CVE-2024-53152

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
24/12/2024
Last modified:
24/12/2024

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> PCI: tegra194: Move controller cleanups to pex_ep_event_pex_rst_deassert()<br /> <br /> Currently, the endpoint cleanup function dw_pcie_ep_cleanup() and EPF<br /> deinit notify function pci_epc_deinit_notify() are called during the<br /> execution of pex_ep_event_pex_rst_assert() i.e., when the host has asserted<br /> PERST#. But quickly after this step, refclk will also be disabled by the<br /> host.<br /> <br /> All of the tegra194 endpoint SoCs supported as of now depend on the refclk<br /> from the host for keeping the controller operational. Due to this<br /> limitation, any access to the hardware registers in the absence of refclk<br /> will result in a whole endpoint crash. Unfortunately, most of the<br /> controller cleanups require accessing the hardware registers (like eDMA<br /> cleanup performed in dw_pcie_ep_cleanup(), etc...). So these cleanup<br /> functions can cause the crash in the endpoint SoC once host asserts PERST#.<br /> <br /> One way to address this issue is by generating the refclk in the endpoint<br /> itself and not depending on the host. But that is not always possible as<br /> some of the endpoint designs do require the endpoint to consume refclk from<br /> the host.<br /> <br /> Thus, fix this crash by moving the controller cleanups to the start of<br /> the pex_ep_event_pex_rst_deassert() function. This function is called<br /> whenever the host has deasserted PERST# and it is guaranteed that the<br /> refclk would be active at this point. So at the start of this function<br /> (after enabling resources) the controller cleanup can be performed. Once<br /> finished, rest of the code execution for PERST# deassert can continue as<br /> usual.

Impact