CVE-2025-40058
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
28/10/2025
Last modified:
30/10/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
iommu/vt-d: Disallow dirty tracking if incoherent page walk<br />
<br />
Dirty page tracking relies on the IOMMU atomically updating the dirty bit<br />
in the paging-structure entry. For this operation to succeed, the paging-<br />
structure memory must be coherent between the IOMMU and the CPU. In<br />
another word, if the iommu page walk is incoherent, dirty page tracking<br />
doesn&#39;t work.<br />
<br />
The Intel VT-d specification, Section 3.10 "Snoop Behavior" states:<br />
<br />
"Remapping hardware encountering the need to atomically update A/EA/D bits<br />
in a paging-structure entry that is not snooped will result in a non-<br />
recoverable fault."<br />
<br />
To prevent an IOMMU from being incorrectly configured for dirty page<br />
tracking when it is operating in an incoherent mode, mark SSADS as<br />
supported only when both ecap_slads and ecap_smpwc are supported.



