{"id":2226655,"url":"http://patchwork.ozlabs.org/api/covers/2226655/?format=json","web_url":"http://patchwork.ozlabs.org/project/ubuntu-kernel/cover/20260422180616.336474-1-mehmet.basaran@canonical.com/","project":{"id":15,"url":"http://patchwork.ozlabs.org/api/projects/15/?format=json","name":"Ubuntu Kernel","link_name":"ubuntu-kernel","list_id":"kernel-team.lists.ubuntu.com","list_email":"kernel-team@lists.ubuntu.com","web_url":null,"scm_url":null,"webscm_url":null,"list_archive_url":"","list_archive_url_format":"","commit_url_format":""},"msgid":"<20260422180616.336474-1-mehmet.basaran@canonical.com>","list_archive_url":null,"date":"2026-04-22T18:06:15","name":"[SRU,N,0/1] Revert \"iommu: disable SVA when CONFIG_X86 is set\"","submitter":{"id":89305,"url":"http://patchwork.ozlabs.org/api/people/89305/?format=json","name":"Mehmet Basaran","email":"mehmet.basaran@canonical.com"},"mbox":"http://patchwork.ozlabs.org/project/ubuntu-kernel/cover/20260422180616.336474-1-mehmet.basaran@canonical.com/mbox/","series":[{"id":501061,"url":"http://patchwork.ozlabs.org/api/series/501061/?format=json","web_url":"http://patchwork.ozlabs.org/project/ubuntu-kernel/list/?series=501061","date":"2026-04-22T18:06:15","name":"Revert \"iommu: disable SVA when CONFIG_X86 is set\"","version":1,"mbox":"http://patchwork.ozlabs.org/series/501061/mbox/"}],"comments":"http://patchwork.ozlabs.org/api/covers/2226655/comments/","headers":{"Return-Path":"<kernel-team-bounces@lists.ubuntu.com>","X-Original-To":"incoming@patchwork.ozlabs.org","Delivered-To":"patchwork-incoming@legolas.ozlabs.org","Authentication-Results":["legolas.ozlabs.org;\n\tdkim=fail reason=\"signature verification failed\" (4096-bit key;\n unprotected) header.d=canonical.com header.i=@canonical.com\n header.a=rsa-sha256 header.s=20251003 header.b=e+3n+xMq;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=lists.ubuntu.com\n (client-ip=185.125.189.65; helo=lists.ubuntu.com;\n envelope-from=kernel-team-bounces@lists.ubuntu.com;\n receiver=patchwork.ozlabs.org)"],"Received":["from lists.ubuntu.com (lists.ubuntu.com [185.125.189.65])\n\t(using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g16c15SLSz1y2d\n\tfor <incoming@patchwork.ozlabs.org>; Thu, 23 Apr 2026 04:06:25 +1000 (AEST)","from localhost ([127.0.0.1] helo=lists.ubuntu.com)\n\tby lists.ubuntu.com with esmtp (Exim 4.86_2)\n\t(envelope-from <kernel-team-bounces@lists.ubuntu.com>)\n\tid 1wFbxs-0001hk-EZ; Wed, 22 Apr 2026 18:06:20 +0000","from smtp-relay-internal-0.internal ([10.131.114.225]\n helo=smtp-relay-internal-0.canonical.com)\n by lists.ubuntu.com with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128)\n (Exim 4.86_2) (envelope-from <mehmet.basaran@canonical.com>)\n id 1wFbxr-0001d2-N2\n for kernel-team@lists.ubuntu.com; Wed, 22 Apr 2026 18:06:19 +0000","from mail-wm1-f69.google.com (mail-wm1-f69.google.com\n [209.85.128.69])\n (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest\n SHA256)\n (No client certificate requested)\n by smtp-relay-internal-0.canonical.com (Postfix) with ESMTPS id 98EA73F2A0\n for <kernel-team@lists.ubuntu.com>; Wed, 22 Apr 2026 18:06:19 +0000 (UTC)","by mail-wm1-f69.google.com with SMTP id\n 5b1f17b1804b1-48a548b585cso17622175e9.2\n for <kernel-team@lists.ubuntu.com>; Wed, 22 Apr 2026 11:06:19 -0700 (PDT)","from localhost ([149.86.141.144]) by smtp.gmail.com with ESMTPSA id\n 5b1f17b1804b1-48a55dc9f58sm323435195e9.6.2026.04.22.11.06.17\n (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);\n Wed, 22 Apr 2026 11:06:17 -0700 (PDT)"],"DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed; d=canonical.com;\n s=20251003; t=1776881179;\n bh=sBNvDWDSmYEa9A0zMBWqdDijhlOlSYq22d3I7jnDxwQ=;\n h=From:To:Cc:Subject:Date:Message-ID:MIME-Version;\n b=e+3n+xMqGBsvtMe+t1X+DflXq7f4v+NBIBLe8DjL3B3DoRFK/fdnGtMM68qffz8LQ\n v1XcQTZ+pAdC2E3+NT86ZE3JRiv2pYm271JnItS7xyqQpL8iDWqkTKLErzJOLMh/mt\n 7oYsbFFQlYYpvswnliKtELc/2rh1nqFD19PbAZoS1p1lAizihExGocdleg7pK9pF7y\n +XGfc2WwCbeofodlSujqgY2PtJz9F2l6UPjXDCFZxFMYm6qZiRJFvbebgLdr53dCA+\n o2qU5d0/S6NAKtM1i4H2R15kk35O/EpZmZxF/xFO1mak0E/ojXg3OcwY4NuQTdYKNE\n B/6tI00rzKBYSV3BzZ+TxU20MXXF7iQ/AwMPE6sIrrZQnXv1KIq4IZecUulihx/T5y\n COeEseB3Ctoz9k0DMmURerZrVIvcLxAOyBiR/9Q7ejn+UndZGxmwJCgk76kaSzrr58\n v0IUTLk++dIvYDpg8TUjLwOy5TYdavmIMqn99NwcxI0Cu7KvdEhUSrScxnvBZx4Fe1\n 0uXV9nZ3LPzEgP0ZQrVABPG4D2WwhY0U3xB1t1RS5XbnqPH0xcq6Cr59Gzj31PrtLA\n xwYZvTJ5IKrKtQOkiG77mnc6sCrWFrY3bOZa5e92FUiuJjz2S/p3wm5lZnhcy2b/nN\n dGd6hfn5SRe7yp669K7Az/bw=","X-Google-DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=1e100.net; s=20251104; t=1776881179; x=1777485979;\n h=content-transfer-encoding:mime-version:message-id:date:subject:cc\n :to:from:x-gm-gg:x-gm-message-state:from:to:cc:subject:date\n :message-id:reply-to;\n bh=sBNvDWDSmYEa9A0zMBWqdDijhlOlSYq22d3I7jnDxwQ=;\n b=Qmql+cElJ17WT8ydblpwTfSFljSRjLWroCv1ko05n4kqPvMRy8REa7UOvhCqLZzLg/\n hdKdKqnYMsBWF8zQXHbiSpO/bmGa6mEhcrZ8zBDsEdIVmPM8Gs8gBeAIA42DqnM5g3Ap\n vGixseEyXPVVCBN/0zjNyzHtGgKhc86qxkXrtz672Ub8RpmTJFRi5xkMGQ2JHW9fy0ej\n ZA/vVDYedD25x0mB3J+q0PqIvpyJKx0QdhLFJeIfrTz5YxUPMIgsCU8z1wohjotIB22V\n MJd8LbJ/YpDNq/pENoOE4a6nJ6vY34aLRW72Odaox1e5Fdz7CTQO45cmGiyJJJM6Di9U\n Qkwg==","X-Gm-Message-State":"AOJu0YzXnIVLKJ5A5g7KcQc5ILOZDdtEYuLzRcrlYQhjgMH6Ln+4j9BJ\n xfXMsPj7SUCTx/0f7lclEdvKkft1+7z0z0UwoSHSHNYdpRIhi+Cdq0Wgfx+jgheeqzFgkyaHwq/\n vPT86ZKUV9XETSgY8/MxYuJalL4D6jx2pIU8L3Z76kTzC7xrmc3Z6Vi2UVQK3UZ0Nho6uV8QFiB\n JhxfaKxru4gnW+A/FD","X-Gm-Gg":"AeBDiesfKdAUSFTI8MY7BsM2nQgML0guGN1LEgt8qYGEJKSU3SWqN1aDumia2pTYR0Y\n 6QqWnDUlC8mLoSq5bVv260dbXaQpq69Hi+8DtVznlnMP8lPuGNppBvYZvBFtlKKMIdZ3eLu7S2S\n ePqOdkKmJm25T7zEO3M6YiS0g1YGzXawuNeuWWrfC0E/ocRAf8DtB1nG6pAB2li+lCnPtnagiYQ\n MJREo5t2XTaduWVCGs4H9dy/RnsibhMtoAfft8hxxihHB+VsVpMECS9TY7DgiC6euQJ7jQk1rT0\n aEBOhdTYmorqf+0LTtmWNGrOlPmwBD86ca3tTOVK3pXK2EXOlp8NWcvqxjIivZIyW+WfbEg5MXo\n V0b8eDnTLD8c5G51bRRC3QWppEHmiywMNs/w8e2NuXg==","X-Received":["by 2002:a05:600d:8451:b0:485:4388:3492 with SMTP id\n 5b1f17b1804b1-488fb743c43mr289292965e9.11.1776881178692;\n Wed, 22 Apr 2026 11:06:18 -0700 (PDT)","by 2002:a05:600d:8451:b0:485:4388:3492 with SMTP id\n 5b1f17b1804b1-488fb743c43mr289292635e9.11.1776881178201;\n Wed, 22 Apr 2026 11:06:18 -0700 (PDT)"],"From":"Mehmet Basaran <mehmet.basaran@canonical.com>","To":"kernel-team@lists.ubuntu.com","Subject":"[SRU][N][PATCH 0/1] Revert \"iommu: disable SVA when CONFIG_X86 is\n set\"","Date":"Wed, 22 Apr 2026 21:06:15 +0300","Message-ID":"<20260422180616.336474-1-mehmet.basaran@canonical.com>","X-Mailer":"git-send-email 2.43.0","MIME-Version":"1.0","X-BeenThere":"kernel-team@lists.ubuntu.com","X-Mailman-Version":"2.1.20","Precedence":"list","List-Id":"Kernel team discussions <kernel-team.lists.ubuntu.com>","List-Unsubscribe":"<https://lists.ubuntu.com/mailman/options/kernel-team>,\n <mailto:kernel-team-request@lists.ubuntu.com?subject=unsubscribe>","List-Archive":"<https://lists.ubuntu.com/archives/kernel-team>","List-Post":"<mailto:kernel-team@lists.ubuntu.com>","List-Help":"<mailto:kernel-team-request@lists.ubuntu.com?subject=help>","List-Subscribe":"<https://lists.ubuntu.com/mailman/listinfo/kernel-team>,\n <mailto:kernel-team-request@lists.ubuntu.com?subject=subscribe>","Content-Type":"text/plain; charset=\"utf-8\"","Content-Transfer-Encoding":"base64","Errors-To":"kernel-team-bounces@lists.ubuntu.com","Sender":"\"kernel-team\" <kernel-team-bounces@lists.ubuntu.com>"},"content":"BugLink: https://bugs.launchpad.net/bugs/2149766\n\n[Impact]\n    \nThe issue has been brought to our attention when questing (6.17)\nkernels were unable to load amd_xdna drivers. However, this commit,\nin addition to NPUs, also affects PCIe cards which make use of\nunified memory (GPUs, Accelerators, NICs). With this commit, PCIe\ndevices will revert to using legacy method (pinning) instead of\nunified memory. As a result,\n - arguably it will be less secure,\n - there can be performance drops.\n\nCurrently, this commit is part of an 8 commit patch series:\n\"Fix stale IOTLB entries for kernel address space\", v7.\n  [PATCH v7 1/8] iommu: Disable SVA when CONFIG_X86 is set\n  [PATCH v7 2/8] mm: Add a ptdesc flag to mark kernel page tables\n  [PATCH v7 3/8] mm: Actually mark kernel page table pages\n  [PATCH v7 4/8] x86/mm: Use 'ptdesc' when freeing PMD pages\n  [PATCH v7 5/8] mm: Introduce pure page table freeing function\n  [PATCH v7 6/8] x86/mm: Use pagetable_free()\n  [PATCH v7 7/8] mm: Introduce deferred freeing for kernel page tables\n  [PATCH v7 8/8] iommu/sva: Invalidate stale IOTLB entries for kernel address space\n\nwhere \"iommu: disable SVA when CONFIG_X86 is set\" is undone by\nthe 8th commit. We only have this commit from the whole patchset.\nIdeally we should have the whole patchset applied.\n\n[Fix]\n\nThis commit fixes the following issue which is old,\n26b25a2b98e4 (\"iommu: Bind process address spaces to devices\")\nand we applied this commit recently. So, reverting this commit\nwon't be introducing regressions. Affected kernel versions are:\n - 6.8 due to the reasons above.\n - 6.17 due to both the reasons above and the amd_xdna issue.\n\n[Test Plan]\n\nOur regression test suite doesn't catch this issue. However,\nwe will run it again to see it doesn't cause anything else.\n\n[Where problems could occur]\n\nReverted commit is a fix for a security vulnerability related to\nIOMMU Shared Virtual Addressing (SVA).  In an SVA context, an \nIOMMU can cache kernel page table entries.  When a kernel page \ntable page is freed and reallocated for another purpose, the \nIOMMU might still hold stale, incorrect entries.  This can be \nexploited to cause a use-after-free or write-after-free condition,\npotentially leading to privilege escalation or data corruption.\n\nMehmet Basaran (1):\n  Revert \"iommu: disable SVA when CONFIG_X86 is set\"\n\n drivers/iommu/iommu-sva.c | 3 ---\n 1 file changed, 3 deletions(-)"}