CVE-2024-43876
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
21/08/2024
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
PCI: rcar: Demote WARN() to dev_warn_ratelimited() in rcar_pcie_wakeup()<br />
<br />
Avoid large backtrace, it is sufficient to warn the user that there has<br />
been a link problem. Either the link has failed and the system is in need<br />
of maintenance, or the link continues to work and user has been informed.<br />
The message from the warning can be looked up in the sources.<br />
<br />
This makes an actual link issue less verbose.<br />
<br />
First of all, this controller has a limitation in that the controller<br />
driver has to assist the hardware with transition to L1 link state by<br />
writing L1IATN to PMCTRL register, the L1 and L0 link state switching<br />
is not fully automatic on this controller.<br />
<br />
In case of an ASMedia ASM1062 PCIe SATA controller which does not support<br />
ASPM, on entry to suspend or during platform pm_test, the SATA controller<br />
enters D3hot state and the link enters L1 state. If the SATA controller<br />
wakes up before rcar_pcie_wakeup() was called and returns to D0, the link<br />
returns to L0 before the controller driver even started its transition to<br />
L1 link state. At this point, the SATA controller did send an PM_ENTER_L1<br />
DLLP to the PCIe controller and the PCIe controller received it, and the<br />
PCIe controller did set PMSR PMEL1RX bit.<br />
<br />
Once rcar_pcie_wakeup() is called, if the link is already back in L0 state<br />
and PMEL1RX bit is set, the controller driver has no way to determine if<br />
it should perform the link transition to L1 state, or treat the link as if<br />
it is in L0 state. Currently the driver attempts to perform the transition<br />
to L1 link state unconditionally, which in this specific case fails with a<br />
PMSR L1FAEG poll timeout, however the link still works as it is already<br />
back in L0 state.<br />
<br />
Reduce this warning verbosity. In case the link is really broken, the<br />
rcar_pcie_config_access() would fail, otherwise it will succeed and any<br />
system with this controller and ASM1062 can suspend without generating<br />
a backtrace.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.18 (including) | 6.1.103 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.44 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.10.3 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/2ae4769332dfdb97f4b6f5dc9ac8f46d02aaa3df
- https://git.kernel.org/stable/c/3ff3bdde950f1840df4030726cef156758a244d7
- https://git.kernel.org/stable/c/526a877c6273d4cd0d0aede84c1d620479764b1c
- https://git.kernel.org/stable/c/59c78e8fddc1fe68f14011450a09b3418127d2ad
- https://git.kernel.org/stable/c/c93637e6a4c4e1d0e85ef7efac78d066bbb24d96
- https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html



