0Etpeep96KwpyQK09bCg6zdWV27IXdvp4BGiIyA5zKxlyV/BuMNgs6\n eCXq5vznl014LCrUMAJHkr/TbNc+uWSCySl05zqqInhmIH2VhgiDcQ4gpwVzduK/MD\n hO5vMAdn4zn5r2G/7LMmAqNNAFuxqQ6AcfVfxF4UosQaE9yPbDo4f4wPD0jSx42oW+\n rFUxQmFbHwtXjQOe9KJ50kLv3SWV6Xn6lubOYRkvPfRZSWa2ROzD2Qz6jwvm/KUeHV\n GZxZ8X/8vr/QLt6B+VcLaFrayNJ0olpNkQ3S02RE4lZ6N56Q0R+kqgubiTIWuCLyAY\n W28HNOGrtuwL/Bf3caoGjWjszIhO22U/Uz9+YhrD3p8GYQLUJ/TsMa0fbI6Cd8WfAL\n 7FF/DrKsnbURbC/qMQh6kADHPAlqsebO9ZUlNXe0B1ce3G0Uv/5Pw+NIWoLdPhQ4ru\n APuDJct2ZrOQMNDxvOCA5NLgK+6AOSsfdBaUHAuf72vLyctKgDyQCDjx+Q5opjWGRc\n j2z4LYuGFOOekKYkIu9dLrTMnTBdl8lFn6/jpcVTPg0qCFzMg8xtVR8TC/rbMbmBzd\n AjYQPd3i5/TWkAI2p5xns+ky1Z3uLpx5nw28BXt0/ylKorkdgXM83hzbcj8XZEtN+E\n SLT1gerunMAp1N/JWxlIXX7M=","X-Google-DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=1e100.net; s=20251104; t=1776882124; x=1777486924;\n h=in-reply-to:content-disposition:mime-version:references:message-id\n :subject:to:from:date:x-gm-gg:x-gm-message-state:from:to:cc:subject\n :date:message-id:reply-to;\n bh=RNaMUqkH042eW05qIOOsTNKFouDiDgwnEBBJGkT1/S0=;\n b=eZosdcHxmfRVmr5/YumLkAD2VaUZSBEqWjFREyDYkcruF9z6Swrq4/C7xJdunTCdDv\n HVX0byHgdF/K12t20URFzfgq2fic0rdbdBK0EG1nGTUgNAf00o8Gsv5VpSZUCtLvRztR\n M709IIQcVbsjNiXdd0DLOBeKG0KHJZZPk9XISvm3cPB6u7I5uQ3nCbE34HvIqpAMIhCu\n BJ9F+Yjk4WJLT7VIAMNZ8JW1I1rocioRdQQJiva/bXuwtofZytBCwYz4X5dIP/llp7ay\n nK6IouuR8/MDVuMVMn+2eTIC+Wa5Halr/RizINTS2km6ojP9uC6ZOy8OVSBFCE9QQzW6\n Y0Tw==","X-Gm-Message-State":"AOJu0YzSVI7YNuZ6DNhkuei1vGe7IJwqBf5q07LdVFQuz31BxsQwT0ml\n i5IFxDu6l5hZ8zXrdbTaQ0p7/D7qw4X5Nu1WzQf8r3Go7GVRsgIOh8drXE04L09LDD3YxKFF8EP\n 4/jPrY/7hjmbA0CB1ddvykNEU50+5IJWEWB3+Luyxw+bcJrTbuvs+Qfy6aKSZBA45ps+7B1Ywza\n UQn9dqZLzwntcPGQ==","X-Gm-Gg":"AeBDiessGQlXYN2dzHpgdS04jJJ5ulZfsHXMIhW98wMVf0pJrzyrr8qZatmVIIT0w7T\n vzqoxnRI1fTrCRVj13nWFSTPSivMD9sHptmUhaNON/PLeOdr3tyvPMPtHOLVL3hMPSXGLHlVWtX\n MaJol1Zje/WCZ4Q9qQJBr98cS1hCl66wfHrUxisLQ4VDmzy8lQcmfFBe0H16+HKGlFmDFdGsr9W\n bkx6lOk3Pylo/XGbH1sZH2Me/YwbsvsatTkhF+Jsxjp3b966Mi+4223X/6tc1FBDMZc/vYsLcFK\n F3uY+owqJzoZU1IEbIiRvVvHEt0VTtMoHaF6oPgrl5qNgWGnRmcD/wXL8TtnkqDnVcJktNJb1BL\n A7pKkU0UCNX+/2Ys7CJkzEBXaUG867V02/qWcjBD5sOfsOSsCu+Bqwxan5MvyaGcxAQ8nKOLIR9\n DUbJQIpUUbhxid","X-Received":["by 2002:a05:6871:d3c8:b0:41c:ccd1:78b4 with SMTP id\n 586e51a60fabf-42abf2e015fmr14526159fac.10.1776882123960;\n Wed, 22 Apr 2026 11:22:03 -0700 (PDT)","by 2002:a05:6871:d3c8:b0:41c:ccd1:78b4 with SMTP id\n 586e51a60fabf-42abf2e015fmr14526131fac.10.1776882123376;\n Wed, 22 Apr 2026 11:22:03 -0700 (PDT)"],"Date":"Wed, 22 Apr 2026 11:22:01 -0700","From":"Tim Whisonant <tim.whisonant@canonical.com>","To":"kernel-team@lists.ubuntu.com","Subject":"ACK: [SRU][Q][PATCH 0/1] Revert \"iommu: disable SVA when CONFIG_X86\n is set\"","Message-ID":"<aekRySW_uKCEea1K@tswhison-laptop>","References":"<20260422180753.338056-1-mehmet.basaran@canonical.com>","MIME-Version":"1.0","Content-Disposition":"inline","In-Reply-To":"<20260422180753.338056-1-mehmet.basaran@canonical.com>","X-BeenThere":"kernel-team@lists.ubuntu.com","X-Mailman-Version":"2.1.20","Precedence":"list","List-Id":"Kernel team discussions <kernel-team.lists.ubuntu.com>","List-Unsubscribe":"<https://lists.ubuntu.com/mailman/options/kernel-team>,\n <mailto:kernel-team-request@lists.ubuntu.com?subject=unsubscribe>","List-Archive":"<https://lists.ubuntu.com/archives/kernel-team>","List-Post":"<mailto:kernel-team@lists.ubuntu.com>","List-Help":"<mailto:kernel-team-request@lists.ubuntu.com?subject=help>","List-Subscribe":"<https://lists.ubuntu.com/mailman/listinfo/kernel-team>,\n <mailto:kernel-team-request@lists.ubuntu.com?subject=subscribe>","Content-Type":"text/plain; charset=\"utf-8\"","Content-Transfer-Encoding":"base64","Errors-To":"kernel-team-bounces@lists.ubuntu.com","Sender":"\"kernel-team\" <kernel-team-bounces@lists.ubuntu.com>"}},{"id":3680810,"web_url":"http://patchwork.ozlabs.org/comment/3680810/","msgid":"<DHZWHBUN3G2P.2QYLODC5ZNX1B@canonical.com>","list_archive_url":null,"date":"2026-04-22T18:37:55","subject":"ACK: [SRU][Q][PATCH 0/1] Revert \"iommu: disable SVA when CONFIG_X86\n is set\"","submitter":{"id":91410,"url":"http://patchwork.ozlabs.org/api/people/91410/","name":"Alice C. Munduruca","email":"alice.munduruca@canonical.com"},"content":"On Wed Apr 22, 2026 at 2:07 PM EDT, Mehmet Basaran wrote:\n> BugLink: https://bugs.launchpad.net/bugs/2149766\n>\n> [Impact]\n>     \n> The issue has been brought to our attention when questing (6.17)\n> kernels were unable to load amd_xdna drivers. However, this commit,\n> in addition to NPUs, also affects PCIe cards which make use of\n> unified memory (GPUs, Accelerators, NICs). With this commit, PCIe\n> devices will revert to using legacy method (pinning) instead of\n> unified memory. As a result,\n>  - arguably it will be less secure,\n>  - there can be performance drops.\n>\n> Currently, this commit is part of an 8 commit patch series:\n> \"Fix stale IOTLB entries for kernel address space\", v7.\n>   [PATCH v7 1/8] iommu: Disable SVA when CONFIG_X86 is set\n>   [PATCH v7 2/8] mm: Add a ptdesc flag to mark kernel page tables\n>   [PATCH v7 3/8] mm: Actually mark kernel page table pages\n>   [PATCH v7 4/8] x86/mm: Use 'ptdesc' when freeing PMD pages\n>   [PATCH v7 5/8] mm: Introduce pure page table freeing function\n>   [PATCH v7 6/8] x86/mm: Use pagetable_free()\n>   [PATCH v7 7/8] mm: Introduce deferred freeing for kernel page tables\n>   [PATCH v7 8/8] iommu/sva: Invalidate stale IOTLB entries for kernel address space\n>\n> where \"iommu: disable SVA when CONFIG_X86 is set\" is undone by\n> the 8th commit. We only have this commit from the whole patchset.\n> Ideally we should have the whole patchset applied.\n>\n> [Fix]\n>\n> This commit fixes the following issue which is old,\n> 26b25a2b98e4 (\"iommu: Bind process address spaces to devices\")\n> and we applied this commit recently. So, reverting this commit\n> won't be introducing regressions. Affected kernel versions are:\n>  - 6.8 due to the reasons above.\n>  - 6.17 due to both the reasons above and the amd_xdna issue.\n>\n> [Test Plan]\n>\n> Our regression test suite doesn't catch this issue. However,\n> we will run it again to see it doesn't cause anything else.\n>\n> [Where problems could occur]\n>\n> Reverted commit is a fix for a security vulnerability related to\n> IOMMU Shared Virtual Addressing (SVA).  In an SVA context, an \n> IOMMU can cache kernel page table entries.  When a kernel page \n> table page is freed and reallocated for another purpose, the \n> IOMMU might still hold stale, incorrect entries.  This can be \n> exploited to cause a use-after-free or write-after-free condition,\n> potentially leading to privilege escalation or data corruption.\n>\n> Mehmet Basaran (1):\n>   Revert \"iommu: disable SVA when CONFIG_X86 is set\"\n>\n>  drivers/iommu/iommu-sva.c | 3 ---\n>  1 file changed, 3 deletions(-)\n\nAcked-by: Alice C. Munduruca <alice.munduruca@canonical.com>","headers":{"Return-Path":"<kernel-team-bounces@lists.ubuntu.com>","X-Original-To":"incoming@patchwork.ozlabs.org","Delivered-To":"patchwork-incoming@legolas.ozlabs.org","Authentication-Results":["legolas.ozlabs.org;\n\tdkim=fail reason=\"signature verification failed\" (4096-bit key;\n unprotected) header.d=canonical.com header.i=@canonical.com\n header.a=rsa-sha256 header.s=20251003 header.b=gBhwx2tW;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=lists.ubuntu.com\n (client-ip=185.125.189.65; helo=lists.ubuntu.com;\n envelope-from=kernel-team-bounces@lists.ubuntu.com;\n receiver=patchwork.ozlabs.org)"],"Received":["from lists.ubuntu.com (lists.ubuntu.com [185.125.189.65])\n\t(using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g17Jc5mNjz1y2d\n\tfor <incoming@patchwork.ozlabs.org>; Thu, 23 Apr 2026 04:38:08 +1000 (AEST)","from localhost ([127.0.0.1] helo=lists.ubuntu.com)\n\tby lists.ubuntu.com with esmtp (Exim 4.86_2)\n\t(envelope-from <kernel-team-bounces@lists.ubuntu.com>)\n\tid 1wFcSV-0001NM-Lc; Wed, 22 Apr 2026 18:37:59 +0000","from smtp-relay-internal-1.internal ([10.131.114.114]\n helo=smtp-relay-internal-1.canonical.com)\n by lists.ubuntu.com with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128)\n (Exim 4.86_2) (envelope-from <alice.munduruca@canonical.com>)\n id 1wFcSU-0001Mx-80\n for kernel-team@lists.ubuntu.com; Wed, 22 Apr 2026 18:37:58 +0000","from mail-qk1-f198.google.com (mail-qk1-f198.google.com\n [209.85.222.198])\n (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest\n SHA256)\n (No client certificate requested)\n by smtp-relay-internal-1.canonical.com (Postfix) with ESMTPS id 139553F918\n for <kernel-team@lists.ubuntu.com>; Wed, 22 Apr 2026 18:37:58 +0000 (UTC)","by mail-qk1-f198.google.com with SMTP id\n af79cd13be357-8eb55e55394so704843485a.1\n for <kernel-team@lists.ubuntu.com>; Wed, 22 Apr 2026 11:37:58 -0700 (PDT)","from localhost\n (bras-base-qubcpq0974w-grc-09-69-157-253-239.dsl.bell.ca. [69.157.253.239])\n by smtp.gmail.com with ESMTPSA id\n af79cd13be357-8e7d5fe8f3csm1422454485a.2.2026.04.22.11.37.55\n (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128);\n Wed, 22 Apr 2026 11:37:55 -0700 (PDT)"],"DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed; d=canonical.com;\n s=20251003; t=1776883078;\n bh=v8gSlMVc8N89OMaUFh4BKyurs9WisSgQBxjWsM/BKIY=;\n h=Mime-Version:Content-Type:Date:Message-Id:To:Subject:From:\n References:In-Reply-To;\n b=gBhwx2tWZ742mExshPE/xsDmxMW4D7+XwUPeie0BJSUYjDH9uKE41x05xFW1Lf1zi\n tCSp2roo1JtKNJX5197X24yYIl+VVAjTN9DAAdghWASe4mnVtA2wXqzbHc/+3bDnMs\n efKo+HepvDqdNrJeInuaHHMnOEooEbwEFjedROJi2MRBR58pIxolNA8JiV+YDw5KMQ\n xyHAsDkjqSQIeNB5muuTc9iL1vAQzbtedyoGZvlHlXdV7U9ZkkEkW+4T9WeeQrtyc4\n 93MFYqWeeal2sgKh9BkMpRUnI16LrYZfBPw7mlVktsl0YNMWc1XVJMwM1I3e9VVwkO\n ISp8gQcz7IMDoSuaJhyVzXLWhTBagMvzJrEJGv7A6Q+M68J0Xx32THc9p8T8a6owsI\n O+QHJfRVfzQr6Dl+QexwOd+hk3oq3JzQ4jaK4cTU2hIMc/L5YEwn/LGXcHFgcSPJdz\n FejhIplrDWGB/xgmWu5gLQKFlYX8+1L8vyj3EnEBMqCEwnIp06XJaZEuPGksUjN9L7\n M14BkDpQ3Mhdwf+UfuptaoybbigqUgVXL/+5THEmsS5q9db1zACyXXCC9CTv3H90E4\n 6mIFguURZ9DP4/gkYnyZyM+WmPty3uGz2jqP/bU+wu17OV2zkrEbFS6HHvDnNreGA5\n oGTAQem5o8up4ZoMrgPav5nM=","X-Google-DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=1e100.net; s=20251104; t=1776883077; x=1777487877;\n h=in-reply-to:references:from:subject:to:message-id:date\n :content-transfer-encoding:mime-version:x-gm-gg:x-gm-message-state\n :from:to:cc:subject:date:message-id:reply-to;\n bh=v8gSlMVc8N89OMaUFh4BKyurs9WisSgQBxjWsM/BKIY=;\n b=knErnHJiC1RboS39UjTRy03lVjRAUQtBSwPaNGrUWPVWea6NfjVRDCmALSl3kshjFP\n 11YnUOvKkJIh9VlvEF1qXqdCycOeqhPtMgK5Bic5B0JI1GKG9k2mImmiYixGkmwNK3O8\n 9AI1XWnu92vGh0UtKHWNEOnILyid/tMQbIu5BeZraolWYD5JLsFgXzm5za8C5SzBiGxD\n iJ8sAUZujUz0Ui6Z8Tl+ZrgEuMf9OjldM5SzJGnmP49RvYyOUFziPAuNhn2cDIvFRVgE\n zveXocf9QizDHz32jOXL3z4Ame63pkRU7i2vIyKYvE+6d7T29GWdnxQmlBBISGQX8iNd\n oVLA==","X-Forwarded-Encrypted":"i=1;\n AFNElJ9pVK6l2C8W0aJm/Qzd+szRTJZOAmhrdC9QCSDJ/uJ8GxqyWGll44kXKTDBCjKiuo8djrw6dFlMPcPLog==@lists.ubuntu.com","X-Gm-Message-State":"AOJu0YxsYtooSMpH6bvGYSjEPmM7R8tKDagEJbvsUQwPpcSzcYFHU9MR\n G55g0tJ4xOsXmrcHNaR6Qlmvc7IKMURI8l1k1zwlWDCsr/kdBx+hggy0IgEhTQrVWocKyO7TzfZ\n yF2fc6QjGyZ6axoZ1UigSTTDEMVi971h9qNmrpL+sx9DW5WZ3YnFpyfX1Mcq2NpuX1bvUz4o33o\n NWMKK2Sk1ph5T5bg==","X-Gm-Gg":"AeBDiet2GwpCbXsxZ7NKBcne3xhMgjsA2DPteyNFBLlIMBV0QKav4zH2tIViadZxZt/\n p406Zb6QLQJXLtDtNxdEk+mlEQs0RTfg818A880O+sxP9gi5iYLbvxZIdaDSNXuKYHnb9qGCkaG\n lZhQc0e3/DMzlXsU18ozku7sVMb5kvkcQzl4/qmd3VqGylLJB5sV5nN/wnEY7G+e3K6LL9CKg2G\n +1gVVWn+4CJuMeeW50v9sUvSg+ZYASDZi2i3yXX1GNuogz/RkqBKHuWQbiwNcUrSchpTvUvy5Ex\n Hi1P5Ph1EXS1WLR7GmNv56u1RM+IIpltKb/9tsCYCVzCEqsozRSnrHilPoEXvJcBk7WdgOCbtUF\n o3wzmD9Khax6qZvdI8TatjhJlKaw+eZAerX1fgIMj+2bynx8ZtiPR9ooY3NoyUNM8ZGl9aDsam7\n DHL/YDmUnTdoe5jg5hvc870SSteixoNjc0","X-Received":["by 2002:a05:620a:460f:b0:8cf:c106:faca with SMTP id\n af79cd13be357-8e791f755f5mr3355947585a.36.1776883077018;\n Wed, 22 Apr 2026 11:37:57 -0700 (PDT)","by 2002:a05:620a:460f:b0:8cf:c106:faca with SMTP id\n af79cd13be357-8e791f755f5mr3355943485a.36.1776883076430;\n Wed, 22 Apr 2026 11:37:56 -0700 (PDT)"],"Mime-Version":"1.0","Date":"Wed, 22 Apr 2026 14:37:55 -0400","Message-Id":"<DHZWHBUN3G2P.2QYLODC5ZNX1B@canonical.com>","To":"\"Mehmet Basaran\" <mehmet.basaran@canonical.com>,\n <kernel-team@lists.ubuntu.com>","Subject":"ACK: [SRU][Q][PATCH 0/1] Revert \"iommu: disable SVA when CONFIG_X86\n is set\"","From":"\"Alice C. Munduruca\" <alice.munduruca@canonical.com>","X-Mailer":"aerc 0.21.0","References":"<20260422180753.338056-1-mehmet.basaran@canonical.com>","In-Reply-To":"<20260422180753.338056-1-mehmet.basaran@canonical.com>","X-BeenThere":"kernel-team@lists.ubuntu.com","X-Mailman-Version":"2.1.20","Precedence":"list","List-Id":"Kernel team discussions <kernel-team.lists.ubuntu.com>","List-Unsubscribe":"<https://lists.ubuntu.com/mailman/options/kernel-team>,\n <mailto:kernel-team-request@lists.ubuntu.com?subject=unsubscribe>","List-Archive":"<https://lists.ubuntu.com/archives/kernel-team>","List-Post":"<mailto:kernel-team@lists.ubuntu.com>","List-Help":"<mailto:kernel-team-request@lists.ubuntu.com?subject=help>","List-Subscribe":"<https://lists.ubuntu.com/mailman/listinfo/kernel-team>,\n <mailto:kernel-team-request@lists.ubuntu.com?subject=subscribe>","Content-Type":"text/plain; charset=\"utf-8\"","Content-Transfer-Encoding":"base64","Errors-To":"kernel-team-bounces@lists.ubuntu.com","Sender":"\"kernel-team\" <kernel-team-bounces@lists.ubuntu.com>"}},{"id":3680917,"web_url":"http://patchwork.ozlabs.org/comment/3680917/","msgid":"<87340mss9q.fsf@gmail.com>","list_archive_url":null,"date":"2026-04-22T19:34:57","subject":"APPLIED: [SRU][Q][PATCH 0/1] Revert \"iommu: disable SVA when\n CONFIG_X86 is set\"","submitter":{"id":89305,"url":"http://patchwork.ozlabs.org/api/people/89305/","name":"Mehmet Basaran","email":"mehmet.basaran@canonical.com"},"content":"Applied to questing:linux master-next branch. Thanks.\nMehmet Basaran <mehmet.basaran@canonical.com> writes:\n\n> BugLink: https://bugs.launchpad.net/bugs/2149766\n>\n> [Impact]\n>     \n> The issue has been brought to our attention when questing (6.17)\n> kernels were unable to load amd_xdna drivers. However, this commit,\n> in addition to NPUs, also affects PCIe cards which make use of\n> unified memory (GPUs, Accelerators, NICs). With this commit, PCIe\n> devices will revert to using legacy method (pinning) instead of\n> unified memory. As a result,\n>  - arguably it will be less secure,\n>  - there can be performance drops.\n>\n> Currently, this commit is part of an 8 commit patch series:\n> \"Fix stale IOTLB entries for kernel address space\", v7.\n>   [PATCH v7 1/8] iommu: Disable SVA when CONFIG_X86 is set\n>   [PATCH v7 2/8] mm: Add a ptdesc flag to mark kernel page tables\n>   [PATCH v7 3/8] mm: Actually mark kernel page table pages\n>   [PATCH v7 4/8] x86/mm: Use 'ptdesc' when freeing PMD pages\n>   [PATCH v7 5/8] mm: Introduce pure page table freeing function\n>   [PATCH v7 6/8] x86/mm: Use pagetable_free()\n>   [PATCH v7 7/8] mm: Introduce deferred freeing for kernel page tables\n>   [PATCH v7 8/8] iommu/sva: Invalidate stale IOTLB entries for kernel address space\n>\n> where \"iommu: disable SVA when CONFIG_X86 is set\" is undone by\n> the 8th commit. We only have this commit from the whole patchset.\n> Ideally we should have the whole patchset applied.\n>\n> [Fix]\n>\n> This commit fixes the following issue which is old,\n> 26b25a2b98e4 (\"iommu: Bind process address spaces to devices\")\n> and we applied this commit recently. So, reverting this commit\n> won't be introducing regressions. Affected kernel versions are:\n>  - 6.8 due to the reasons above.\n>  - 6.17 due to both the reasons above and the amd_xdna issue.\n>\n> [Test Plan]\n>\n> Our regression test suite doesn't catch this issue. However,\n> we will run it again to see it doesn't cause anything else.\n>\n> [Where problems could occur]\n>\n> Reverted commit is a fix for a security vulnerability related to\n> IOMMU Shared Virtual Addressing (SVA).  In an SVA context, an \n> IOMMU can cache kernel page table entries.  When a kernel page \n> table page is freed and reallocated for another purpose, the \n> IOMMU might still hold stale, incorrect entries.  This can be \n> exploited to cause a use-after-free or write-after-free condition,\n> potentially leading to privilege escalation or data corruption.\n>\n> Mehmet Basaran (1):\n>   Revert \"iommu: disable SVA when CONFIG_X86 is set\"\n>\n>  drivers/iommu/iommu-sva.c | 3 ---\n>  1 file changed, 3 deletions(-)\n>\n> -- \n> 2.43.0","headers":{"Return-Path":"<kernel-team-bounces@lists.ubuntu.com>","X-Original-To":"incoming@patchwork.ozlabs.org","Delivered-To":"patchwork-incoming@legolas.ozlabs.org","Authentication-Results":["legolas.ozlabs.org;\n\tdkim=fail reason=\"signature verification failed\" (4096-bit key;\n unprotected) header.d=canonical.com header.i=@canonical.com\n header.a=rsa-sha256 header.s=20251003 header.b=q+rB2Bvo;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=lists.ubuntu.com\n (client-ip=185.125.189.65; helo=lists.ubuntu.com;\n envelope-from=kernel-team-bounces@lists.ubuntu.com;\n receiver=patchwork.ozlabs.org)"],"Received":["from lists.ubuntu.com (lists.ubuntu.com [185.125.189.65])\n\t(using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g18ZZ4F0zz1y2d\n\tfor <incoming@patchwork.ozlabs.org>; Thu, 23 Apr 2026 05:35:17 +1000 (AEST)","from localhost ([127.0.0.1] helo=lists.ubuntu.com)\n\tby lists.ubuntu.com with esmtp (Exim 4.86_2)\n\t(envelope-from <kernel-team-bounces@lists.ubuntu.com>)\n\tid 1wFdLi-0007RI-VO; Wed, 22 Apr 2026 19:35:02 +0000","from smtp-relay-internal-1.internal ([10.131.114.114]\n helo=smtp-relay-internal-1.canonical.com)\n by lists.ubuntu.com with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128)\n (Exim 4.86_2) (envelope-from <mehmet.basaran@canonical.com>)\n id 1wFdLh-0007QK-Qq\n for kernel-team@lists.ubuntu.com; Wed, 22 Apr 2026 19:35:01 +0000","from mail-wr1-f72.google.com (mail-wr1-f72.google.com\n [209.85.221.72])\n (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest\n SHA256)\n (No client certificate requested)\n by smtp-relay-internal-1.canonical.com (Postfix) with ESMTPS id AD2E93F206\n for <kernel-team@lists.ubuntu.com>; Wed, 22 Apr 2026 19:35:01 +0000 (UTC)","by mail-wr1-f72.google.com with SMTP id\n ffacd0b85a97d-43d7a5b9678so4644518f8f.2\n for <kernel-team@lists.ubuntu.com>; Wed, 22 Apr 2026 12:35:01 -0700 (PDT)","from localhost ([149.86.141.144]) by smtp.gmail.com with ESMTPSA id\n ffacd0b85a97d-43fe4cb13a0sm47752613f8f.8.2026.04.22.12.34.59\n for <kernel-team@lists.ubuntu.com>\n (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);\n Wed, 22 Apr 2026 12:34:59 -0700 (PDT)"],"DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed; d=canonical.com;\n s=20251003; t=1776886501;\n bh=H3NEAw2AqoMdDj9KP2KLRtAPiAywDj2m08pGIhSVEOA=;\n h=From:To:Subject:In-Reply-To:References:Date:Message-ID:\n MIME-Version:Content-Type;\n b=q+rB2BvoHI6Dc1xgviQ9BLJZJUvZ/Q7iFSqQ+YxNvjxCYX0QQJLXE1+e+8aSNKqPh\n ISzyYYg4rm0QhbQTHQdEIjn4GSA+Mxf+Ve9gDUn4zie5qMtUF+rEGxjXjVjLZFCSqw\n aW0eU3feNWsE4qjMNW7EzBQPlwbC5pIpPLOo/KAsc71BnTWE8ElspTTKIc50GWoiKp\n tPqwN7+iSaWrDEi4XGqwWxc/8EMcEOybuWvUYU/j/tncY5sUQ6oM/Q/c9AzCpqnNmC\n RxLPlv6fcgKumy72Re9dxHvNbRkCXRT/S2y0RyK7dZUJA9Z35aefoM+pBRJuIYJNmv\n ejOJqknP7ZgY1TjMuZ6g6sA77Qhcji8YMJri9pPTtS+GGrPE3nGBpj115yIDsg/pk4\n Zrm3YBpyx+/qwlodKR5DPZhnIZbHpGM5YkCYUR7/Mnog4gaF+PtmW36x7UMCsqFS+9\n xLNjng1Cz3EQxaJ7i+O9A3T+76GKSnLP4CloEDXAXULoj3isjSlWoao5mGX1mC7kIe\n /QoIXRUcdDqJTfu99heZCpVIlvwt1bnPklg1EvwZDAFqRyZwOqCyLyWVXRXU4Qk3zJ\n jfVvKTCcQcQCGF+riJ/Ky9C7XAx/w94W1N3oF5uJ/r3RgolaeXOqMhK7f8cgF8wFlM\n bEMz+onL+AEt+9qr0MOtAzu0=","X-Google-DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=1e100.net; s=20251104; t=1776886501; x=1777491301;\n h=mime-version:message-id:date:references:in-reply-to:subject:to:from\n :x-gm-gg:x-gm-message-state:from:to:cc:subject:date:message-id\n :reply-to;\n bh=H3NEAw2AqoMdDj9KP2KLRtAPiAywDj2m08pGIhSVEOA=;\n b=g4yz87zas+gkJ4T7vT7Drlkwp57d0ZIXpEkLOfpyIOLBgA3QCd8QrpWOSrtUi1s3Fw\n vEBApO6vJEYYo648Y6NVGQjGPmIjNDVxEDsef+DzpuM4H5ExZXvn5wZahxoPzxf88YMB\n lg8kY9o5B1iZ3nd9vuaExlQOJC+IpbivU+bzEQQqZ7deyMnAGDLIKVSTJ02gMYnH3WaQ\n 0ErfmZW7ZEVpUXiTHvggr+48Mmua9+CwV2PQ603Rev7BwmScHoSVmvcyfHR+J1KGqa/z\n da0ralIyu9yK2h1n3zRuY4W2697ePPeSRb33mpfTKD9GNQk9Xh9du8KUnZAn1oPAtAaI\n vjqQ==","X-Gm-Message-State":"AOJu0Yy5nvD/bZmhOWxbR9Cmn5XjcDjjv2qrmZA6dj4eWaASU/DzYsv6\n wPqQBu01ml207eX7QZM1FgOKp3j/YQ6W4h+IcpdyZBp+LF4AlWYld6UZA+SfhB4bp1cXB647pBD\n pkc/TB5jbqDJTpF1Ucoc3ZazolHpSc31WdNYg2tbpq4So3Bvh7eYB5Yo8CyWErKU8yV9pAC34d7\n zYQoUO6GGHGCgVOmY7","X-Gm-Gg":"AeBDievfkVzilP0FH/K/fypmQaihmgeOmDvbCk4C8yGAujLxwsCxGCFJ2x+DDcgq3nn\n mpsq6BCiArcRGnPgFx2xs3bNR0CU79qq6v/zAi5aSC0gUxuCYn7y+N3fIgEMSNXmwtUiWGVgYh5\n DntsWl/d0blntCUsqVwJsBtoDr+zIPYLbopedSxWYewiEiYjT8KeOd3Pgy46Hda8G3ua2YPvnQb\n HMI2AnAt/ZHz84FJpd2fDz4pcG6KA6B4/nAeTg2ET0OnqXTKe4ga/wnKMlo5MKbyJjHfxztb9eN\n gMfXa1n7yoKJF4HRCjSiommqyHeJxNp9kQWy5Prr7jXoJCYuxh09kzE0l4sInnqBy2DdNV6XFtJ\n IBhVScbyMSgLQbUA51/oWzzgGML+27qUdkQe3MU9vVw==","X-Received":["by 2002:adf:f8ca:0:b0:43f:e41d:8ba8 with SMTP id\n ffacd0b85a97d-43fe41d8c15mr26155766f8f.2.1776886500841;\n Wed, 22 Apr 2026 12:35:00 -0700 (PDT)","by 2002:adf:f8ca:0:b0:43f:e41d:8ba8 with SMTP id\n ffacd0b85a97d-43fe41d8c15mr26155744f8f.2.1776886500400;\n Wed, 22 Apr 2026 12:35:00 -0700 (PDT)"],"From":"Mehmet Basaran <mehmet.basaran@canonical.com>","To":"kernel-team@lists.ubuntu.com","Subject":"APPLIED: [SRU][Q][PATCH 0/1] Revert \"iommu: disable SVA when\n CONFIG_X86 is set\"","In-Reply-To":"<20260422180753.338056-1-mehmet.basaran@canonical.com>","References":"<20260422180753.338056-1-mehmet.basaran@canonical.com>","Date":"Wed, 22 Apr 2026 22:34:57 +0300","Message-ID":"<87340mss9q.fsf@gmail.com>","MIME-Version":"1.0","Content-Type":"multipart/mixed; boundary=\"=-=-=\"","X-BeenThere":"kernel-team@lists.ubuntu.com","X-Mailman-Version":"2.1.20","Precedence":"list","List-Id":"Kernel team discussions <kernel-team.lists.ubuntu.com>","List-Unsubscribe":"<https://lists.ubuntu.com/mailman/options/kernel-team>,\n <mailto:kernel-team-request@lists.ubuntu.com?subject=unsubscribe>","List-Archive":"<https://lists.ubuntu.com/archives/kernel-team>","List-Post":"<mailto:kernel-team@lists.ubuntu.com>","List-Help":"<mailto:kernel-team-request@lists.ubuntu.com?subject=help>","List-Subscribe":"<https://lists.ubuntu.com/mailman/listinfo/kernel-team>,\n <mailto:kernel-team-request@lists.ubuntu.com?subject=subscribe>","Errors-To":"kernel-team-bounces@lists.ubuntu.com","Sender":"\"kernel-team\" <kernel-team-bounces@lists.ubuntu.com>"}}]