Home

Description

In the Linux kernel, the following vulnerability has been resolved: iommu/vt-d: Disallow dirty tracking if incoherent page walk Dirty page tracking relies on the IOMMU atomically updating the dirty bit in the paging-structure entry. For this operation to succeed, the paging- structure memory must be coherent between the IOMMU and the CPU. In another word, if the iommu page walk is incoherent, dirty page tracking doesn't work. The Intel VT-d specification, Section 3.10 "Snoop Behavior" states: "Remapping hardware encountering the need to atomically update A/EA/D bits in a paging-structure entry that is not snooped will result in a non- recoverable fault." To prevent an IOMMU from being incorrectly configured for dirty page tracking when it is operating in an incoherent mode, mark SSADS as supported only when both ecap_slads and ecap_smpwc are supported.

PUBLISHED Reserved 2025-04-16 | Published 2025-10-28 | Updated 2025-10-28 | Assigner Linux

Product status

Default status
unaffected

f35f22cc760eb2c7034bf53251399685d611e03f (git) before ebe16d245a00626bb87163862a1b07daf5475a3e
affected

f35f22cc760eb2c7034bf53251399685d611e03f (git) before 8d096ce0e87bdc361f0b25d7943543bc53aa0b9e
affected

f35f22cc760eb2c7034bf53251399685d611e03f (git) before 57f55048e564dedd8a4546d018e29d6bbfff0a7e
affected

Default status
affected

6.7
affected

Any version before 6.7
unaffected

6.12.53 (semver)
unaffected

6.17.3 (semver)
unaffected

6.18-rc1 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/ebe16d245a00626bb87163862a1b07daf5475a3e

git.kernel.org/...c/8d096ce0e87bdc361f0b25d7943543bc53aa0b9e

git.kernel.org/...c/57f55048e564dedd8a4546d018e29d6bbfff0a7e

cve.org (CVE-2025-40058)

nvd.nist.gov (CVE-2025-40058)

Download JSON