{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2022-49383","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-02-26T02:08:31.559Z","datePublished":"2025-02-26T02:11:19.768Z","dateUpdated":"2025-05-04T08:36:30.704Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2025-05-04T08:36:30.704Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nwatchdog: rzg2l_wdt: Fix 'BUG: Invalid wait context'\n\nThis patch fixes the issue 'BUG: Invalid wait context' during restart()\ncallback by using clk_prepare_enable() instead of pm_runtime_get_sync()\nfor turning on the clocks during restart.\n\nThis issue is noticed when testing with renesas_defconfig.\n\n[   42.213802] reboot: Restarting system\n[   42.217860]\n[   42.219364] =============================\n[   42.223368] [ BUG: Invalid wait context ]\n[   42.227372] 5.17.0-rc5-arm64-renesas-00002-g10393723e35e #522 Not tainted\n[   42.234153] -----------------------------\n[   42.238155] systemd-shutdow/1 is trying to lock:\n[   42.242766] ffff00000a650828 (&genpd->mlock){+.+.}-{3:3}, at: genpd_lock_mtx+0x14/0x20\n[   42.250709] other info that might help us debug this:\n[   42.255753] context-{4:4}\n[   42.258368] 2 locks held by systemd-shutdow/1:\n[   42.262806]  #0: ffff80000944e1c8 (system_transition_mutex#2){+.+.}-{3:3}, at: __do_sys_reboot+0xd0/0x250\n[   42.272388]  #1: ffff8000094c4e40 (rcu_read_lock){....}-{1:2}, at: atomic_notifier_call_chain+0x0/0x150\n[   42.281795] stack backtrace:\n[   42.284672] CPU: 0 PID: 1 Comm: systemd-shutdow Not tainted 5.17.0-rc5-arm64-renesas-00002-g10393723e35e #522\n[   42.294577] Hardware name: Renesas SMARC EVK based on r9a07g044c2 (DT)\n[   42.301096] Call trace:\n[   42.303538]  dump_backtrace+0xcc/0xd8\n[   42.307203]  show_stack+0x14/0x30\n[   42.310517]  dump_stack_lvl+0x88/0xb0\n[   42.314180]  dump_stack+0x14/0x2c\n[   42.317492]  __lock_acquire+0x1b24/0x1b50\n[   42.321502]  lock_acquire+0x120/0x3a8\n[   42.325162]  __mutex_lock+0x84/0x8f8\n[   42.328737]  mutex_lock_nested+0x30/0x58\n[   42.332658]  genpd_lock_mtx+0x14/0x20\n[   42.336319]  genpd_runtime_resume+0xc4/0x228\n[   42.340587]  __rpm_callback+0x44/0x170\n[   42.344337]  rpm_callback+0x64/0x70\n[   42.347824]  rpm_resume+0x4e0/0x6b8\n[   42.351310]  __pm_runtime_resume+0x50/0x78\n[   42.355404]  rzg2l_wdt_restart+0x28/0x68\n[   42.359329]  watchdog_restart_notifier+0x1c/0x30\n[   42.363943]  atomic_notifier_call_chain+0x94/0x150\n[   42.368732]  do_kernel_restart+0x24/0x30\n[   42.372652]  machine_restart+0x44/0x70\n[   42.376399]  kernel_restart+0x3c/0x60\n[   42.380058]  __do_sys_reboot+0x228/0x250\n[   42.383977]  __arm64_sys_reboot+0x20/0x28\n[   42.387983]  invoke_syscall+0x40/0xf8"}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/watchdog/rzg2l_wdt.c"],"versions":[{"version":"2cbc5cd0b55fa2310cc557c77b0665f5e00272de","lessThan":"6505541e5298cea2b79da68ee626f583f8e18784","status":"affected","versionType":"git"},{"version":"2cbc5cd0b55fa2310cc557c77b0665f5e00272de","lessThan":"0a635239cd5484d8f2e702713ccc49ec82aa7594","status":"affected","versionType":"git"},{"version":"2cbc5cd0b55fa2310cc557c77b0665f5e00272de","lessThan":"e4cf89596c1f1e33309556699f910ced4abbaf44","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/watchdog/rzg2l_wdt.c"],"versions":[{"version":"5.17","status":"affected"},{"version":"0","lessThan":"5.17","status":"unaffected","versionType":"semver"},{"version":"5.17.15","lessThanOrEqual":"5.17.*","status":"unaffected","versionType":"semver"},{"version":"5.18.4","lessThanOrEqual":"5.18.*","status":"unaffected","versionType":"semver"},{"version":"5.19","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.17","versionEndExcluding":"5.17.15"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.17","versionEndExcluding":"5.18.4"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.17","versionEndExcluding":"5.19"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/6505541e5298cea2b79da68ee626f583f8e18784"},{"url":"https://git.kernel.org/stable/c/0a635239cd5484d8f2e702713ccc49ec82aa7594"},{"url":"https://git.kernel.org/stable/c/e4cf89596c1f1e33309556699f910ced4abbaf44"}],"title":"watchdog: rzg2l_wdt: Fix 'BUG: Invalid wait context'","x_generator":{"engine":"bippy-1.2.0"}}}}