CVE-2022-49383
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
26/02/2025
Last modified:
21/10/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
watchdog: rzg2l_wdt: Fix &#39;BUG: Invalid wait context&#39;<br />
<br />
This patch fixes the issue &#39;BUG: Invalid wait context&#39; during restart()<br />
callback by using clk_prepare_enable() instead of pm_runtime_get_sync()<br />
for turning on the clocks during restart.<br />
<br />
This issue is noticed when testing with renesas_defconfig.<br />
<br />
[ 42.213802] reboot: Restarting system<br />
[ 42.217860]<br />
[ 42.219364] =============================<br />
[ 42.223368] [ BUG: Invalid wait context ]<br />
[ 42.227372] 5.17.0-rc5-arm64-renesas-00002-g10393723e35e #522 Not tainted<br />
[ 42.234153] -----------------------------<br />
[ 42.238155] systemd-shutdow/1 is trying to lock:<br />
[ 42.242766] ffff00000a650828 (&genpd->mlock){+.+.}-{3:3}, at: genpd_lock_mtx+0x14/0x20<br />
[ 42.250709] other info that might help us debug this:<br />
[ 42.255753] context-{4:4}<br />
[ 42.258368] 2 locks held by systemd-shutdow/1:<br />
[ 42.262806] #0: ffff80000944e1c8 (system_transition_mutex#2){+.+.}-{3:3}, at: __do_sys_reboot+0xd0/0x250<br />
[ 42.272388] #1: ffff8000094c4e40 (rcu_read_lock){....}-{1:2}, at: atomic_notifier_call_chain+0x0/0x150<br />
[ 42.281795] stack backtrace:<br />
[ 42.284672] CPU: 0 PID: 1 Comm: systemd-shutdow Not tainted 5.17.0-rc5-arm64-renesas-00002-g10393723e35e #522<br />
[ 42.294577] Hardware name: Renesas SMARC EVK based on r9a07g044c2 (DT)<br />
[ 42.301096] Call trace:<br />
[ 42.303538] dump_backtrace+0xcc/0xd8<br />
[ 42.307203] show_stack+0x14/0x30<br />
[ 42.310517] dump_stack_lvl+0x88/0xb0<br />
[ 42.314180] dump_stack+0x14/0x2c<br />
[ 42.317492] __lock_acquire+0x1b24/0x1b50<br />
[ 42.321502] lock_acquire+0x120/0x3a8<br />
[ 42.325162] __mutex_lock+0x84/0x8f8<br />
[ 42.328737] mutex_lock_nested+0x30/0x58<br />
[ 42.332658] genpd_lock_mtx+0x14/0x20<br />
[ 42.336319] genpd_runtime_resume+0xc4/0x228<br />
[ 42.340587] __rpm_callback+0x44/0x170<br />
[ 42.344337] rpm_callback+0x64/0x70<br />
[ 42.347824] rpm_resume+0x4e0/0x6b8<br />
[ 42.351310] __pm_runtime_resume+0x50/0x78<br />
[ 42.355404] rzg2l_wdt_restart+0x28/0x68<br />
[ 42.359329] watchdog_restart_notifier+0x1c/0x30<br />
[ 42.363943] atomic_notifier_call_chain+0x94/0x150<br />
[ 42.368732] do_kernel_restart+0x24/0x30<br />
[ 42.372652] machine_restart+0x44/0x70<br />
[ 42.376399] kernel_restart+0x3c/0x60<br />
[ 42.380058] __do_sys_reboot+0x228/0x250<br />
[ 42.383977] __arm64_sys_reboot+0x20/0x28<br />
[ 42.387983] invoke_syscall+0x40/0xf8
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.17 (including) | 5.17.15 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.18 (including) | 5.18.4 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



