Hello,
syzbot found the following issue on:
HEAD commit: e3a87a10f259 Linux 6.1.21
git tree: linux-6.1.y
console output:
https://syzkaller.appspot.com/x/log.txt?x=11873edec80000
kernel config:
https://syzkaller.appspot.com/x/.config?x=390800ef8aeebc47
dashboard link:
https://syzkaller.appspot.com/bug?extid=457452d30bcdda75ead2
compiler: Debian clang version 15.0.7, GNU ld (GNU Binutils for Debian) 2.35.2
userspace arch: arm64
syz repro:
https://syzkaller.appspot.com/x/repro.syz?x=10b783e5c80000
C reproducer:
https://syzkaller.appspot.com/x/repro.c?x=169fd4d5c80000
Downloadable assets:
disk image:
https://storage.googleapis.com/syzbot-assets/9f5022ccd560/disk-e3a87a10.raw.xz
vmlinux:
https://storage.googleapis.com/syzbot-assets/f8524664c631/vmlinux-e3a87a10.xz
kernel image:
https://storage.googleapis.com/syzbot-assets/ad699b30c2c4/Image-e3a87a10.gz.xz
IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by:
syzbot+457452...@syzkaller.appspotmail.com
------------[ cut here ]------------
sysfs group 'power' not found for kobject 'ueagle-atm!eagleII.fw'
WARNING: CPU: 0 PID: 110 at fs/sysfs/group.c:280 sysfs_remove_group+0x174/0x288 fs/sysfs/group.c:278
Modules linked in:
CPU: 0 PID: 110 Comm: kworker/0:2 Not tainted 6.1.21-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023
Workqueue: events request_firmware_work_func
pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : sysfs_remove_group+0x174/0x288 fs/sysfs/group.c:278
lr : sysfs_remove_group+0x174/0x288 fs/sysfs/group.c:278
sp : ffff80001d7076a0
x29: ffff80001d7076a0 x28: 1fffe00018d29005 x27: dfff800000000000
x26: ffff80001d707760 x25: 1fffe0001b4b400a x24: 1ffff0000261f9f0
x23: dfff800000000000 x22: ffff0000da5a0068 x21: ffff0000da5a0008
x20: ffff0000c2009828 x19: ffff8000130fcf60 x18: ffff80001d707220
x17: 77662e4949656c67 x16: ffff8000120d4cb4 x15: 0000000000000000
x14: 0000000000000000 x13: 0000000000000001 x12: 0000000000000001
x11: ff808000081aec18 x10: 0000000000000000 x9 : a9ce356043b49900
x8 : a9ce356043b49900 x7 : 0000000000000001 x6 : 0000000000000001
x5 : ffff80001d706f98 x4 : ffff800015662680 x3 : ffff8000085810b0
x2 : 0000000000000001 x1 : 0000000100000000 x0 : 0000000000000000
Call trace:
sysfs_remove_group+0x174/0x288 fs/sysfs/group.c:278
dpm_sysfs_remove+0xa4/0xd4 drivers/base/power/sysfs.c:837
device_del+0x268/0x9b4 drivers/base/core.c:3829
fw_load_sysfs_fallback drivers/base/firmware_loader/fallback.c:120 [inline]
fw_load_from_user_helper drivers/base/firmware_loader/fallback.c:158 [inline]
firmware_fallback_sysfs+0x5c4/0x8b8 drivers/base/firmware_loader/fallback.c:234
_request_firmware+0xccc/0xf4c drivers/base/firmware_loader/main.c:856
request_firmware_work_func+0xfc/0x214 drivers/base/firmware_loader/main.c:1105
process_one_work+0x7ac/0x1404 kernel/workqueue.c:2289
worker_thread+0x8e4/0xfec kernel/workqueue.c:2436
kthread+0x24c/0x2d4 kernel/kthread.c:376
ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:860
irq event stamp: 48734
hardirqs last enabled at (48733): [<ffff800008340aac>] __up_console_sem+0xb4/0x100 kernel/printk/printk.c:261
hardirqs last disabled at (48734): [<ffff8000120d096c>] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405
softirqs last enabled at (48404): [<ffff800010aed254>] local_bh_enable+0x10/0x34 include/linux/bottom_half.h:32
softirqs last disabled at (48402): [<ffff800010aed220>] local_bh_disable+0x10/0x34 include/linux/bottom_half.h:19
---[ end trace 0000000000000000 ]---
usb 1-1: [UEAGLE-ATM] firmware is not available
usb 1-1: Direct firmware load for ueagle-atm/eagleII.fw failed with error -2
usb 1-1: Falling back to sysfs fallback for: ueagle-atm/eagleII.fw
---
This report is generated by a bot. It may contain errors.
See
https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at
syzk...@googlegroups.com.
syzbot will keep track of this issue. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.
syzbot can test patches for this issue, for details see:
https://goo.gl/tpsmEJ#testing-patches