CVE-2026-43346
Linux kernel PTP Control Unavailable Warning Fix
Publication date: 2026-05-08
Last updated on: 2026-05-08
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| intel | ice | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the Linux kernel's handling of the ice network driver in VFIO passthrough setups. Specifically, when only a Physical Function (PF) that does not own the source timer is passed through, the controlling PF (adapter->ctrl_pf) is not initialized in the virtual machine (VM). As a result, the function ice_get_ctrl_ptp() returns NULL, which triggers a WARN_ON() warning in the ice_ptp_setup_pf() function.
Since this behavior is expected in such configurations, the fix replaces the WARN_ON() warning with an informational message and returns an error code -EOPNOTSUPP to indicate the operation is not supported.
How can this vulnerability impact me? :
This issue causes an unnecessary warning (WARN_ON) in the Linux kernel when using VFIO passthrough with certain configurations of the ice network driver. While it does not lead to a security breach or system compromise, it may cause confusion or concern due to the warning messages.
The fix prevents these warnings by properly handling the case where the controlling PF is unavailable, returning an appropriate error instead. Therefore, the impact is primarily related to system log noise and potential misinterpretation of normal behavior as an error.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability relates to the Linux kernel's handling of the ice driver in VFIO passthrough setups, specifically when the Physical Function (PF) controlling the Precision Time Protocol (PTP) is unavailable. Detection would involve monitoring kernel logs for WARN_ON() messages triggered by ice_ptp_setup_pf() when ice_get_ctrl_ptp() returns NULL.
Since the fix replaces WARN_ON() with an informational message and returns -EOPNOTSUPP, detection prior to the fix would involve identifying WARN_ON() kernel warnings related to ice_ptp_setup_pf().
Suggested commands to detect this issue include checking kernel logs for relevant warnings:
- dmesg | grep ice_ptp_setup_pf
- journalctl -k | grep WARN | grep ice
- grep WARN /var/log/kern.log | grep ice
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is addressed by updating the Linux kernel to a version where the ice driver no longer triggers WARN_ON() when the controlling PF is unavailable in VFIO passthrough setups.
Immediate mitigation steps include:
- Update the Linux kernel to the fixed version that replaces WARN_ON() with an informational message and returns -EOPNOTSUPP.
- Avoid configurations where only a PF without the source timer is passed through, if possible.
- Monitor kernel logs for related warnings or informational messages to ensure the issue is resolved.