INFO: task kworker/0:3:19368 blocked for more than 143 seconds. Not tainted 6.12.0-rc4-syzkaller-00059-gc67e9601e29a #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:3 state:D stack:21376 pid:19368 tgid:19368 ppid:2 flags:0x00004000 Workqueue: events request_firmware_work_func Call Trace: context_switch kernel/sched/core.c:5328 [inline] __schedule+0x105f/0x34b0 kernel/sched/core.c:6690 __schedule_loop kernel/sched/core.c:6767 [inline] schedule+0xe7/0x350 kernel/sched/core.c:6782 schedule_preempt_disabled+0x13/0x30 kernel/sched/core.c:6839 __mutex_lock_common kernel/locking/mutex.c:684 [inline] __mutex_lock+0x5b8/0x9c0 kernel/locking/mutex.c:752 device_lock include/linux/device.h:1014 [inline] ath9k_hif_usb_firmware_fail drivers/net/wireless/ath/ath9k/hif_usb.c:1161 [inline] ath9k_hif_usb_firmware_cb+0x3b1/0x620 drivers/net/wireless/ath/ath9k/hif_usb.c:1294 request_firmware_work_func+0x13a/0x250 drivers/base/firmware_loader/main.c:1197 process_one_work+0x9c5/0x1ba0 kernel/workqueue.c:3229 process_scheduled_works kernel/workqueue.c:3310 [inline] worker_thread+0x6c8/0xf00 kernel/workqueue.c:3391 kthread+0x2c1/0x3a0 kernel/kthread.c:389 ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 Showing all locks held in the system: 1 lock held by khungtaskd/30: #0: ffffffff88ebb140 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire include/linux/rcupdate.h:337 [inline] #0: ffffffff88ebb140 (rcu_read_lock){....}-{1:2}, at: rcu_read_lock include/linux/rcupdate.h:849 [inline] #0: ffffffff88ebb140 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x7f/0x390 kernel/locking/lockdep.c:6720 2 locks held by getty/2918: #0: ffff8881124190a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x24/0x80 drivers/tty/tty_ldisc.c:243 #1: ffffc900000432f0 ( &ldata->atomic_read_lock){+.+.}-{3:3} , at: n_tty_read+0xfba/0x1480 drivers/tty/n_tty.c:2211 4 locks held by udevd/5289: #0: ffff8881142929e0 (&p->lock){+.+.}-{3:3}, at: seq_read_iter+0xd8/0x12b0 fs/seq_file.c:182 #1: ffff88811e567088 (&of->mutex){+.+.}-{3:3}, at: kernfs_seq_start+0x4d/0x240 fs/kernfs/file.c:154 #2: ffff888113d7b3c8 (kn->active#18){++++}-{0:0}, at: kernfs_seq_start+0x71/0x240 fs/kernfs/file.c:155 #3: ffff888116dca190 (&dev->mutex){....}-{3:3}, at: device_lock_interruptible include/linux/device.h:1019 [inline] #3: ffff888116dca190 (&dev->mutex){....}-{3:3}, at: manufacturer_show+0x26/0xa0 drivers/usb/core/sysfs.c:142 5 locks held by kworker/0:1/7535: 3 locks held by kworker/0:0/14707: 2 locks held by kworker/u8:2/16265: #0: ffff888100089148 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_one_work+0x129b/0x1ba0 kernel/workqueue.c:3204 #1: ffffc900059b7d80 ((work_completion)(&sub_info->work)){+.+.}-{0:0}, at: process_one_work+0x921/0x1ba0 kernel/workqueue.c:3205 3 locks held by kworker/0:3/19368: #0: ffff888100080948 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x129b/0x1ba0 kernel/workqueue.c:3204 #1: ffffc9000149fd80 ((work_completion)(&fw_work->work)){+.+.}-{0:0}, at: process_one_work+0x921/0x1ba0 kernel/workqueue.c:3205 #2: ffff88810b738190 (&dev->mutex){....}-{3:3}, at: device_lock include/linux/device.h:1014 [inline] #2: ffff88810b738190 (&dev->mutex){....}-{3:3}, at: ath9k_hif_usb_firmware_fail drivers/net/wireless/ath/ath9k/hif_usb.c:1161 [inline] #2: ffff88810b738190 (&dev->mutex){....}-{3:3}, at: ath9k_hif_usb_firmware_cb+0x3b1/0x620 drivers/net/wireless/ath/ath9k/hif_usb.c:1294 1 lock held by syz.2.6215/31017: #0: ffffffff88ec6a38 ( rcu_state.exp_mutex){+.+.}-{3:3}, at: exp_funnel_lock+0x1a4/0x3b0 kernel/rcu/tree_exp.h:329 1 lock held by modprobe/31056: ============================================= NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 30 Comm: khungtaskd Not tainted 6.12.0-rc4-syzkaller-00059-gc67e9601e29a #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Call Trace: __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120 nmi_cpu_backtrace+0x27b/0x390 lib/nmi_backtrace.c:113 nmi_trigger_cpumask_backtrace+0x29c/0x300 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:162 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:223 [inline] watchdog+0xf0c/0x1240 kernel/hung_task.c:379 kthread+0x2c1/0x3a0 kernel/kthread.c:389 ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 31059 Comm: modprobe Not tainted 6.12.0-rc4-syzkaller-00059-gc67e9601e29a #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 RIP: 0010:unwind_next_frame+0x555/0x20c0 arch/x86/kernel/unwind_orc.c:512 Code: 95 c2 40 84 d6 0f 85 25 15 00 00 41 83 e7 07 44 38 f8 0f 9e c2 84 c0 0f 95 c0 84 c2 0f 85 0e 15 00 00 4c 89 f2 44 0f b6 79 05 <48> b8 00 00 00 00 00 fc ff df 48 c1 ea 03 0f b6 04 02 4c 89 f2 83 RSP: 0018:ffffc9001061f738 EFLAGS: 00000246 RAX: 0000000000000000 RBX: 0000000000000001 RCX: ffffffff8aad5e4a RDX: ffffc9001061f82d RSI: 0000000000000001 RDI: ffffffff8a5d431c RBP: ffffc9001061f840 R08: ffffffff8aad5e74 R09: ffffffff8aad5e4e R10: ffffc9001061f7f8 R11: 0000000000000dec R12: ffffc9001061f848 R13: ffffc9001061f7f8 R14: ffffc9001061f82d R15: 0000000000000002 FS: 0000000000000000(0000) GS:ffff8881f5900000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f2d7b1bf440 CR3: 00000001211b8000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: __unwind_start+0x45f/0x7f0 arch/x86/kernel/unwind_orc.c:760 unwind_start arch/x86/include/asm/unwind.h:64 [inline] arch_stack_walk+0x74/0x100 arch/x86/kernel/stacktrace.c:24 stack_trace_save+0x95/0xd0 kernel/stacktrace.c:122 kasan_save_stack+0x33/0x60 mm/kasan/common.c:47 kasan_save_track+0x14/0x30 mm/kasan/common.c:68 kasan_save_free_info+0x3b/0x60 mm/kasan/generic.c:579 poison_slab_object mm/kasan/common.c:247 [inline] __kasan_slab_free+0x37/0x50 mm/kasan/common.c:264 kasan_slab_free include/linux/kasan.h:230 [inline] slab_free_hook mm/slub.c:2342 [inline] slab_free mm/slub.c:4579 [inline] kmem_cache_free+0x133/0x480 mm/slub.c:4681 remove_vma+0x148/0x1a0 mm/vma.c:335 exit_mmap+0x4e0/0xb30 mm/mmap.c:1898 __mmput kernel/fork.c:1347 [inline] mmput+0xdb/0x3e0 kernel/fork.c:1369 exit_mm kernel/exit.c:571 [inline] do_exit+0x9bf/0x2ce0 kernel/exit.c:926 do_group_exit+0xd3/0x2a0 kernel/exit.c:1088 __do_sys_exit_group kernel/exit.c:1099 [inline] __se_sys_exit_group kernel/exit.c:1097 [inline] __x64_sys_exit_group+0x3e/0x50 kernel/exit.c:1097 x64_sys_call+0x14a9/0x16a0 arch/x86/include/generated/asm/syscalls_64.h:232 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f2d7b27da90 Code: Unable to access opcode bytes at 0x7f2d7b27da66. RSP: 002b:00007ffeef1f44b8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 RAX: ffffffffffffffda RBX: 00007f2d7b36e860 RCX: 00007f2d7b27da90 RDX: 00000000000000e7 RSI: 000000000000003c RDI: 0000000000000001 RBP: 00007f2d7b36e860 R08: 0000000000000001 R09: fb191a100bc43cd7 R10: 00007ffeef1f4370 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000001 R14: 00007f2d7b372658 R15: 0000000000000001