VYPR
Medium severity5.5NVD Advisory· Published May 6, 2026· Updated May 8, 2026

CVE-2026-43130

CVE-2026-43130

Description

In the Linux kernel, the following vulnerability has been resolved:

iommu/vt-d: Flush dev-IOTLB only when PCIe device is accessible in scalable mode

Commit 4fc82cd907ac ("iommu/vt-d: Don't issue ATS Invalidation request when device is disconnected") relies on pci_dev_is_disconnected() to skip ATS invalidation for safely-removed devices, but it does not cover link-down caused by faults, which can still hard-lock the system.

For example, if a VM fails to connect to the PCIe device, "virsh destroy" is executed to release resources and isolate the fault, but a hard-lockup occurs while releasing the group fd.

Call Trace: qi_submit_sync qi_flush_dev_iotlb intel_pasid_tear_down_entry device_block_translation blocking_domain_attach_dev __iommu_attach_device __iommu_device_set_domain __iommu_group_set_domain_internal iommu_detach_group vfio_iommu_type1_detach_group vfio_group_detach_container vfio_group_fops_release __fput

Although pci_device_is_present() is slower than pci_dev_is_disconnected(), it still takes only ~70 µs on a ConnectX-5 (8 GT/s, x2) and becomes even faster as PCIe speed and width increase.

Besides, devtlb_invalidation_with_pasid() is called only in the paths below, which are far less frequent than memory map/unmap.

  1. mm-struct release
  2. {attach,release}_dev
  3. set/remove PASID
  4. dirty-tracking setup

The gain in system stability far outweighs the negligible cost of using pci_device_is_present() instead of pci_dev_is_disconnected() to decide when to skip ATS invalidation, especially under GDR high-load conditions.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

In the Linux kernel iommu/vt-d, incomplete ATS invalidation check for disconnected devices can cause system hard-lockup on PCIe link down.

Vulnerability

Analysis A previous attempt to skip ATS invalidation for safely-removed devices relied on pci_dev_is_disconnected(), but this check does not cover PCIe link-down events caused by faults. When a device link is down, the ATS invalidation via qi_submit_sync can cause a system hard-lockup.

Attack

Vector An attacker who can induce a PCIe link down (e.g., by triggering a fault in a virtual machine using VFIO) can cause the system to lock up when the device group is detached, as seen in the call trace during virsh destroy.

Impact

The vulnerability leads to denial of service through system hard-lockup. The fix uses pci_device_is_present() instead, which accurately detects device accessibility at a negligible performance cost (~70 µs on tested hardware), as the affected code paths are infrequent.

Mitigation

Patched in Linux kernel via commit [1]. Users should update to a kernel containing this fix.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2
  • Linux/Kernel2 versions
    cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*range: >=5.10.214,<5.10.252
    • (no CPE)

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

8

News mentions

0

No linked articles in our index yet.