CVE-2026-43130 PUBLISHED

iommu/vt-d: Flush dev-IOTLB only when PCIe device is accessible in scalable mode

Assigner: Linux
Reserved: 01.05.2026 Published: 06.05.2026 Updated: 06.05.2026

In the Linux kernel, the following vulnerability has been resolved:

iommu/vt-d: Flush dev-IOTLB only when PCIe device is accessible in scalable mode

Commit 4fc82cd907ac ("iommu/vt-d: Don't issue ATS Invalidation request when device is disconnected") relies on pci_dev_is_disconnected() to skip ATS invalidation for safely-removed devices, but it does not cover link-down caused by faults, which can still hard-lock the system.

For example, if a VM fails to connect to the PCIe device, "virsh destroy" is executed to release resources and isolate the fault, but a hard-lockup occurs while releasing the group fd.

Call Trace: qi_submit_sync qi_flush_dev_iotlb intel_pasid_tear_down_entry device_block_translation blocking_domain_attach_dev __iommu_attach_device __iommu_device_set_domain __iommu_group_set_domain_internal iommu_detach_group vfio_iommu_type1_detach_group vfio_group_detach_container vfio_group_fops_release __fput

Although pci_device_is_present() is slower than pci_dev_is_disconnected(), it still takes only ~70 µs on a ConnectX-5 (8 GT/s, x2) and becomes even faster as PCIe speed and width increase.

Besides, devtlb_invalidation_with_pasid() is called only in the paths below, which are far less frequent than memory map/unmap.

  1. mm-struct release
  2. {attach,release}_dev
  3. set/remove PASID
  4. dirty-tracking setup

The gain in system stability far outweighs the negligible cost of using pci_device_is_present() instead of pci_dev_is_disconnected() to decide when to skip ATS invalidation, especially under GDR high-load conditions.

Product Status

Vendor Linux
Product Linux
Versions Default: unaffected
  • affected from f873b85ec762c5a6abe94a7ddb31df5d3ba07d85 to 581ce094d9eafb78ec4f9de77bd24b780c151236 (excl.)
  • affected from d70f1c85113cd8c2aa8373f491ca5d1b22ec0554 to e2c78c69f8faf2885ea4ceee08c71ac738f401a0 (excl.)
  • affected from 34a7b30f56d30114bf4d436e4dc793afe326fbcf to ead67d0378e90f419e385a43af29435242d80c12 (excl.)
  • affected from 2b74b2a92e524d7c8dec8e02e95ecf18b667c062 to 01aed2f1d7cb8fdf4c60c5bb4727608cb82b401d (excl.)
  • affected from 4fc82cd907ac075648789cc3a00877778aa1838b to 9813306610d0d718c863aaa70928bf57d7570ec0 (excl.)
  • affected from 4fc82cd907ac075648789cc3a00877778aa1838b to 9deaacc8dcaddb6ddc5b52e1e63b457450ec0f94 (excl.)
  • affected from 4fc82cd907ac075648789cc3a00877778aa1838b to 0da6697e577023d8867c7beb2d16a22510e4eea9 (excl.)
  • affected from 4fc82cd907ac075648789cc3a00877778aa1838b to 10e60d87813989e20eac1f3eda30b3bae461e7f9 (excl.)
  • Version c04f2780919f20e2cc4846764221f5e802555868 is affected
  • Version 025bc6b41e020aeb1e71f84ae3ffce945026de05 is affected
Vendor Linux
Product Linux
Versions Default: affected
  • Version 6.9 is affected
  • unaffected from 0 to 6.9 (excl.)
  • unaffected from 5.10.252 to 5.10.* (incl.)
  • unaffected from 5.15.202 to 5.15.* (incl.)
  • unaffected from 6.1.165 to 6.1.* (incl.)
  • unaffected from 6.6.128 to 6.6.* (incl.)
  • unaffected from 6.12.75 to 6.12.* (incl.)
  • unaffected from 6.18.16 to 6.18.* (incl.)
  • unaffected from 6.19.6 to 6.19.* (incl.)
  • unaffected from 7.0 to * (incl.)

References