Hi Jason,
On Wed, 9 Jul 2025 13:27:24 -0300 Jason Gunthorpe jgg@nvidia.com wrote:
On Wed, Jul 09, 2025 at 08:51:58AM -0700, Jacob Pan wrote:
In the IOMMU Shared Virtual Addressing (SVA) context, the IOMMU hardware shares and walks the CPU's page tables. Architectures like x86 share static kernel address mappings across all user page tables, allowing the IOMMU to access the kernel portion of these tables.
Is there a use case where a SVA user can access kernel memory in the first place?
No. It should be fully blocked.
Then I don't understand what is the "vulnerability condition" being addressed here. We are talking about KVA range here.